Common use of Unacceptable Use Clause in Contracts

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities and online platforms by any member of the school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its pupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to ICT facilities Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering mechanisms This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other delegated member of SLT will use professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.

Appears in 2 contracts

Samples: benshamgrovenurseryschool.org, www.wingate-nur.durham.sch.uk

AutoNDA by SimpleDocs

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities and online platforms by any member of the school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its pupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to ICT facilities Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering mechanisms This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other delegated member of SLT will use professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.

Appears in 1 contract

Samples: static1.squarespace.com

Unacceptable Use. Includes but not limited to: ❖ Pornography (real life or cartoon) Pornography can be a felony offense and if so will be turned over to authorities. ➢ Possession ➢ Manufacturing – using a camera or creating pictures/movies ➢ Distributing – sending/sharing with others ❖ Images of Weapons ❖ Gang Related Files ❖ Bootleg movies or music ❖ Logging into a device/application using someone else’s login ❖ Cheating ❖ Using a device to plan a fight, cause harm or commit a crime ❖ Profanity directed to the faculty or staff ❖ Threats and/or cyber bullying ❖ Employing the network for commercial purposes, financial gain or fraud ❖ Attempting to access websites blocked by district policy including the use of proxy services, software or websites. The following use of keylogging devices/software is considered unacceptable prohibited. ❖ Violating copyright laws ❖ Bullying, harassing, insulting or attacking others Discipline Consequences will be as directed by the ACS Student Code of Conduct and the Schoolwide Positive Behavior Intervention Support Plan at the student’s home school. PARENT OR GUARDIAN (If the student is under the age of 18, a parent or guardian must also read and sign this agreement.) As the parent or guardian of this student, I have read this document and Alleghany County Public Schools Technology Policies (10000) posted on Alleghany County Website. I understand that the use of the school’s ICT facilities Internet and online platforms by any member technology resources is a standard part of the school communityinstructional process and is considered the same as using a textbook or any other resource to enhance or deliver instruction. Any breach of this policy Furthermore, I understand that my child may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its pupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data Gaining, or attempting to gainissued an email account, access to restricted areas of learning networks, and/or given access to other specific online content in order to support the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised instructional process as is age and/or grade level appropriate. I further understand that access to the school’s ICT facilities Causing intentional damage Internet and the use of school owned technology resources are intended for educational purposes only. I also recognize that even though Alleghany County Public Schools uses appropriate Internet filtering software, it is impossible to ICT facilities Removingrestrict access to all inappropriate materials, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is and I will not supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to hold the school Using websites system responsible if my child accesses or mechanisms to bypass the school’s filtering mechanisms This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other delegated member of SLT will use professional judgement to determine whether any act or behaviour not acquires such materials on the list above is considered unacceptable network. I accept responsibility for my child’s compliance with the Acceptable Use Policy. I give my consent for school district personnel to monitor my child’s school issued email account as well as my child’s internet activity on school owned computers and the school network. I have read to my child (or they have read), and understand, and will abide by the Alleghany County Public Schools Student Internet Safety and Acceptable Use of Technology Resources Policy (10100/10200/10226). Students understand that should they commit any violation of this policy, their access privileges may be revoked, and school disciplinary action and/or legal action may be taken. Students further understand that they will be issued an email account and/or other online tools, that they should use of the school’s ICT facilities.them appropriately and in accordance with Policy (10100/10226). Parent Signature: Date: / /

Appears in 1 contract

Samples: Handbook and Agreement

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities and online platforms by any member of the school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its pupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to ICT facilities Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering mechanisms This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other delegated member of SLT Head teacher will use professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.

Appears in 1 contract

Samples: www.plympton-st-maurice-primary.org.uk

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities and online platforms by any member of the school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its pupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to ICT facilities Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering mechanisms This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other delegated member of SLT designated Data Protection Officer and the DSL will use professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.

Appears in 1 contract

Samples: lancastersteinerschool.org

Unacceptable Use. Includes but not limited to: ❖ Pornography (real life or cartoon) Pornography can be a felony offense and if so will be turned over to authorities. ➢ Possession ➢ Manufacturing – using a camera or creating pictures/movies ➢ Distributing – sending/sharing with others ❖ Images of Weapons ❖ Gang Related Files ❖ Bootleg movies or music ❖ Logging into a device/application using someone else’s login ❖ Cheating ❖ Using a device to plan a fight, cause harm or commit a crime ❖ Profanity directed to the faculty or staff ❖ Threats and/or cyberbullying ❖ Employing the network for commercial purposes, financial gain or fraud ❖ Attempting to access websites blocked by district policy including the use of proxy services, software or websites. The following use of keylogging devices/software is considered unacceptable prohibited. ❖ Violating copyright laws ❖ Bullying, harassing, insulting, or attacking others Discipline Consequences will be as directed by the ACS Student Code of Conduct and the Schoolwide Positive Behavior Intervention Support Plan at the student’s home school. PARENT OR GUARDIAN (If the student is under the age of 18, a parent or guardian must also read and sign this agreement.) As the parent or guardian of this student, I have read this document and Alleghany County Public Schools Technology Policies (10000) posted on the Alleghany County Website. I understand that the use of the school’s ICT facilities Internet and online platforms by any member technology resources is a standard part of the school communityinstructional process and is considered the same as using a textbook or any other resource to enhance or deliver instruction. Any breach of this policy Furthermore, I understand that my child may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its pupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data Gaining, or attempting to gainissued an email account, access to restricted areas of learning networks, and/or given access to other specific online content in order to support the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised instructional process as is age and/or grade level appropriate. I further understand that access to the Internet and the use of school’s ICT facilities Causing intentional damage -owned technology resources are intended for educational purposes only. I also recognize that even though Alleghany County Public Schools uses appropriate Internet filtering software, it is impossible to ICT facilities Removingrestrict access to all inappropriate materials, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is and I will not supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to hold the school Using websites system responsible if my child accesses or mechanisms to bypass the school’s filtering mechanisms This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other delegated member of SLT will use professional judgement to determine whether any act or behaviour not acquires such materials on the list above is considered unacceptable network. I accept responsibility for my child’s compliance with the Acceptable Use Policy. I give my consent for school district personnel to monitor my child’s school-issued email account as well as my child’s internet activity on school-owned computers and the school network. I have read to my child (or they have read), and understand, and will abide by the Alleghany County Public Schools Student Internet Safety and Acceptable Use of Technology Resources Policy (10100/10200/10226). Students understand that should they commit any violation of this policy, their access privileges may be revoked, and school disciplinary action and/or legal action may be taken. Students further understand that they will be issued an email account and/or other online tools, that they should use of the school’s ICT facilities.them appropriately and in accordance with Policy (10100/10226). Parent Signature: Date: / /

Appears in 1 contract

Samples: Handbook and Agreement

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities and online platforms by any member of the school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its pupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to ICT facilities Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering mechanisms This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other delegated member of SLT Headteacher will use professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.

Appears in 1 contract

Samples: greatstoneschool.co.uk

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities and online platforms by any member of the school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its pupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-password- protected information, without approval from authorised personnel Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to ICT facilities Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering mechanisms This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other delegated member of SLT Headteacher will use professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.

Appears in 1 contract

Samples: ashleyjuniorschool.co.uk

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities and online platforms by any member of the school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its pupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-password- protected information, without approval from authorised personnel Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to ICT facilities Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering mechanisms This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher Headteacher or other delegated member of SLT Deputy Head will use professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.

Appears in 1 contract

Samples: www.aaps.uk.com

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities and online platforms by any member of the school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its pupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to ICT facilities Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering mechanisms This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other delegated member Head of SLT School will use professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.

Appears in 1 contract

Samples: eslingtonfurrowfield.org

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities and online platforms by any member of the school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its pupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to ICT facilities Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering mechanisms This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher Senior Leadership Team (SLT) or any other delegated relevant member of SLT staff will use professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.

Appears in 1 contract

Samples: theblueschool.com

AutoNDA by SimpleDocs

Unacceptable Use. The following Any attempt to circumvent or bypass the web filter is considered unacceptable use a major offense. Internet usage on the iPad is not monitored while students are away from the school network, and Xxxxx takes no responsibility for content accessed by the students. Parents should monitor student activities as they feel necessary while at home. Student Activities Strictly Prohibited includes but is not limited to:  Illegal installation, appropriation, or transmission of copyrighted materials  Any action that violates existing Seton policies, Seton student handbook, or public law  Sending, accessing, uploading, downloading, or distributing offensive or embarrassing, profane, threatening, pornographic, obscene, or sexually explicit materials or those that can be interpreted as harassing or demeaning  Using the iPad camera, video, FaceTime or other apps in any way that is offensive, profane, threatening, pornographic, obscene, sexually explicit or damaging to another person  Use of chat rooms, sites selling term papers, book reports and other forms of student work  Taking pictures of other student’s work unless working on a group project  Use of bit torrents or illegal file sharing sites  Any form of jail breaking, rooting or in any other way tampering with the iPad’s iOS operating system  Changing iPad settings (exceptions include personal settings such as font size, brightness, etc.)  Spamming, sending mass or inappropriate emails  Gaining access to other student’s accounts, files, and/or data  Use of the school’s ICT facilities Internet, network or email accounts for financial or commercial gain or for any illegal activity  Use of any form of anonymous and/or false communications  Participation in credit card fraud, electronic forgery or other forms of illegal behavior  Vandalism (any malicious attempt to harm or destroy hardware, software, or data, including but not limited to the uploading or creation of computer viruses or computer programs that can infiltrate computer systems and/or damage software components) of school equipment  Bypassing the school’s web filter through a proxy server  Using another student’s iPad  The iPad may not be used to take pictures, videos or record sounds of other students, guests or school personnel without their express consent. Legal Propriety/Copyright All students must comply with trademark and online platforms by any member copyright laws and all license agreements. Ignorance of the law is not immunity. If you are unsure, ask a teacher or parent. Plagiarism is a violation of Seton's handbook. Give credit to all sources used, whether quoted or summarized. This includes all forms of media on the Internet, such as graphics, movies, music, and text. Use or possession of hacking software is strictly prohibited. Violation of applicable state or federal law will result in criminal prosecution and/or disciplinary action. Policy Violations and Disciplinary Consequences Misuse of school communityiPads will result in confiscation and search of the iPad. Any breach If violations of this policy the technology agreement are found on the iPad, it will be restored to the school default settings resulting in the loss of all installed media and any school assignments/class work that was not backed up. Students will be held accountable by their teachers for assignments that are not complete because their iPad was restored due to misuse. Additional disciplinary action and or loss of privileges/features may be taken by the school depending on the severity of the infraction including: detention, daily check-in/checkout of iPads from the technology teacher, iPad privilege suspension and termination of privileges. Violations may result in disciplinary or behaviour proceedings (see section 4.2 below)action up to and including expulsion for students. Unacceptable use When applicable, law enforcement agencies may be involved. The school principal/pastor will be the sole arbiters of interpretation, violation and penalization of every aspect of the school’s ICT facilities includes: Using Technology Policy. Loss of School Property Students are responsible for the school’s ICT facilities loss of computer devices, including iPads that are assigned to breach intellectual property rights or copyright Using them. The student will be responsible for the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its pupils, or other members replacement cost of the school community Connecting any device if it is not found within 2 weeks. Any missing or stolen equipment must immediately be reported to the principal and if appropriate, the nearest law enforcement agency. Every effort will be made to locate and recover the missing device.  Procedures for Reporting Theft Outside the School  Report immediately to the law enforcement jurisdiction where the loss/theft occurred and file a report.  Request a copy of the report to give to the school’s ICT network without approval from authorised personnel Setting up any software.  Procedures for Reporting Theft Inside the School  Report immediately to the office.  Retrace all steps taken since the loss of the equipment. Check with teachers friends, applications or web services on etc.  Follow the above procedures for reporting outside the school’s network without approval by authorised personnel. Malfunctioning iPads must be reported immediately to the technology teacher so that the device can be repaired or replaced. Unattended iPads – iPads are not to be left unattended and should be secured in a locker when not in use. iPad Check out Procedure Criteria for checking out an iPad:  A completed, or creating or using any programsigned copy of this agreement. (Only the last page is needed)  A completed, tool or item of software designed to interfere with the functioning signed copy of the ICT facilitiesACCEPTABLE USE and INTERNET SAFETY POLICY. (Only the last 2 pages are needed)  Insurance for the iPad must be purchased through Seton School. It is encouraged that you create an iTunes account prior to picking up the iPad. Instructions for creating an iTunes account are listed under the “User Accounts” portion of this policy. Once the equipment has been checked out, accounts or data Gaining, or attempting to gain, access to restricted areas it is in the full possession and responsibility of the networkstudent. The assigned iPad will include:  iPad  Charger  Protective Case  Apps iPad Return/Buy Out Procedure All items that were checked out to the student when the iPad was assigned must be returned when the student graduates, transfers out or when the school upgrades students to any passworda newer iPad. Alternatively the student and parent will be given the option to purchase the iPad for personal non-protected informationschool use. The price for the purchase of the iPad will be the market value of the iPad, without approval from authorised personnel Allowingapps and protective case at the time the iPad is to be returned. If you decide that you do not want to purchase the iPad, encouraging, the student and or enabling others to gain (or attempt to gain) unauthorised access parent can return the iPad to the school’s ICT facilities Causing intentional damage . When the iPad and accessories are returned, they will be inspected for damages. Damages outside of normal wear and tear must be paid for by the student or parent at the time of return. If you do not return the iPad or make arrangements for return it is assumed you want to ICT facilities Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to purchase the school Using websites or mechanisms to bypass iPad and you will be billed the school’s filtering mechanisms This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other delegated member of SLT will use professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use market value of the school’s ICT facilitiesiPad.

Appears in 1 contract

Samples: www.seton-school.com

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities and online platforms by any member of the school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its pupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to ICT facilities Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering mechanisms This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other delegated member of SLT will use professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.

Appears in 1 contract

Samples: Acceptable Usage

Unacceptable Use. Includes but not limited to: ❖ Pornography (real-life or cartoon) Pornography can be a felony offense and if so will be turned over to authorities. ➢ Possession ➢ Manufacturing – using a camera or creating pictures/movies ➢ Distributing – sending/sharing with others ❖ Images of Weapons ❖ Gang Related Files ❖ Bootleg movies or music ❖ Logging into a device/application using someone else’s login ❖ Cheating ❖ Using a device to plan a fight, cause harm or commit a crime ❖ Profanity directed to the faculty or staff ❖ Threats and/or cyberbullying ❖ Employing the network for commercial purposes, financial gain or fraud ❖ Attempting to access websites blocked by district policy including the use of proxy services, software, or websites. The following use of keylogging devices/software is considered unacceptable prohibited. ❖ Violating copyright laws ❖ Bullying, harassing, insulting or attacking others Discipline Consequences will be as directed by the ACS Student Code of Conduct and the School-Wide Positive Behavior Intervention Support Plan at the student’s home school. PARENT OR GUARDIAN (If the student is under the age of 18, a parent or guardian must also read and sign this agreement.) As the parent or guardian of this student, I have read this document and Alleghany County Public Schools Technology Policies (10000) posted on Alleghany County Website. I understand that the use of the school’s ICT facilities Internet and online platforms by any member technology resources is a standard part of the school communityinstructional process and is considered the same as using a textbook or any other resource to enhance or deliver instruction. Any breach of this policy Furthermore, I understand that my child may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its pupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data Gaining, or attempting to gainissued an email account, access to restricted areas of learning networks, and/or given access to other specific online content in order to support the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised instructional process as is age and/or grade level appropriate. I further understand that access to the school’s ICT facilities Causing intentional damage Internet and the use of school owned technology resources are intended for educational purposes only. I also recognize that even though Alleghany County Public Schools uses appropriate Internet filtering software, it is impossible to ICT facilities Removingrestrict access to all inappropriate materials, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is and I will not supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to hold the school Using websites system responsible if my child accesses or mechanisms to bypass the school’s filtering mechanisms This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other delegated member of SLT will use professional judgement to determine whether any act or behaviour not acquires such materials on the list above is considered unacceptable network. I accept responsibility for my child’s compliance with the Acceptable Use Policy. I give my consent for school district personnel to monitor my child’s school issued email account as well as my child’s internet activity on school owned computers and the school network. I have read to my child (or they have read), and understand, and will abide by the Alleghany County Public Schools Student Internet Safety and Acceptable Use of Technology Resources Policy (10100/10200/10226). Students understand that should they commit any violation of this policy, their access privileges may be revoked, and school disciplinary action and/or legal action may be taken. Students further understand that they will be issued an email account and/or other online tools, that they should use of the school’s ICT facilities.them appropriately and in accordance with Policy (10100/10226). Parent Signature: Date: / /

Appears in 1 contract

Samples: Handbook and Agreement

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities and online platforms by any member of the school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its pupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to ICT facilities Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering mechanisms This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other delegated member of SLT Head Master will use professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.

Appears in 1 contract

Samples: mougins-school.com

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities and online platforms by any member of the school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its pupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to ICT facilities Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering mechanisms This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher Headteacher or any other delegated relevant member of SLT staff will use professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.

Appears in 1 contract

Samples: s3-eu-west-1.amazonaws.com

Unacceptable Use. The following conduct is considered unacceptable use not permitted under any circumstances whether using the School network or IT Services or not (for example personal devices), and whether on school premises or at school activities (for example on excursions):  Cyber Bullying  Posting personal information (including photographs) about another person without that person’s consent  Engaging in abusive behavior, discrimination or harassment of the school’s ICT facilities and online platforms by any member of the school community. Any breach of this policy may result in disciplinary kind  Using email or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities Social Media to breach intellectual property rights embarrass or copyright Using the school’s ICT facilities to bully or harass someone elsedefame any person, or to promote unlawful discrimination Breaching the school’s policies spread rumours, including by posting comments or procedures Any illegal conductphotographs  Allowing someone else to use your account, or statements which are deemed sharing your login information  Using an account owned by another user  Gaining unauthorised access to be advocating illegal activity resources or secure files  Accessing, creatingdownloading, storingsending or storing lewd or distasteful material, linking including (without limitation) material of a violent, racist, sexist or pornographic nature, or material containing sex or nudity, offensive language or demonstrations of drug use  Attempting to or sending material access content that is pornographicnot appropriate, offensiveincluding (without limitation) gambling, obscene extremism, weapons  Engaging in activities which disrupt or otherwise inappropriate Activity which defames or disparages damage the schoolcomputer system, or risks bringing the school into disrepute Sharing confidential information about the schoolmay be likely to do so. This includes gaining access to "hacking" sites, its pupils, possessing "hacking" software or other members of the school community Connecting any device downloading (or attempting to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using download) any program, tool software or item of software designed to interfere with the functioning of the ICT facilities, accounts file from an unsecure or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, unknown source without prior approval from authorised personnel Allowingthe school  Posting viral email, encouragingsending insulting or threatening messages, promoting money-making schemes, including indicating that negative things will happen to a recipient if they do not forward an email or enabling photo.  Recording audio or video of a teacher or fellow student without prior consent. Academic dishonesty Plagiarism is using the ideas or words of others to gain (and claiming them as your own. In Judaism, this is called Genivat Deat - stealing someone else's ideas. Deliberate plagiarism, including copying another student’s work or attempt to gain) unauthorised access to copying and pasting from the school’s ICT facilities Causing intentional damage to ICT facilities RemovingInternet, deleting or disposing of ICT equipmentis an offence and is against the law. All statements, systemsopinions, programs or information without permission by authorised personnel Causing a data breach by accessingconclusions etc. taken from another writer's work should be cited, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business whether the work is directly related to quoted, paraphrased or summarised. Whenever the school Using websites words or mechanisms to bypass ideas of another person are used, the school’s filtering mechanisms This is not an exhaustive listsource must be acknowledged. Information from the Internet must be referenced, like any other source. As plagiarism contravenes basic Jewish and School ethical standards, significant consequences will be forthcoming for any student who does plagiarise. Privacy and Surveillance The school School reserves the right to amend this list at access and monitor email, websites, server logs and electronic files and any time. The headteacher computer or other delegated member of SLT will use professional judgement electronic device connected to the KDS network should it determine whether any act or behaviour not on the list above that there is considered unacceptable use of the school’s ICT facilitiesreason to do so.

Appears in 1 contract

Samples: media.edufolios.org

Time is Money Join Law Insider Premium to draft better contracts faster.