Examples of Inappropriate Use Clause Samples

The "Examples of Inappropriate Use" clause defines specific actions or behaviors that are considered unacceptable under the agreement. It typically lists activities such as misuse of services, violation of laws, or actions that could harm other users or the service provider, providing clear illustrations to guide user conduct. By outlining these examples, the clause helps prevent ambiguity about what constitutes misuse, thereby protecting the interests of all parties and supporting enforcement of the agreement's terms.
POPULAR SAMPLE Copied 1 times
Examples of Inappropriate Use. Deleting any folders or files you did not create or that you do not recognise Sharing login/password with another person Logging on to another person’s computer without his/her permission Using iPads not assigned to you (Teachers may allow students to look on with another student for instructional purposes only) Removing labels and identifying stickers on the iPad Using proxy sites to bypass web filtering Videoing or taping on school property (not permitted unless it is related to a school assignment) Emailing or chatting during class when not related to a school assignment Using profanity Gaming in class Cheating Inappropriate communication to the faculty or staff Threats and/or cyber bullying of any kind Logging into an iPad/application using a stolen login Possession of inappropriate files Pornography Manufacturing – using a camera to create inappropriate pictures/movies Distributing – sending/sharing inappropriate files with other individuals Bootleg movies or music Intentional actions which are harmful or potentially harmful to the iPad, charger, and/or iPad case Habitual and intentional disregard for the iPad Consequences include but are not limited to: School suspension After school detention Loss of technology privileges up to a term Disciplinary probation Exclusion
Examples of Inappropriate Use. Deleting any folders or files you did not create or that you do not recognize
Examples of Inappropriate Use. Deleting any folders or files you did not create or that you do not recognise • Sharing login/password with another person • Logging on to another person’s computer without his/her permission • Using iPads not assigned to you (Teachers may allow students to look on with another student for instructional purposes only) • Removing labels and identifying stickers on the iPad • Using proxy sites to bypass web filtering • Videoing or taping on school property (not permitted unless it is related to a school assignment) • Emailing or chatting during class when not related to a school assignment • Using profanity • Gaming in class • Cheating • Inappropriate communication to the faculty or staff • Threats and/or cyber bullying of any kind • Logging into an iPad/application using a stolen login • Possession of inappropriate files • Pornography • Manufacturing – using a camera to create inappropriate pictures/movies • Distributing – sending/sharing inappropriate files with other individuals • Bootleg movies or music • Intentional actions which are harmful or potentially harmful to the iPad, charger, and/or iPad case • Habitual and intentional disregard for the iPad Consequences include but are not limited to: • School suspensionAfter school detentionLoss of technology privileges up to a term • Disciplinary probation • Exclusion
Examples of Inappropriate Use. 1. Recreational pursuits 2. Social functions
Examples of Inappropriate Use. Using the district’s electronic communications system for illegal purposes including, but not limited to, gambling, pornography, and computer hacking.
Examples of Inappropriate Use. ● Using a Chromebook device not assigned to you without teacher permission ● Attempting to bypass TCS web filtering and blocked sites ● Video or audio recording when not related to a school assignment ● Frivolous use of the Chromebook at school, such as, but not limited to gaming, watching YouTube, etc. ● Inappropriate communications to TCS faculty, staff, or students ● Threats and/or cyber bullying of any kind ● Possessing, accessing, sending/sharing of inappropriate files
Examples of Inappropriate Use i. File downloads not connected with County business. ii. Generating, sending, requesting, receiving, downloading, viewing, or archiving material in any form, i.e., text, graphics, etc. which contains offensive or obscene language or content, or is harassing in nature. iii. Engaging in activities resulting in personal gain, such as engaging in any personal business or commercial transaction, exhibiting items for sale, or transacting other personal business. iv. Engaging in any unlawful activity. v. Copyright infringement. vi. Transmitting any County sensitive information over the Internet by other than secured transmission. vii. Creating, furthering or participating in any act of fraud, waste or abuse through Internet activities. viii. Intentionally disrupting network traffic or crashing the network and connected systems (for example: sabotage, intentionally introducing a computer virus). ix. Engaging in any other act of misconduct such as discrimination, sexual harassment, and misuse of position. x. Excessive or multiple Internet sessions, unless needed for official County business. xi. Use of continuous services such as PointCast, live audio, live radio, and live video feeds unless needed for official County business, or as permitted by the Department Head except when a directive from the IT Department prohibits such use because of interference with County business needs.
Examples of Inappropriate Use i. Illegal or impermissible activities as defined as a violation of County policy, state, and/or federal law. ii. Anything that may be construed as harassment or disparagement of others based on race, national origin, sex, sexual orientation, age, disability or religious or political beliefs, or any other protected status will not be tolerated. These include, but are not limited to, slurs, obscene messages, materials, and pictures, or religious materials. iii. Anything that may be construed as disruptive, threatening, offensive to others, or harmful to morale. iv. Copyright infringement. v. Items of a political nature or having to do with political activities. vi. Unauthorized distribution of personnel or medical information. vii. Use of E-mail when signed documents are required (Note: Use of E-mail to distribute documents for signature is acceptable). viii. Purposely creating any message that purports to be from another person without their permission. ix. Unauthorized use of County mailing lists. x. Unauthorized access to others’ files with no substantial business purpose, or vandalizing the data of another user. xi. Personal messages, including but not limited to, chain letters and broadly distributed e-mails regarding personal matters or interests.
Examples of Inappropriate Use.  Using the district’s electronic communications system for illegal purposes including, but not limited to, gambling, pornography, and computer hacking.  Disabling or attempting to disable any system monitoring or filtering or security measures.  Sharing user names and passwords with others; and/or borrowing someone else’s username, password, or account access.  Purposefully opening, viewing, using, or deleting files belonging to another system user without permission.  Electronically posting personal information about one’s self or others (i.e., addresses, phone numbers, and pictures).  Downloading or plagiarizing copyrighted information with permission from the copyright holder.  Intentionally introducing a virus or other malicious programs onto the district’s system.  Electronically posting messages or accessing materials that are abusive, obscene, sexually oriented, threatening, harassing, damaging to another’s reputation, or illegal.  Wasting or abusing school resources through unauthorized system use (e.g. playing online games, downloading music, watching video broadcast, participating in chat rooms, etc.).  Gaining unauthorized access to restricted information or network resources. Cyberbullying is defined as the use of any Internet-connected device for the purpose of bullying, harassing, or intimidating another student. This is includes, but may not be limited to:  Sending abusive text messages to cell phones, computers, or Internet- connected game consoles.  Posting abusive comments on someone’s blog or social networking site (e.g., Twitter, Instagram, or Facebook)  Creating a Web page that masquerades as the victim’s personal site and using it to embarrass him or her.  Making it appear that the victim is posting malicious comments about friends to isolate him or her from friends.

Related to Examples of Inappropriate Use

  • Permitted Uses and Disclosures of Phi by Business Associate Except as otherwise indicated in this Agreement, Business Associate may use or disclose PHI, inclusive of de-identified data derived from such PHI, only to perform functions, activities or services specified in this Agreement on behalf of DHCS, provided that such use or disclosure would not violate HIPAA or other applicable laws if done by DHCS.

  • Outpatient Dental Anesthesia Services This plan covers anesthesia services received in connection with a dental service when provided in a hospital or freestanding ambulatory surgical center and: • the use of this is medically necessary; and • the setting in which the service is received is determined to be appropriate. This plan also covers facility fees associated with these services. This plan covers dental care for members until the last day of the month in which they turn nineteen (19). This plan covers services only if they meet all of the following requirements: • listed as a covered dental care service in this section. The fact that a provider has prescribed or recommended a service, or that it is the only available treatment for an illness or injury does not mean it is a covered dental care service under this plan. • dentally necessary, consistent with our dental policies and related guidelines at the time the services are provided. • not listed in Exclusions section. • received while a member is enrolled in the plan. • consistent with applicable state or federal law. • services are provided by a network provider.

  • DISCLOSURE OF TBS ACCESS CODE TO THIRD PARTY (a) The Account Holder must exercise all care to ensure that the TBS Access Code is not disclosed to any person and shall take all steps to prevent forgery or fraud in connection with the use of his TBS Access Code and/or the operation of the TBS. If the TBS Access Code is disclosed to any person, the Account Holder must forthwith give the Bank written notice thereof, thereupon the Account Holder shall immediately cease to use the TBS Access Code. (b) Unless and until the Bank receives such written notice of disclosure, the Account Holder shall be fully liable and be bound by all transactions effected by the use of such TBS, with or without his consent or knowledge.

  • Submission of Grievance Information a. Upon appointment of the arbitrator, the appealing party shall, within five (5) days after notice of appointment, forward to the arbitrator, with a copy to the School Board, the submission of the grievance which shall include the following: 1. The issues involved. 2. Statement of the facts. 3. Position of the grievant. 4. The written documents relating to Section 5 of the grievance procedure.

  • Elements Unsatisfactory Needs Improvement Proficient Exemplary IV-A-1. Reflective Practice Demonstrates limited reflection on practice and/or use of insights gained to improve practice. May reflect on the effectiveness of lessons/ units and interactions with students but not with colleagues and/or rarely uses insights to improve practice. Regularly reflects on the effectiveness of lessons, units, and interactions with students, both individually and with colleagues, and uses insights gained to improve practice and student learning. Regularly reflects on the effectiveness of lessons, units, and interactions with students, both individually and with colleagues; and uses and shares with colleagues, insights gained to improve practice and student learning. Is able to model this element.