Common use of Unacceptable Behavior Clause in Contracts

Unacceptable Behavior. In addition to any other district or RVSD policy, unacceptable conduct includes, but is not limited to, the following: o Using the network for illegal activities, including copyright violations. o Accessing online sites or materials that do not support the curriculum or are inappropriate for school purposes while on campus, including sites that contain pornography or are otherwise vulgar or lewd. o Downloading inappropriate materials, viruses,or software. o Using or possessing hacking or file-sharing software, including keystroke loggers, batch files or applications used to bypass Device or network security o Gaining unauthorized access anywhere on the network, including attempting to log onto the Internet, network, servers, routers, switches, printers or firewall as a system administrator. o Using the Device or network for financial gain or advertising. o Vandalizing or tampering with the Device, files, software, system performance, or other network equipment. o Attempting to repair, remove, or install computer hardware or software. o Opening the computer to access internal parts. o Causing network congestion or interfering with the work of others, including sending chain emails or broadcast messages. o Subscribing to mailing lists, mass emails, game, or other services that cause network congestion. o Intentionally wasting finite Internet or network resources. This includes downloading files, streaming music, videos, games, or installing, activating or creating programs that interfere with the performance of the network, Internet or computer hardware. o Revealing, sharing, or posting personal information including full names, addresses, phone numbers, social security numbers, driver’s license numbers, or passwords for yourself or others. o Invading the privacy of others. o Using another person’s username or password or allowing another to access your account using your username or password. o Pretending to be someone else when sending or receiving messages. o Forwarding or distributing inappropriate email messages. o Engaging in harassment or transmitting obscene messages, pictures, websites, or other files, including racist, terrorist, abusive, sexually explicit, vulgar, threatening, stalking, demeaning, slanderous or any other inflammatory content. o Utilizing sites to sell or purchase written papers, book reports, and other student work or to commit any act of plagiarism. o Using unauthorized technology to gain advantage on assessments by providing or receiving information not allowed by the instructor or that is unavailable to other students. o Assisting, observing, or joining any unauthorized activity using the Device, Network or Internet o Accessing or attempting to access Internet sites not approved by the District/teacher, including non-educational chat rooms, instant messaging, or social networking sites, including, but not limited to, Twitter, Instagram, Facebook, and other sites that could expose students to harm or distract from engagement in academic and school related pursuits. o Attempting to disable or circumvent the RVSD’s Internet content filter and firewall or attempting to use proxies to access sites that would otherwise be restricted. o Falsifying permission or identification information. o Copying or modifying files, data, or passwords belonging to others or using technology to circumvent doing your own work for your courses.

Appears in 1 contract

Sources: Computer Use/Loan Agreement

Unacceptable Behavior. In addition to any other district or RVSD RVHS policy, unacceptable conduct includes, but is not limited to, the following: o Using the network for illegal activities, including copyright violations. o violations • Accessing online sites or materials that do not support the curriculum or are inappropriate for school purposes while on campus, including sites that contain pornography or are otherwise vulgar or lewd. o Downloading inappropriate materials, viruses,, or software. o software • Using or possessing hacking or file-sharing software, including keystroke loggers, batch files or applications used to bypass Device or network security o Gaining unauthorized access anywhere on the network, including attempting to log onto the Internetinternet, network, servers, routers, switches, printers or firewall as a system administrator. o Using the Device or network for financial gain or advertising. o Vandalizing or tampering with the Device, files, software, system performance, or other network equipment. o Attempting to repair, remove, or install computer hardware or software. o Opening the computer to access internal parts. o Causing network congestion or interfering with the work of others, including sending chain emails or broadcast messages. o Subscribing to mailing lists, mass emails, gamegames, or other services that cause network congestion. o Intentionally wasting finite Internet or network resources. This includes downloading files, streaming music, videos, games, or installing, activating or creating programs that interfere with the performance of the network, Internet or computer hardware. o Revealing, sharing, or posting personal information including full names, addresses, phone numbers, social security numbers, driver’s 's license numbers, or passwords for yourself or others. o Invading the privacy of others. o Using another person’s 's username or password or allowing another to access your account using your username or password. o Pretending to be someone else when sending or receiving messages. o Forwarding or distributing inappropriate email messages. o Engaging in harassment or transmitting obscene messages, pictures, websites, or other files, including racist, terrorist, abusive, sexually explicit, vulgar, threatening, stalking, ) demeaning, slanderous or any other inflammatory content. o Utilizing sites to sell or purchase written papers, book reports, and other student work or to commit any act of plagiarism. o Using unauthorized technology to gain advantage on assessments by providing or receiving information not allowed by the instructor or that is unavailable to other students. o Assisting, observing, or joining any unauthorized activity using the Device, Network or Internet o Device • Accessing or attempting to access Internet sites not approved by the District/teacher, including non-educational chat rooms, instant messaging, or social networking sites, including, but not limited to, Twitter, Instagram, Facebook, and other sites that could expose students to harm or distract from engagement in academic and school related pursuits. o Attempting to disable or circumvent the RVSD’s 's Internet content filter and firewall or attempting to use proxies to access sites that would otherwise be restricted. o Falsifying permission or identification information. o Copying or modifying files, data, or passwords belonging to others or using technology to circumvent doing your own work for your courses. • Knowingly placing a virus on a Device or network. (Additionally, legal charges may be filed.) • Writing, drawing, painting, defacing or placing stickers or labels on school owned Devices or Device accessories or causing other intentional damage. • Attempting to alter data or the configuration of a Device or the files of another user. • Accessing or attempting to access the District's secured wired or wireless network with any Device that is not property of the RVSD. • Presence of images of guns, weapons, pornographic materials, inappropriate language, alcohol, drugs, or gang-related symbols are subject to disciplinary action. • Cyber-bullying in any form is unacceptable. Students will not engage in any cyber-bullying activity, which may include efforts to harass, threaten, torment, embarrass or intimidate students or school staff through the use of digital media. • In situations in which cyber-bullying originates from off campus conduct but is brought to the attention of school officials, any disciplinary action will be based upon whether the conduct is determined to be materially and substantially disruptive to the school environment or have a direct and immediate effect on school safety or on maintaining order and discipline in the schools. Discipline for cyber-bullying will be handled on a case-by-case basis as deemed appropriate by the school principal.

Appears in 1 contract

Sources: Computer Use/Loan Agreement