Unacceptable Use 3.1 The following is considered unacceptable use of the trust’s ICT facilities by any member of the trust community. Any breach of this policy may result in disciplinary or behaviour proceedings 3.2 Unacceptable use of the trust’s ICT facilities includes the below list. This is not an exhaustive list. The trust reserves the right to amend this list at any time. The trust will use professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the trust’s ICT facilities • Using the trust’s ICT facilities to breach intellectual property rights or copyright • Using the trust’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination • Breaching the trust’s policies or procedures • Any illegal conduct, or statements which are deemed to be advocating illegal activity • Online gambling, inappropriate advertising, phishing and/or financial scams • Accessing, creating, storing, linking to, or sending material that is pornographic, offensive, obscene or otherwise inappropriate or harmful • Consensual and non-consensual sharing of nude and semi-nude images and/or videos and/or livestreams (also known as sexting or youth-produced sexual imagery) • Activity which defames or disparages the trust, or risks bringing the trust into disrepute • Sharing confidential information about the trust, its pupils, or other members of the trust community • Connecting any device to the trust’s ICT network without approval from authorised personnel • Setting up any software, applications, or web services on the trust’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data • Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel • Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the trust’s ICT facilities • Causing intentional damage to ICT facilities • Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel • Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation • Using inappropriate or offensive language • Promoting a private business, unless that business is directly related to the trust • Using websites or mechanisms to bypass the trust’s filtering mechanisms • Engaging in content or conduct that is radicalised, extremist, racist, anti-Semitic, or discriminatory in any other way • Leaving ICT equipment anywhere other than on your person, at work or at home e.g., in the car • Using a (generic portable solid-state data storage device): data stick, pen drive, thumb drive, USB drive
Acceptable Use You agree that you are independently responsible for complying with all applicable laws in all of your activities related to your use of the Service, regardless of the purpose of the use, and for all communications you send through the Service. We and our Service Providers have the right but not the obligation to monitor and remove communications content that we find in our sole discretion to be objectionable in any way. In addition, you are prohibited from using the Service for communications or activities that: (a) violate any law, statute, ordinance or regulation; (b) promote hate, violence, racial intolerance, or the financial exploitation of a crime; (c) defame, abuse, harass or threaten others; (d) include any language or images that are bigoted, hateful, racially offensive, vulgar, obscene, indecent or discourteous; (e) infringe or violate any copyright, trademark, right of publicity or privacy or any other proprietary right under the laws of any jurisdiction; (f) impose an unreasonable or disproportionately large load on our infrastructure; (g) facilitate any viruses, trojan horses, worms or other computer programming routines that may damage, detrimentally interfere with, surreptitiously intercept or expropriate any system, data or information; (h) constitute use of any robot, spider, other automatic device, or manual process to monitor or copy the Service or the portion of the Site through which the Service is offered without our prior written permission; (i) constitute use of any device, software or routine to bypass technology protecting the Site or Service, or interfere or attempt to interfere, with the Site or the Service; or (j) may cause us or our Service Providers to lose any of the services from our internet service providers, payment processors, or other vendors. We encourage you to provide notice to us by the methods described in Section 6 of the General Terms above of any violations of the General Terms or the Agreement generally.
Vehicle Use 5.2.1 Each Lessee may use Lease Vehicles leased hereunder in connection with its car rental business, including use by such Lessee’s and its subsidiaries’ employees, directors, officers, agents, representatives and other business associates in their personal or professional capacities, subject to Sub-Clause 6.1 (
Acceptable Use Policy With respect to the Cloud Service, Customer will not: (a) disassemble, decompile, reverse-engineer, copy, translate or make derivative works, (b) transmit any content or data that is unlawful or infringes any intellectual property rights, or (c) circumvent or endanger its operation or security.
Building Access The authorized representatives of the Union shall have access to the District’s premises at any reasonable time for the purpose of adjusting grievances, investigating working conditions, or ascertaining the provisions of this Agreement are being adhered to; provided the representatives notify the supervisor of their presence and that they do not interfere with employees in the performance of their duties. The Union shall furnish the District with the names of its authorized representatives.