Acceptable Use of Electronic Information Resources Sample Clauses

Acceptable Use of Electronic Information Resources. Delhi Unified School District’s (“District”) Acceptable Use of Electronic Information Resources Agreement for Students and Parents applies to student use of Electronic Information Resources, including, but not limited to, computers, network, network gear, servers, Internet, cloud-based solutions, accounts, e-mail accounts passwords, ID numbers, applications, and Electronic Communication Devices, provided by the District, used on District property, and/or used off-campus in connection with District activity or attendance (hereinafter collectively referred to as “Electronic Information Resources”). All such use must be responsible, proper, and supportive of the instructional program for the advancement of student learning. Electronic Communication Device/s means any electronic apparatus capable of sending, receiving, reproducing, recording, storing, processing, displaying, and/or transmitting data, voice, text, and/or video/photo images. This generally includes, but is not limited to, cell phones, computers, laptops, netbooks, Chromebooks, Smartphones, Tablets, Media Players, memory sticks, and other current and future similar devices. For purposes of this Agreement, Electronic Information Resources also includes any District sponsored online synchronous and asynchronous e-learning platforms, i.e. Google Classroom, Google Hangouts, Google Meet, Lightspeed Classroom or any software that provides the technical infrastructure on which e-learning or virtual learning activities (learning conducted via electronic media, typically on the Internet) can take place (collectively “E-Learning Platform”). The Internet offers access to computers and people across the world through, for example, e-mail, chat rooms, E-Learning Platforms, and social networking sites. The protection of students is of paramount concern to the District. The District uses a Child Internet Protection Act (“CIPA”) compliant filter, and school staff monitor and supervise student use of the Electronic Information Resources provided by the District and used on District property. However, it is impossible to control access to all material. As a result, users (and parents of users who are students) must understand that neither the District nor its staff members control or condone the content of the information available through the Electronic Information Resources. Some of the information available through the Electronic Information Resources is controversial and may be offensive. Electronic Informatio...
AutoNDA by SimpleDocs
Acceptable Use of Electronic Information Resources. The privilege to use devices and / networks is dependent on the level of responsibility shown by individual students. It is our intent to have all students access these tools for learning on an ongoing basis. The following acts and prohibited sites constitute inappropriate use and may endanger students, and/or possibly damage the network, hardware, and/or software Prohibited acts include o Use of someone else’s CBE account or access to network o Sending or displaying offensive messages or pictures o Using obscene language o Harassing, insulting or attacking another person or their reputation o Trespassing in others peoples folders, work or files o Accessing, posting, sending or downloading of inappropriate material o Assuming the identity of another person to gain information o Viewing web pages through a proxy server o Running an application/program from a memory stick/jump drive o In any way moving, opening hardware or computer accessories o Any attempt and/or threats to harm a person o Plagiarism of online content o Posting, publishing, circulating or distributing personal information about oneself or others without the supervision and consent of a staff member o Sharing of usernames and passwords for other people to use o Use of technology or the network to access sites / software not approved by staff Students must respect intellectual property and adhere to copyright, software piracy and fair dealing laws associated with learning technologies. Prohibited Sites include o Vulgar or lewd depiction of the human body o Any content publicly labelled for adults o Violent acts o On-line gambling o Sites that encourage the use of illicit or illegal drugs, tobacco, or alcohol o Sites that advocating violence or hatred against an identifiable xxxxx.xx. race, religion, gender, disabilities, age, colour, sexual orientation, etc. o Sites promoting criminal activity Violation of the CBE Policy Each situation is dealt with on an individual basis and breach of policy may result in: o restriction or loss of computer privileges; o school based disciplinary consequences; and / or
Acceptable Use of Electronic Information Resources. This policy pertains to information technology services and to the resources these technologies make available in support of the university community. The University of Victoria reserves the right to temporarily expire or decommission a site at its discretion if the content of the site violates the appropriate content guidelines outlined in University Policy IM7200. Copyright Obligations The use of the Service is governed by the Canadian Copyright Act and guidelines outlined by the University of Victoria Copyright Office. Nearly all text, images, audio, video and other information created by third parties, including material found on the Internet, are subject to copyright protection. When posting copyrighted content, you must comply with the various conditions imposed by the author/creator of the work. The University of Victoria Copyright Office provides resources, guidelines, policies, and workshops through their website. Any questions or concerns should be directed to the Copyright Officer.
Acceptable Use of Electronic Information Resources. The privilege to use devices and networks is dependent on the level of responsibility shown by individual students. It is our intent to have all students access these tools for learning on an ongoing basis. The following acts and prohibited sites constitute inappropriate use and may endanger students, and/or possibly damage the network, hardware, and/or software Prohibited Acts ⦸ Use of someone else’s CBE account or access to network ⦸ Sending or displaying offensive messages or pictures ⦸ Using obscene language ⦸ Xxxxxxxxx, insulting or attacking another person or their reputation ⦸ Trespassing in others peoples folders, work or files ⦸ Accessing, posting, sending or downloading of inappropriate material ⦸ Assuming the identity of another person to gain information ⦸ Viewing web pages through a proxy server ⦸ Running an application/program from a memory stick/jump drive ⦸ In any way moving, opening hardware or computer accessories ⦸ Any attempt and/or threats to harm a person ⦸ Plagiarism of online content ⦸ Posting, publishing, circulating or distributing personal information about oneself or others without the supervision and consent of a staff member ⦸ Sharing of usernames and passwords for other people to use ⦸ Using technology (personal or school-based devices) without staff permission at any time during school hoursUse of technology or the network to access sites / software not approved by staff, or deemed inappropriate by Administrative Regulation 1062 Students must also respect intellectual property and adhere to copyright, software piracy and fair dealing laws associated with learning technologies. Calgary Board of Education Administrative Regulation 1062 specifies the following: “Inappropriate material” includes but is not limited to

Related to Acceptable Use of Electronic Information Resources

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Confidentiality and Safeguarding of University Records; Press Releases; Public Information Under this Agreement, Contractor may (1) create, (2) receive from or on behalf of University, or (3) have access to, records or record systems (collectively, University Records). Among other things, University Records may contain social security numbers, credit card numbers, or data protected or made confidential or sensitive by Applicable Laws. [Option (Include if University Records are subject to FERPA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Family Educational Rights and Privacy Act, 20 United States Code (USC) §1232g (FERPA) are addressed in Section 12.41.] [Option (Include if University is a HIPAA Covered Entity and University Records are subject to HIPAA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Health Insurance Portability and Accountability Act and 45 Code of Federal Regulations (CFR) Part 160 and subparts A and E of Part 164 (collectively, HIPAA) are addressed in Section 12.26.] Contractor represents, warrants, and agrees that it will: (1) hold University Records in strict confidence and will not use or disclose University Records except as (a) permitted or required by this Agreement, (b) required by Applicable Laws, or (c) otherwise authorized by University in writing; (2) safeguard University Records according to reasonable administrative, physical and technical standards (such as standards established by the National Institute of Standards and Technology and the Center for Internet Security [Option (Include if Section 12.39 related to Payment Card Industry Data Security Standards is not include in this Agreement.):, as well as the Payment Card Industry Data Security Standards]) that are no less rigorous than the standards by which Contractor protects its own confidential information; (3) continually monitor its operations and take any action necessary to assure that University Records are safeguarded and the confidentiality of University Records is maintained in accordance with all Applicable Laws and the terms of this Agreement; and (4) comply with University Rules regarding access to and use of University’s computer systems, including UTS165 at xxxx://xxx.xxxxxxxx.xxx/board-of-regents/policy-library/policies/uts165-information-resources-use-and-security-policy. At the request of University, Contractor agrees to provide University with a written summary of the procedures Contractor uses to safeguard and maintain the confidentiality of University Records.

  • Information Safeguards Business Associate will develop, document, implement, maintain and use appropriate administrative, technical and physical safeguards to preserve the integrity and confidentiality of and to prevent non-permitted use or disclosure of PHI created for or received from Recipient or its Subsidiaries. These safeguards must be appropriate to the size and complexity of Business Associate’s operations and the nature and scope of its activities. Business Associate agrees that these safeguards will meet any applicable requirements set forth by the U.S. Department of Health and Human Services, including (as of the effective date or as of the compliance date, whichever is applicable) any requirements set forth in the final HIPAA security regulations. Business Associate agrees to mitigate, to the extent practicable, any harmful effect that is known to Business Associate resulting from a use or disclosure of PHI by Business Associate in violation of the requirements of this Addendum.

  • Basic Information The Agent will thoroughly familiarize itself with the character, location, construction, layout, plan and operation of the Project, and especially the electrical, plumbing, air-conditioning and ventilating systems, the elevators and all other mechanical equipment.

  • Contact Information for Privacy and Security Officers and Reports 2.1 Business Associate shall provide, within ten (10) days of the execution of this Agreement, written notice to the Contract or Grant manager the names and contact information of both the HIPAA Privacy Officer and HIPAA Security Officer of the Business Associate. This information must be updated by Business Associate any time these contacts change.

  • Confidentiality and Safeguarding Information 1. Each Party may have access to confidential information made available by the other. The provisions of the Florida Public Records Act, Chapter 119, F.S., and other applicable state and federal laws will govern disclosure of any confidential information received by the State of Florida.

  • Patient Information Each Party agrees to abide by all laws, rules, regulations, and orders of all applicable supranational, national, federal, state, provincial, and local governmental entities concerning the confidentiality or protection of patient identifiable information and/or patients’ protected health information, as defined by any other applicable legislation in the course of their performance under this Agreement.

Time is Money Join Law Insider Premium to draft better contracts faster.