Common use of Unacceptable Use Clause in Contracts

Unacceptable Use. 2.1 The school reserves the right to block, disconnect or otherwise prevent what it considers to be unacceptable use of its IT Facilities. Unacceptable use includes, but is not limited to: 2.1.1 All actions or activities that are illegal or in conflict with the School’s policies, procedures, processes and regulations or which breach contracts or policies applied to the School by third party through a valid service contract or agreement. 2.1.2 Using the IT Facilities for access, creation, modification, storage, download, hosting or transmission of material that could be considered pornographic, offensive, obscene, or otherwise inappropriate, or for placing direct or indirect links to websites which publish or host pornographic, offensive or inappropriate material. 2.1.3 Publishing materials or making statements which the school may deem to be advocating illegal activity, or threatening, or harassing, or defamatory, or bullying or disparaging of others, or abusive, or libellous, or slanderous, or indecent, or obscene, or offensive or promotes unlawful discrimination, breaches copyright or otherwise causing annoyance, or inconvenience. 2.1.4 Unauthorised production, distribution, copying, selling, hiring, performing of copyrighted material including, but not limited to, digitisation and distribution of computer software, television, radio, streaming services, websites, photographs, magazines, books, music or any copyrighted sources and installation of any copyrighted software for which the School does not have an active licence or explicit permission of the copyright owner, is strictly prohibited. 2.1.5 Authoring or sending any form of electronic communications or messages, including, but not limited to, messages and emails that were unsolicited and may be considered junk mail, "chain letters", hoax warnings or advertising, and that do not correctly identify you as the sender, or messages which appear to originate from another person. 2.1.6 Unauthorised transmission, distribution, discussion or disclosure of information gained through a user’s presence within the School or through the use of IT Facilities. 2.1.7 Connecting any non-approved IT device, system or service (including wireless access points) to school networks or setting up any network services, without the explicit or delegated permission from Authorised Personnel. 2.1.8 Unauthorised access (or attempted unauthorised access) to any IT Facilities provided by the School. 2.1.9 Allowing, inciting, encouraging or enabling others to gain or attempt to gain unauthorised access to the IT Facilities. 2.1.10 Causing any damage to IT Facilities, including through the consumption of food or drink, or moving or removing such facilities without authorisation. The School reserves the right to charge for any damage caused. 2.1.11 Attempting to modify, alter or in any way interfere with IT facility security controls, hardware or software, configurations, settings, equipment, data files or websites without the written authorisation or delegated permission from Authorised Personnel. 2.1.12 Introduction of unauthorised and/or malicious software or programs into the IT Facilities, including, but not limited to: unlicensed software, viruses, worms, Trojan horses or logic bombs; by downloading, creating or using any program, tool or item of software designed to monitor damage, disrupt or interfere with the functioning of IT Facilities, user accounts or data. 2.1.13 Effecting security breaches or disruptions of network communication, including, but not limited to, accessing or modifying data (or data headers) of which the user is not an intended recipient or logging into an IT system or service, or account, that the user is not expressly authorised to access. Disruption includes, but is not limited to, network sniffing, pinged floods, packet spoofing, denial of service, and forged routing information. 2.1.14 Executing any form of network monitoring including any data capture, port scanning or security scanning without written authorisation or delegated permission from Authorised Personnel. 2.1.15 Registering for any system or service, including, but not limited to, social media accounts, web applications, domain names, which includes the name of the school or any similar name, or abbreviation that may mislead the public into believing that the domain name refers to the school. 2.1.16 Acting in any way that directly or indirectly causes disruption to others’ use of School IT Facilities, or using IT Facilities to disrupt or deny the use of IT Facilities of third parties at any time. I understand that I must use Xxxxxxxxx Woodville School systems in a responsible way, to ensure that there is no risk to my safety or to the safety and security of the systems and other users.

Appears in 1 contract

Sources: It Acceptable Use Policy and Agreement

Unacceptable Use. 2.1 4.1 The school Trust reserves the right to block, disconnect or otherwise prevent what it considers to be unacceptable use of its IT FacilitiesICT facilities. Unacceptable use includes, but is not limited to: 2.1.1 : - All actions or activities that are illegal or in conflict with the SchoolTrust’s policies, procedures, processes procedures and regulations or which breach contracts or policies applied to the School by third party through a valid service contract or agreement. 2.1.2 processes; - Using the IT Facilities ICT facilities for access, creation, modification, storage, download, hosting or transmission of material that could be considered pornographic, offensive, obscene, or otherwise inappropriate, or for placing direct or indirect links to websites which publish or host pornographic, offensive or inappropriate material. 2.1.3 ; - Publishing materials or making statements which the school Trust may deem to be advocating illegal activity, or threatening, or harassing, or defamatory, or bullying or disparaging of others, or abusive, or libellous, or slanderous, or indecent, or obscene, or offensive or promotes unlawful discrimination, breaches copyright or otherwise causing annoyance, or inconvenience. 2.1.4 ; - Unauthorised production, distribution, copying, selling, hiring, performing of copyrighted material including, but not limited to, digitisation and distribution of computer software, television, radio, streaming services, websites, photographs, magazines, books, music or any copyrighted sources and installation of any copyrighted software for which the School Trust does not have an active licence or explicit permission of the copyright owner, is strictly prohibited. 2.1.5 ; - Authoring or sending any form of electronic communications or messages, including, but not limited to, messages and emails that were unsolicited and may be considered junk mail, "chain letters", "Ponzi", hoax warnings or advertising, and that do not correctly identify you as the sender, or messages which appear to originate from another person. 2.1.6 ; - Unauthorised transmission, distribution, discussion or disclosure of information gained through a user’s presence within the School Trust or through the use of IT Facilities. 2.1.7 ICT facilities; - Connecting any non-approved IT ICT device, system or service (including wireless access points) to school Trust networks or setting up any network services, without the explicit or delegated permission from Authorised Personnel. 2.1.8 ; - Unauthorised access (or attempted unauthorised access) to any IT Facilities ICT facilities provided by the School. 2.1.9 Trust; - Allowing, inciting, encouraging or enabling others to gain or attempt to gain unauthorised access to the IT Facilities. 2.1.10 ICT facilities; - Causing any damage to IT FacilitiesICT facilities, including through the consumption of food or drink, or moving or removing such facilities without authorisation. The School Trust reserves the right to charge for any damage caused. 2.1.11 ; - Attempting to modify, alter or in any way interfere with IT ICT facility security controls, hardware or software, configurations, settings, equipment, data files or websites without the written authorisation or delegated permission from Authorised Personnel. 2.1.12 ; - Introduction of unauthorised and/or malicious software or programs into the IT FacilitiesICT facilities, including, but not limited to: unlicensed software, viruses, worms, Trojan horses or logic bombs; by downloading, creating or using any program, tool or item of software designed to monitor damage, disrupt or interfere with the functioning of IT FacilitiesICT facilities, user accounts or data. 2.1.13 ; - Effecting security breaches or disruptions of network communication, including, but not limited to, accessing or modifying data (or data headers) of which the user is not an intended recipient or logging into an IT ICT system or service, or account, that the user is not expressly authorised to access. Disruption includes, but is not limited to, network sniffing, pinged floods, packet spoofing, denial of service, and forged routing information. 2.1.14 ; - Executing any form of network monitoring including any data capture, port scanning or security scanning without written authorisation or delegated permission from Authorised Personnel. 2.1.15 ; - Registering for any system or service, including, but not limited to, social media accounts, web applications, domain names, which includes the name of the school Trust or any similar name, or abbreviation that may mislead the public into believing that the domain name refers to the school. 2.1.16 Trust; and - Acting in any way that directly or indirectly causes disruption to others’ use of School IT FacilitiesTrust facilities, or using IT Facilities ICT facilities to disrupt or deny the use of IT Facilities ICT facilities of third parties at any time. I understand that I must use Xxxxxxxxx Woodville School systems in a responsible way, to ensure that there is no risk to my safety or to the safety and security of the systems and other users.

Appears in 1 contract

Sources: Acceptable Use Policy

Unacceptable Use. 2.1 The school reserves the right to block, disconnect or otherwise prevent what it considers to be unacceptable use of its IT Facilities. Unacceptable use includes, but is not limited to: 2.1.1 All actions or activities that are illegal or in conflict with the School’s policies, procedures, processes and regulations or which breach contracts or policies applied to the School by third party through a valid service contract or agreement. 2.1.2 Using the IT Facilities for access, creation, modification, storage, download, hosting or transmission of material that could be considered pornographic, offensive, obscene, or otherwise inappropriate, or for placing direct or indirect links to websites which publish or host pornographic, offensive or inappropriate material. 2.1.3 Publishing materials or making statements which the school may deem to be advocating illegal activity, or threatening, or harassing, or defamatory, or bullying or disparaging of others, or abusive, or libellouslibelous, or slanderous, or indecent, or obscene, or offensive or promotes unlawful discrimination, breaches copyright or otherwise causing annoyance, or inconvenience. 2.1.4 Unauthorised production, distribution, copying, selling, hiring, performing of copyrighted material including, but not limited to, digitisation and distribution of computer software, television, radio, streaming services, websites, photographs, magazines, books, music or any copyrighted sources and installation of any copyrighted software for which the School does not have an active licence license or explicit permission of the copyright owner, is strictly prohibited. 2.1.5 Authoring or sending any form of electronic communications or messages, including, but not limited to, messages and emails that were unsolicited and may be considered junk mail, "chain letters", hoax warnings or advertising, and that do not correctly identify you as the sender, or messages which appear to originate from another person. 2.1.6 Unauthorised transmission, distribution, discussion or disclosure of information gained through a user’s presence within the School or through the use of IT Facilities. 2.1.7 Connecting any non-approved IT device, system or service (including wireless access points) to school networks or setting up any network services, without the explicit or delegated permission from Authorised Personnel. 2.1.8 Unauthorised access (or attempted unauthorised access) to any IT Facilities provided by the School. 2.1.9 Allowing, inciting, encouraging or enabling others to gain or attempt to gain unauthorised access to the IT Facilities. 2.1.10 Causing any damage to IT Facilities, including through the consumption of food or drink, or moving or removing such facilities without authorisation. The School reserves the right to charge for any damage caused. 2.1.11 Attempting to modify, alter or in any way interfere with IT facility security controls, hardware or software, configurations, settings, equipment, data files or websites without the written authorisation or delegated permission from Authorised Personnel. 2.1.12 Introduction of unauthorised and/or malicious software or programs into the IT Facilities, including, but not limited to: unlicensed software, viruses, worms, Trojan horses or logic bombs; by downloading, creating or using any program, tool or item of software designed to monitor damage, disrupt or interfere with the functioning of IT Facilities, user accounts or data. 2.1.13 Effecting security breaches or disruptions of network communication, including, but not limited to, accessing or modifying data (or data headers) of which the user is not an intended recipient or logging into an IT system or service, or account, that the user is not expressly authorised to access. Disruption includes, but is not limited to, network sniffing, pinged floods, packet spoofing, denial of service, and forged routing information. 2.1.14 Executing any form of network monitoring including any data capture, port scanning or security scanning without written authorisation or delegated permission from Authorised Personnel. 2.1.15 Registering for any system or service, including, but not limited to, social media accounts, web applications, domain names, which includes the name of the school or any similar name, or abbreviation that may mislead the public into believing that the domain name refers to the school. 2.1.16 Acting in any way that directly or indirectly causes disruption to others’ use of School IT Facilities, Facilities or using IT Facilities to disrupt or deny the use of IT Facilities of third parties at any time. I understand that I must use Xxxxxxxxx Woodville School systems in a responsible way, to ensure that there is no risk to my safety or to the safety and security of the systems and other users. • I understand thatthe School systemsand devices are primarily intended foreducational use and that I will not use them for personal or recreational use unless I have prior permission; • I understand that the School may monitor my use of the devices, systems, services and communications at any time; • I will keep my username and password safe and secure – I will not share it, nor will I try to use any other person’s username and password. I understand that I should not write down or store a password where it is possible that someone may steal it; • I will not disclose or share personal information about others when on-line (this could include names, addresses, email addresses, telephone numbers, age, gender, educational details, financial details etc.…); • I willimmediately report any unpleasant or inappropriate materialor messages oranything that makes me feel uncomfortable when I see it on-line; • I will not open any hyperlinks in emails or any attachments to emails, unless I know and trust the person/organisation who sent the email, or if I have any concerns about the validity of the email (due to the risk of the attachment containing viruses or other harmful programs); • I will respect others’ work and property and will not access, copy, remove or otherwise use or alter anyotheruser’s files, withouttheowner’sknowledge and permission, and Iwill ensure that anyuse is in accordance with school policies; • I understand there are risks when using the systems and services, and will not try to upload, download or access any materials which are illegal or inappropriate or may cause harm or distress to others, nor will I try to use any programs or software that might allow me to bypass the filtering/security systems in place to prevent access to such materials; • I will be polite and responsible when I communicate with others, I will not use strong, aggressive or inappropriate language and I appreciate that others may have different opinions; • I will respect copyright of materials and intellectual property rights and not take or distribute text, images or other materials without permission; • I will not use or modify any of the School devices, systems and services in any way that willdisrupt their use for others in any way; • I will not install or attempt to install or store programmes of any typeon any School device,nor will I try to alter computer settings; • I understand that I am not permitted to attempt to connect any devices or systems (e.g. laptops, mobile phones, USB devices, etc.…) to any school devices, systems or services without prior permission from an Authorised Person within the school. I understand that, if I am permitted to use my own devices in the school I will follow the rules set out in this agreement, in the same way as if I was using schoolequipment. • I understand that I am responsible for my actions, both inside and outside of the school: • I understand that the school also has the right to take action against me if I am involved in incidents of inappropriate behaviour, that are covered in this agreement, when I am out of the school and where they involve my membership of the school community (for example, cyber- bullying, use of images or personal information). • I understand that if I fail to comply with this Acceptable Use Policy Agreement, I will be subject to disciplinary action. This may include loss of access to the school IT systems and services, disciplinary action as set out in the codes of conduct and in the event of illegal activities involvement of the police. I agree to follow these guidelines at all times when: • using or connected to the School’s devices, systems and services; • using my own equipment inside or outside of the school in a way that is related to me being a member of this school (for example, communicating with other members of the school, accessing school email, websites, remote learning and services, etc.…).

Appears in 1 contract

Sources: It Acceptable Use Policy and Agreement

Unacceptable Use. 2.1 4.1 The school Learning Community Trust reserves the right to block, disconnect or otherwise prevent what it considers to be unacceptable use of its IT ICT Facilities. Unacceptable use includes, but is not limited to: 2.1.1 4.1.1 All actions or activities that are illegal or in conflict with the SchoolTrust’s policies, procedures, processes and regulations or which breach contracts or policies applied to the School Academy by third party through a valid service contract or agreement. 2.1.2 4.1.2 Using the IT ICT Facilities for access, creation, modification, storage, download, hosting or transmission of material that could be considered pornographic, offensive, obscene, or otherwise inappropriate, or for placing direct or indirect links to websites which publish or host pornographic, offensive or inappropriate material. 2.1.3 4.1.3 Publishing materials or making statements which the school Trust may deem to be advocating illegal activity, or threatening, or harassing, or defamatory, or bullying or disparaging of others, or abusive, or libellous, or slanderous, or indecent, or obscene, or offensive or promotes unlawful discrimination, breaches copyright or otherwise causing annoyance, or inconvenience. 2.1.4 4.1.4 Unauthorised production, distribution, copying, selling, hiring, performing of copyrighted material including, but not limited to, digitisation and distribution of computer software, television, radio, streaming services, websites, photographs, magazines, books, music or any copyrighted sources and installation of any copyrighted software for which the School Trust does not have an active licence or explicit permission of the copyright owner, is strictly prohibited. 2.1.5 4.1.5 Authoring or sending any form of electronic communications or messages, including, but not limited to, videos, chats, messages and and/or emails that were unsolicited and may be considered junk mailinappropriate, junk, "chain letters", "Ponzi", hoax warnings or advertising, and that do not correctly identify you as the sender, or messages which appear to originate from another person. 2.1.6 4.1.6 Unauthorised recording, “screenshotting”, capturing, photographing or any other means of observing and/or documenting the Materials of an ICT device, without prior notification and agreement. 4.1.7 Unauthorised transmission, distribution, discussion or disclosure of information gained through a user’s presence within the School Trust or through the use of IT ICT Facilities. 2.1.7 4.1.8 Connecting any non-approved IT ICT device, system or service (including wireless access points) to school Trust networks or setting up any network services, without the explicit or delegated permission from Authorised Personnel. 2.1.8 4.1.9 Unauthorised access (or attempted unauthorised access) to any IT ICT Facilities provided by the SchoolLearning Community Trust. 2.1.9 4.1.10 Allowing, inciting, encouraging or enabling others to gain or attempt to gain unauthorised access to the IT ICT Facilities. 2.1.10 4.1.11 Causing any damage to IT ICT Facilities, including through the consumption of food or drink, or moving or removing such facilities without authorisation. The School Learning Community Trust reserves the right to charge for any damage caused. 2.1.11 4.1.12 Attempting to modify, alter or in any way interfere with IT ICT facility security controls, hardware or software, configurations, settings, equipment, data files or websites without the written authorisation or delegated permission from Authorised Personnel. 2.1.12 4.1.13 Introduction of unauthorised and/or malicious software or programs into the IT ICT Facilities, including, but not limited to: unlicensed software, viruses, worms, Trojan horses or logic bombs; by downloading, creating or using any program, tool or item of software designed to monitor damage, disrupt or interfere with the functioning of IT ICT Facilities, user accounts or data. 2.1.13 4.1.14 Effecting security breaches or disruptions of network communication, including, but not limited to, accessing or modifying data (or data headers) of which the user is not an intended recipient or logging into an IT ICT system or service, or account, that the user is not expressly authorised to access. Disruption includes, but is not limited to, network sniffing, pinged floods, packet spoofing, denial of service, and forged routing information. 2.1.14 4.1.15 Executing any form of network monitoring including any data capture, port scanning or security scanning without written authorisation or delegated permission from Authorised Personnel. 2.1.15 4.1.16 Registering for any system or service, including, but not limited to, social media accounts, web applications, domain names, which includes the name of the school Trust or its Academies or any similar name, or abbreviation that may mislead the public into believing that the domain name refers to the schoolTrust. 2.1.16 4.1.17 Acting in any way that directly or indirectly causes disruption to others’ use of School IT Facilities, Trust’s ICT Facilities or using IT ICT Facilities to disrupt or deny the use of IT ICT Facilities of third parties at any time. I understand that I must use Xxxxxxxxx Woodville School systems in a responsible way, to ensure that there This is no risk to my safety or to the safety and security not an exhaustive list but merely an indication of the systems types of conduct that could come under the heading of inappropriate. Failure to follow this policy may result in disciplinary action up to and other usersincluding dismissal. It may also lead to criminal or civil action.

Appears in 1 contract

Sources: Acceptable Use Policy Agreement

Unacceptable Use. 2.1 4.1 The school Academy reserves the right to block, disconnect or otherwise prevent what it considers to be unacceptable use of its IT ICT Facilities. Unacceptable use includes, but is not limited to: 2.1.1 4.1.1 All actions or activities that are illegal or in conflict with the SchoolAcademy’s policies, procedures, processes and regulations or which breach contracts or policies applied to the School Academy by third party through a valid service contract or agreement. 2.1.2 4.1.2 Using the IT ICT Facilities for access, creation, modification, storage, download, hosting or transmission of material that could be considered pornographic, offensive, obscene, or otherwise inappropriate, or for placing direct or indirect links to websites which publish or host pornographic, offensive or inappropriate material. 2.1.3 4.1.3 Publishing materials or making statements which the school Academy may deem to be advocating illegal activity, or threatening, or harassing, or defamatory, or bullying or disparaging of others, or abusive, or libellous, or slanderous, or indecent, or obscene, or offensive or promotes unlawful discrimination, breaches copyright or otherwise causing annoyance, or inconvenience. 2.1.4 4.1.4 Unauthorised production, distribution, copying, selling, hiring, performing of copyrighted material including, but not limited to, digitisation and distribution of computer software, television, radio, streaming services, websites, photographs, magazines, books, music or any copyrighted sources and installation of any copyrighted software for which the School Academy does not have an active licence or explicit permission of the copyright owner, is strictly prohibited. 2.1.5 4.1.5 Authoring or sending any form of electronic communications or messages, including, but not limited to, videos, chats, messages and and/or emails that were unsolicited and may be considered junk mailinappropriate, junk, "chain letters", "Ponzi", hoax warnings or advertising, and that do not correctly identify you as the sender, or messages which appear to originate from another person. 2.1.6 4.1.6 Unauthorised transmissionrecording, distribution“screenshotting”, discussion capturing, photographing or disclosure any other means of information gained through a user’s presence within observing and/or documenting the School or through the use Materials of IT Facilities. 2.1.7 Connecting any non-approved IT an ICT device, system or service (including wireless access points) to school networks or setting up any network services, without the explicit or delegated permission from Authorised Personnelprior notification and agreement. 2.1.8 Unauthorised access (or attempted unauthorised access) to any IT Facilities provided by the School. 2.1.9 Allowing, inciting, encouraging or enabling others to gain or attempt to gain unauthorised access to the IT Facilities. 2.1.10 Causing any damage to IT Facilities, including through the consumption of food or drink, or moving or removing such facilities without authorisation. The School reserves the right to charge for any damage caused. 2.1.11 Attempting to modify, alter or in any way interfere with IT facility security controls, hardware or software, configurations, settings, equipment, data files or websites without the written authorisation or delegated permission from Authorised Personnel. 2.1.12 Introduction of unauthorised and/or malicious software or programs into the IT Facilities, including, but not limited to: unlicensed software, viruses, worms, Trojan horses or logic bombs; by downloading, creating or using any program, tool or item of software designed to monitor damage, disrupt or interfere with the functioning of IT Facilities, user accounts or data. 2.1.13 Effecting security breaches or disruptions of network communication, including, but not limited to, accessing or modifying data (or data headers) of which the user is not an intended recipient or logging into an IT system or service, or account, that the user is not expressly authorised to access. Disruption includes, but is not limited to, network sniffing, pinged floods, packet spoofing, denial of service, and forged routing information. 2.1.14 Executing any form of network monitoring including any data capture, port scanning or security scanning without written authorisation or delegated permission from Authorised Personnel. 2.1.15 Registering for any system or service, including, but not limited to, social media accounts, web applications, domain names, which includes the name of the school or any similar name, or abbreviation that may mislead the public into believing that the domain name refers to the school. 2.1.16 Acting in any way that directly or indirectly causes disruption to others’ use of School IT Facilities, or using IT Facilities to disrupt or deny the use of IT Facilities of third parties at any time. I understand that I must use Xxxxxxxxx Woodville School systems in a responsible way, to ensure that there is no risk to my safety or to the safety and security of the systems and other users.

Appears in 1 contract

Sources: Acceptable Use Agreement