Technology Use Policy Sample Clauses

Technology Use Policy. The Student acknowledges that the Technology Use Policy of the Institution applies to the use of the learning tool(s) hereunder and agrees to be bound by the terms of the Policy which can be accessed at xxxx.xxxx.
AutoNDA by SimpleDocs
Technology Use Policy. I hereby release Oakwood School, its personnel, and any institutions with which it is affiliated, from any and all claims and damages of any nature arising from my child’s use of, or inability to use, the Oakwood School computer network; including, but not limited to claims that may arise from the unauthorized use of the system to purchase products or services. I will instruct my child regarding the rules of use of the information technology systems contained in this document and I understand and agree that the agreements contained herein are incorporated into the contract under which my child is enrolled at Oakwood School. I understand that it is impossible for Oakwood School to restrict access to all controversial materials, and I will not hold the school responsible for materials accessed on the network. I also agree to report any misuse of the system that I become aware of to the school administration. I understand that misuse includes, but is not limited to, sending or seeking to receive messages that contain or suggest pornography, unethical or illegal solicitation, physical or sexual threats, racism, sexism, inappropriate language and information, the disclosure of which would violate another person’s right of privacy. I accept full responsibility for my child’s use of information technology. Parental Permission to allow their child access to the Oakwood School Computer Network I give permission to issue an email and network user account for my child and certify that my child and I have read and understand the information contained in this agreement and agree to abide by all rules set forth in this agreement.
Technology Use Policy. In accepting admission to Overlake I, on behalf of my student, accept the Overlake “Technology Use Policy” in its entirety. This policy is located on Overlake's website under Academic & Student Policies (xxxxx://xxx.xxxxxxxx.xxx/academics/technology/program).
Technology Use Policy. I have read the St. Xxxx Lutheran School Technology Usage Policy and have discussed it with my child(ren), and we agree to the Code of Conduct as outlined. I understand that my child’s privilege to use technology at SPLS can and will be revoked if he/she violates these rules. I give consent for SPLS teachers to use educational technology tools and resources with students as such tools would augment the learning process. Students will not be allowed access to technology at SPLS until this agreement is signed by a parent or legal guardian.
Technology Use Policy. Before working on technological devices, it is important that you understand the responsibility and standards of conduct necessary for its use. This includes: ● Respect for Property: taking care of school and personal possessions. ● Morally good conduct: showing a godly example. With regard to these standards a student must not at school: ● Use technological equipment (other than Chromebooks) without permission and without supervision of a CCA staff member. ● Initiate or visit accounts for private use or communication. This includes Yahoo, Skype, Facebook, etc… ● Access sites that the school would deem inappropriate (i.e. pornographic, unlawful, obscene, or otherwise objectionable material). ● Violate copyright or other intellectual property rights. ● Illegally store, use, distribute or copy software. ● Transmit threatening, obscene or offensive materials. ● Engage in electronic ‘stalking’, cyberbullying, or other forms of harassment, including abusive or aggressive language toward other students or staff. ● Gain unauthorized access to any computing, information or communication devices or resources, including, but not limited to, any machines accessible via the Internet. ● Damage, modify or destroy the files, data, passwords, devices or resources of CCA, other users or third parties. ● Conduct any activity or solicit the performance of any activity that is prohibited by law. ● Use the service to interfere with or disrupt other network users, services or equipment. ● Load, attempt to load or use any unauthorized discs, programs or files. ● Use the computer/internet for anything other than school assignments and projects. ● Send or receive email, send or respond to an instant message, or enter a chat room at any time while using school computers without direct approval and supervision from the teacher. ● Post personal contact information about yourself or others. This includes information such as: home address, telephone number, financial information, etc.
Technology Use Policy. The purpose of this policy is to establish guidelines to ensure the proper use of computer and telecommunication resources and services by volunteers and other authorized users. LAFLA provides workplace technology—computers, voicemail, e-mail, internet and videoconferencing access—for authorized users to support LAFLA’s mission and professional activities. All users have the responsibility to use computer and telecommunications resources and services in an efficient, ethical, and lawful manner, in accordance with the guidelines established under this policy. LAFLA expects users to develop competency in using the computer and telecommunications resources to maximize efficiency and minimize the demand on LAFLA’s Technical Services staff. Violations of this policy may result in disciplinary action up to and including suspension, termination and/or legal action.

Related to Technology Use Policy

  • Technology Access A. Contractor expressly acknowledges that state funds may not be expended in connection with the purchase of an automated information system unless that system meets certain statutory requirements relating to accessibility by persons with visual impairments. Accordingly, Contractor represents and warrants to System Agency that the technology provided to System Agency for purchase (if applicable under this Contract or any related Solicitation) is capable, either by virtue of features included within the technology or because it is readily adaptable by use with other technology, of:

  • Fair Use Policy Betty Blocks has a fair use policy in relation to accessing and using the Services. For the purpose of this fair use policy, Client may not vary from the average in a disproportionate manner, having regard to the amount of CPU power, data storage and data traffic used by Client. In such event, Betty Blocks is entitled to temporarily limit or restrict access to the Services and/or require that Client to purchase additional Services, such as extra storage capacity.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

Time is Money Join Law Insider Premium to draft better contracts faster.