Unacceptable Use Sample Clauses

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities and online platforms by any member of the school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its pupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to ICT facilities Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering mechanisms This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other delegated member of SLT will use professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.
AutoNDA by SimpleDocs
Unacceptable Use. I am aware that the school monitors the pupil’s activity on this device. I agree that my child will not carry out any activity that constitutes ‘unacceptable use’. This includes, but is not limited to the following: • Using ICT or the internet to bully or harass someone else, or to promote unlawful discrimination • Any illegal conduct, or statements which are deemed to be advocating illegal activity • Activity which defames or disparages the school, or risks bringing the school into disrepute • Causing intentional damage to ICT facilities or materials • Using inappropriate or offensive language I accept that the school will sanction the pupil, in line with our Behaviour Policy, if the pupil engages in any of the above at any time.
Unacceptable Use. Examples of activities which are NOT PERMITTED include (but are not limited to):
Unacceptable Use. Unacceptable uses of technologies and the Internet include, but are not limited to: • Causing harm to others or damage to their property. • In the opinion of the Administration, producing and/or uploading content/videos/images, either through the use of the District network or from home computers, which seriously results in the disruption of the educational process or day-to-day operations of the school. In these cases, students will be asked to remove the content and may be subject to discipline. • Use for personal gain, unauthorized fundraising, commercial solicitation and compensation of any kind. • Activities incurring liability or cost by the District. The District will not be responsible for unauthorized financial obligations resulting from the use, or access to, Greenwich Public School’s network or the Internet. • Downloading, installing other unauthorized applications (including shareware or freeware) without permission or approval from a District representative. • Support or opposition for ballot measures, candidates and any other political activity, ,excluding specific activities supporting school-related projects. • Hacking, cracking, vandalizing, the introduction of viruses, worms, Trojan horses, time bombs and changes to hardware, software and monitoring tools. • Uses that jeopardize the security of student or staff access and of the computer network or other networks on the Internet, for example, disclosing or sharing your password with others or impersonating another user. • Unauthorized access to other district computers, networks and information systems. • Using another’s password or some other user identifier that misleads message recipients into believing that someone other than you is communicating or otherwise using his/her access to the network or the Internet. • Xxxxxxxxxxxxx, hate mail, defamation, harassment of any kind, discriminatory jokes and remarks. • The sending, sharing, viewing or possessing pictures, emails or other material of a sexual nature in electronic or any other form on a cell phone or other electronic device is prohibited in the school setting. • Information posted, sent or stored online that could endanger others (e.g., bomb construction, drug manufacturing). • Accessing, uploading, downloading, storage and/or distribution of obscene, pornographic or sexually explicit material. • Attaching unauthorized equipment to the network. Any such equipment will be confiscated. • Participating in blogs, wikis, bulletin boar...
Unacceptable Use. The user is responsible for the user's actions and activities involving the network. Some examples of unacceptable uses are given below. The list is not intended to be exhaustive. The Administration may periodically revise the concepts of acceptable and unacceptable use. These revisions will become part of this document.
Unacceptable Use. Using the guiding statement ofeducational purpose,” some specific examples of prohibited use are shown below. However, this policy does not attempt to demonstrate all unacceptable behaviors. Behaviors considered unacceptable may result in termination of Internet access and/or the general use of electronic resources provided by GLCS. Depending upon the severity of a user's inappropriate action(s), disciplinary action up to and including student expulsion may occur. The following examples are considered unacceptable: ➢ Sharing of Usernames and Passwords is not allowed. ➢ Providing personal information such as Name, Address, Phone Number or Gender is not safe and not allowed. ➢ Purchasing or selling of products and services by students is not allowed. ➢ Hiding or falsifying your identity is not acceptable. ➢ Bullying, harassing, intimidating, threatening or offensive language is not to be used. Electronic communications will not contain profanity, obscene comments, sexually explicit material, or expressions of bigotry, racism, or hatred. ➢ Plagiarism and copyright infringement are prohibited. Ideas or writings of others are not to be used without the permission of the author. ➢ Gaining unlawful access to another person’s resources or organizational resources as well as knowingly circumventing or trying to circumvent security measures is not allowed. ➢ Making malicious attempts to harm or destroy data of any person or GLCS resource is unlawful and not allowed.
AutoNDA by SimpleDocs
Unacceptable Use. 5.4.1 Illegality in any form, including but not limited to activities such as unauthorized distribution or copying of copyrighted material, violation of export restrictions, harassment, fraud, trafficking in obscene material, child sexual abuse imagery, drug dealing, and other illegal activities. Initial
Unacceptable Use. The user is responsible for all his/her actions and activities involving the network. Examples of prohibited conduct include but are not limited to the following: ❑ Using the network for any illegal activity, including violation of copyright or other contracts or transmitting any material in violation of U.S. and State regulations. ❑ Copying or downloading copyrighted material on any system connected to the school system's hardware/software without the owner's permission. Only the owner(s) or individuals specifically authorized by the owner(s) may copy or download copyrighted material to the system. School purchased software may not be copied for personal use. ❑ Students will not use district computers and laptops to copy or download copyrighted software, music or images, or for other violation of copyright laws. Peer-to-peer, file-sharing, torrent software may not be installed on a school system computer or laptop. ❑ Copying, printing or downloading copyrighted material for the users own use without the owner's permission. Users may redistribute copyrighted programs only with the owner’s permission. Such permission must be specified in the document or must be obtained directly from the owner in accordance with applicable copyright laws, Board policy and administrative procedures. This includes the district contracted photographer. ❑ Product advertisement or political lobbying is prohibited. ❑ Vandalism. Vandalism is defined as any malicious attempt to harm or destroy data of another user, the network or the Internet. This includes, but is not limited to, creating and/or uploading or downloading viruses, disconnect or disassemble any network or computer component. ❑ Using or attempting to use the network while privileges are suspended or revoked. ❑ Using the computer of a teacher, administrator, or other staff member without permission or supervision. ❑ Use of technology resources in such a way that you would disrupt other users (sounds and/or excessive bandwidth usage, e.g., radio/audio streaming, video streaming). ❑ Provide another student with user account information or passwords ❑ Unauthorized interception of electronic communications and other wiretapping, including electronic mail (The Electronic Communications Privacy Act 18 USC 2701-2709) ❑ Accessing, monitoring, and use of personal websites. ❑ Accessing, monitoring, and use of personal networks. ❑ Bypassing the firewall and bypass and attempt to circumvent network security, virus protection, netw...
Unacceptable Use. 5.4a the following are specifically prohibited for all DaVinci community members (unless otherwise exempted by the IT Director). The prohibition applies to DASA community members using either the DaVinci network, wireless services, computers, printers, fax machines, websites, technologies of any kind or other devices (including cell phones) or off-site networks while the member is acting as an associate of the DaVinci community, whether inside the school or out.
Time is Money Join Law Insider Premium to draft better contracts faster.