Common use of Unacceptable Use Clause in Contracts

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities and online platforms by any member of the school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its pupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to ICT facilities Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering mechanisms This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other delegated member of SLT will use professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.

Appears in 2 contracts

Samples: benshamgrovenurseryschool.org, www.wingate-nur.durham.sch.uk

AutoNDA by SimpleDocs

Unacceptable Use. The following Giving out personal information about another person, including home address and phone number, is considered unacceptable strictly prohibited. Any use of the school’s ICT facilities and online platforms by any member of the school communitynetwork for commercial or for-profit purposes is prohibited. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable Excessive use of the school’s ICT facilities includes: Using network for personal business shall be cause for disciplinary action. Any use of the school’s ICT facilities to breach intellectual property rights network for product advertisement or copyright Using the school’s ICT facilities to bully or harass someone elsepolitical lobbying is prohibited. Users shall not intentionally seek information on, obtain copies of, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conductmodify files, other data, or statements which are deemed passwords belonging to be advocating illegal activity Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate Activity which defames or disparages the schoolother users, or risks bringing misrepresent other users on the school into disrepute Sharing confidential information about network. No use of the schoolnetwork shall serve to disrupt the use of the network by others. Hardware and/or software shall not be destroyed, its pupilsmodified, or abused in any way. Malicious use of the network to develop programs that harass other users or infiltrate a computer or computing system and/or damage the software components of a computer or computing system is prohibited. Hate mail, chain letters, harassment, discriminatory remarks, and other antisocial behaviors are prohibited on the network. The unauthorized installation of any software, including shareware and freeware, for use on Concordia Lutheran School computers is prohibited. Use of the network to access or process pornographic material, inappropriate text files (as determined by the system administrator or building administrator), or files dangerous to the integrity of the local area network is prohibited. Concordia Lutheran School network may not be used for downloading entertainment software or other files not related to the mission and objectives of Concordia Lutheran School for transfer to a user's home computer, personal computer, or other members of the school community Connecting any device media. This prohibition pertains to the school’s ICT network without approval from authorised personnel Setting up any freeware, shareware, copyrighted commercial and non-commercial software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any program, tool or item and all other forms of software designed to interfere with the functioning of the ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to ICT facilities Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is and files not supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites instructional and administrative purposes of the Administration of. Downloading, copying, otherwise duplicating, and/or distributing copyrighted materials without the specific written permission of the copyright owner is prohibited, except that duplication and/or distribution of materials for educational purposes is permitted when such duplication and/or distribution would fall within the Fair Use Doctrine of the United States Copyright Law (Title 17, USC). Use of the network for any unlawful purpose is prohibited. Use of profanity, obscenity, racist terms, or mechanisms other language that may be offensive to bypass another user is prohibited. Playing games is prohibited unless specifically authorized by a teacher for instructional purposes. Establishing network or Internet connections to live communications, including voice and/or video (relay chat), is prohibited unless specifically authorized by the school’s filtering mechanisms This system administrator. Disclaimer: Concordia Lutheran School cannot be held accountable for the information that is retrieved via the network. Pursuant to the Electronic Communications Privacy Act of 1986 (18 USC 2510 et seq.), notice is hereby given that there are no facilities provided by this system for sending or receiving private or confidential electronic communications. System administrators have access to all mail and will monitor messages. Messages relating to or in support of illegal activities will be reported to the appropriate authorities. Concordia Lutheran School will not an exhaustive listbe responsible for any damages you may suffer, including loss of data resulting from delays, non-deliveries, or service interruptions caused by our own negligence or your errors or omissions. Use of any information obtained is at your own risk. Concordia Lutheran School makes no warranties (expressed or implied) with respect to: the content of any advice or information received by a user, or any costs or charges incurred as a result of seeing or accepting any information; and any costs, liability, or damages caused by the way the user chooses to use his or her access to the network. The school Concordia Lutheran School Board reserves the right to amend this list change its policies and rules at any time. The headteacher User Agreement (to be signed by all adult users and student users grade 5 & above) I have read, understand, and will abide by the above Acceptable Use Policy when using computer and other electronic resources owned, leased, or other delegated member operated by Concordia Lutheran School. I further understand that any violation of SLT the regulations above is unethical and may constitute a criminal offense. Should I commit any violation, my access privileges may be revoked, school disciplinary action may be taken, and/or appropriate legal action may be initiated. User Name (please print) User Signature (to be signed by all student users grade 5 & above) Date User Name (please print) User Signature (to be signed by all student users grade 5 & above) Date User Name (please print) User Signature (to be signed by all student users grade 5 & above) Date Parent Agreement (to be signed by parents of all student users under the age of eighteen) As parent or guardian of [please print name of student] , I have read the Acceptable Use Policy. I understand that this access is designed for educational purposes. [Name of Organization] has taken reasonable steps to control access to the Internet, but cannot guarantee that all controversial information will use professional judgement be inaccessible to determine whether any act or behaviour student users. I agree that I will not hold the [Name of Organization] responsible for materials acquired on the list above network. Further, I accept full responsibility for supervision if and when my child's use is considered unacceptable not in a school setting. I hereby give permission for my child to use network resources, including the Internet, that are available through [Name of the school’s ICT facilities.Organization]. Parent Name (please print)

Appears in 1 contract

Samples: Acceptable Use Agreement

Unacceptable Use. Includes but not limited to: ❖ Pornography (real-life or cartoon) Pornography can be a felony offense and if so will be turned over to authorities. ➢ Possession ➢ Manufacturing – using a camera or creating pictures/movies ➢ Distributing – sending/sharing with others ❖ Images of Weapons ❖ Gang Related Files ❖ Bootleg movies or music ❖ Logging into a device/application using someone else’s login ❖ Cheating ❖ Using a device to plan a fight, cause harm or commit a crime ❖ Profanity directed to the faculty or staff ❖ Threats and/or cyberbullying ❖ Employing the network for commercial purposes, financial gain or fraud ❖ Attempting to access websites blocked by district policy including the use of proxy services, software, or websites. The following use of keylogging devices/software is considered unacceptable prohibited. ❖ Violating copyright laws ❖ Bullying, harassing, insulting or attacking others Discipline Consequences will be as directed by the ACS Student Code of Conduct and the School-Wide Positive Behavior Intervention Support Plan at the student’s home school. PARENT OR GUARDIAN (If the student is under the age of 18, a parent or guardian must also read and sign this agreement.) As the parent or guardian of this student, I have read this document and Alleghany County Public Schools Technology Policies (10000) posted on Alleghany County Website. I understand that the use of the school’s ICT facilities Internet and online platforms by any member technology resources is a standard part of the school communityinstructional process and is considered the same as using a textbook or any other resource to enhance or deliver instruction. Any breach of this policy Furthermore, I understand that my child may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its pupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data Gaining, or attempting to gainissued an email account, access to restricted areas of learning networks, and/or given access to other specific online content in order to support the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised instructional process as is age and/or grade level appropriate. I further understand that access to the school’s ICT facilities Causing intentional damage Internet and the use of school owned technology resources are intended for educational purposes only. I also recognize that even though Alleghany County Public Schools uses appropriate Internet filtering software, it is impossible to ICT facilities Removingrestrict access to all inappropriate materials, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is and I will not supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to hold the school Using websites system responsible if my child accesses or mechanisms to bypass the school’s filtering mechanisms This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other delegated member of SLT will use professional judgement to determine whether any act or behaviour not acquires such materials on the list above is considered unacceptable network. I accept responsibility for my child’s compliance with the Acceptable Use Policy. I give my consent for school district personnel to monitor my child’s school issued email account as well as my child’s internet activity on school owned computers and the school network. I have read to my child (or they have read), and understand, and will abide by the Alleghany County Public Schools Student Internet Safety and Acceptable Use of Technology Resources Policy (10100/10200/10226). Students understand that should they commit any violation of this policy, their access privileges may be revoked, and school disciplinary action and/or legal action may be taken. Students further understand that they will be issued an email account and/or other online tools, that they should use of the school’s ICT facilities.them appropriately and in accordance with Policy (10100/10226). Parent Signature: Date: / /

Appears in 1 contract

Samples: Handbook and Agreement

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities and online platforms by any member of the school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its pupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to ICT facilities Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering mechanisms This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other delegated member of SLT designated Data Protection Officer and the DSL will use professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.

Appears in 1 contract

Samples: lancastersteinerschool.org

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities and online platforms by any member of the school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its pupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to ICT facilities Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering mechanisms This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other delegated member Head of SLT School will use professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.

Appears in 1 contract

Samples: eslingtonfurrowfield.org

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities and online platforms by any member of the school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its pupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to ICT facilities Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering mechanisms This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher Senior Leadership Team (SLT) or any other delegated relevant member of SLT staff will use professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.

Appears in 1 contract

Samples: theblueschool.com

Unacceptable Use. Includes but not limited to: ❖ Pornography (real life or cartoon) Pornography can be a felony offense and if so will be turned over to authorities. ➢ Possession ➢ Manufacturing – using a camera or creating pictures/movies ➢ Distributing – sending/sharing with others ❖ Images of Weapons ❖ Gang Related Files ❖ Bootleg movies or music ❖ Logging into a device/application using someone else’s login ❖ Cheating ❖ Using a device to plan a fight, cause harm or commit a crime ❖ Profanity directed to the faculty or staff ❖ Threats and/or cyber bullying ❖ Employing the network for commercial purposes, financial gain or fraud ❖ Attempting to access websites blocked by district policy including the use of proxy services, software or websites. The following use of keylogging devices/software is considered unacceptable prohibited. ❖ Violating copyright laws ❖ Bullying, harassing, insulting or attacking others Discipline Consequences will be as directed by the ACS Student Code of Conduct and the Schoolwide Positive Behavior Intervention Support Plan at the student’s home school. PARENT OR GUARDIAN (If the student is under the age of 18, a parent or guardian must also read and sign this agreement.) As the parent or guardian of this student, I have read this document and Alleghany County Public Schools Technology Policies (10000) posted on Alleghany County Website. I understand that the use of the school’s ICT facilities Internet and online platforms by any member technology resources is a standard part of the school communityinstructional process and is considered the same as using a textbook or any other resource to enhance or deliver instruction. Any breach of this policy Furthermore, I understand that my child may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its pupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data Gaining, or attempting to gainissued an email account, access to restricted areas of learning networks, and/or given access to other specific online content in order to support the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised instructional process as is age and/or grade level appropriate. I further understand that access to the school’s ICT facilities Causing intentional damage Internet and the use of school owned technology resources are intended for educational purposes only. I also recognize that even though Alleghany County Public Schools uses appropriate Internet filtering software, it is impossible to ICT facilities Removingrestrict access to all inappropriate materials, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is and I will not supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to hold the school Using websites system responsible if my child accesses or mechanisms to bypass the school’s filtering mechanisms This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other delegated member of SLT will use professional judgement to determine whether any act or behaviour not acquires such materials on the list above is considered unacceptable network. I accept responsibility for my child’s compliance with the Acceptable Use Policy. I give my consent for school district personnel to monitor my child’s school issued email account as well as my child’s internet activity on school owned computers and the school network. I have read to my child (or they have read), and understand, and will abide by the Alleghany County Public Schools Student Internet Safety and Acceptable Use of Technology Resources Policy (10100/10200/10226). Students understand that should they commit any violation of this policy, their access privileges may be revoked, and school disciplinary action and/or legal action may be taken. Students further understand that they will be issued an email account and/or other online tools, that they should use of the school’s ICT facilities.them appropriately and in accordance with Policy (10100/10226). Parent Signature: Date: / /

Appears in 1 contract

Samples: Handbook and Agreement

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities and online platforms by any member of the school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its pupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to ICT facilities Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering mechanisms This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other delegated member of SLT will use professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.

Appears in 1 contract

Samples: Acceptable Usage

Unacceptable Use. The following conduct is considered unacceptable use not permitted under any circumstances whether using the School network or IT Services or not (for example personal devices), and whether on school premises or at school activities (for example on excursions):  Cyber Bullying  Posting personal information (including photographs) about another person without that person’s consent  Engaging in abusive behavior, discrimination or harassment of the school’s ICT facilities and online platforms by any member of the school community. Any breach of this policy may result in disciplinary kind  Using email or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities Social Media to breach intellectual property rights embarrass or copyright Using the school’s ICT facilities to bully or harass someone elsedefame any person, or to promote unlawful discrimination Breaching the school’s policies spread rumours, including by posting comments or procedures Any illegal conductphotographs  Allowing someone else to use your account, or statements which are deemed sharing your login information  Using an account owned by another user  Gaining unauthorised access to be advocating illegal activity resources or secure files  Accessing, creatingdownloading, storingsending or storing lewd or distasteful material, linking including (without limitation) material of a violent, racist, sexist or pornographic nature, or material containing sex or nudity, offensive language or demonstrations of drug use  Attempting to or sending material access content that is pornographicnot appropriate, offensiveincluding (without limitation) gambling, obscene extremism, weapons  Engaging in activities which disrupt or otherwise inappropriate Activity which defames or disparages damage the schoolcomputer system, or risks bringing the school into disrepute Sharing confidential information about the schoolmay be likely to do so. This includes gaining access to "hacking" sites, its pupils, possessing "hacking" software or other members of the school community Connecting any device downloading (or attempting to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using download) any program, tool software or item of software designed to interfere with the functioning of the ICT facilities, accounts file from an unsecure or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, unknown source without prior approval from authorised personnel Allowingthe school  Posting viral email, encouragingsending insulting or threatening messages, promoting money-making schemes, including indicating that negative things will happen to a recipient if they do not forward an email or enabling photo.  Recording audio or video of a teacher or fellow student without prior consent. Academic dishonesty Plagiarism is using the ideas or words of others to gain (and claiming them as your own. In Judaism, this is called Genivat Deat - stealing someone else's ideas. Deliberate plagiarism, including copying another student’s work or attempt to gain) unauthorised access to copying and pasting from the school’s ICT facilities Causing intentional damage to ICT facilities RemovingInternet, deleting or disposing of ICT equipmentis an offence and is against the law. All statements, systemsopinions, programs or information without permission by authorised personnel Causing a data breach by accessingconclusions etc. taken from another writer's work should be cited, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business whether the work is directly related to quoted, paraphrased or summarised. Whenever the school Using websites words or mechanisms to bypass ideas of another person are used, the school’s filtering mechanisms This is not an exhaustive listsource must be acknowledged. Information from the Internet must be referenced, like any other source. As plagiarism contravenes basic Jewish and School ethical standards, significant consequences will be forthcoming for any student who does plagiarise. Privacy and Surveillance The school School reserves the right to amend this list at access and monitor email, websites, server logs and electronic files and any time. The headteacher computer or other delegated member of SLT will use professional judgement electronic device connected to the KDS network should it determine whether any act or behaviour not on the list above that there is considered unacceptable use of the school’s ICT facilitiesreason to do so.

Appears in 1 contract

Samples: media.edufolios.org

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities and online platforms by any member of the school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its pupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to ICT facilities Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering mechanisms This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other delegated member of SLT will use professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.

Appears in 1 contract

Samples: static1.squarespace.com

AutoNDA by SimpleDocs

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities and online platforms by any member of the school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its pupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to ICT facilities Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering mechanisms This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other delegated member of SLT Head teacher will use professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.

Appears in 1 contract

Samples: www.plympton-st-maurice-primary.org.uk

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities and online platforms by any member of the school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its pupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-password- protected information, without approval from authorised personnel Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to ICT facilities Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering mechanisms This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher Headteacher or other delegated member of SLT Deputy Head will use professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.

Appears in 1 contract

Samples: www.aaps.uk.com

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities and online platforms by any member of the school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its pupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to ICT facilities Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering mechanisms This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other delegated member of SLT Headteacher will use professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.

Appears in 1 contract

Samples: greatstoneschool.co.uk

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities and online platforms by any member of the school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its pupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-password- protected information, without approval from authorised personnel Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to ICT facilities Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering mechanisms This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other delegated member of SLT Headteacher will use professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.

Appears in 1 contract

Samples: ashleyjuniorschool.co.uk

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities and online platforms by any member of the school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its pupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to ICT facilities Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering mechanisms This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher Headteacher or any other delegated relevant member of SLT staff will use professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.

Appears in 1 contract

Samples: s3-eu-west-1.amazonaws.com

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities and online platforms by any member of the school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its pupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to ICT facilities Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering mechanisms This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other delegated member of SLT Head Master will use professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.

Appears in 1 contract

Samples: mougins-school.com

Time is Money Join Law Insider Premium to draft better contracts faster.