Acceptable Use You agree that you are independently responsible for complying with all applicable laws in all of your activities related to your use of the Service, regardless of the purpose of the use, and for all communications you send through the Service. We and our Service Providers have the right but not the obligation to monitor and remove communications content that we find in our sole discretion to be objectionable in any way. In addition, you are prohibited from using the Service for communications or activities that: (a) violate any law, statute, ordinance or regulation; (b) promote hate, violence, racial intolerance, or the financial exploitation of a crime; (c) defame, abuse, harass or threaten others; (d) include any language or images that are bigoted, hateful, racially offensive, vulgar, obscene, indecent or discourteous; (e) infringe or violate any copyright, trademark, right of publicity or privacy or any other proprietary right under the laws of any jurisdiction; (f) impose an unreasonable or disproportionately large load on our infrastructure; (g) facilitate any viruses, trojan horses, worms or other computer programming routines that may damage, detrimentally interfere with, surreptitiously intercept or expropriate any system, data or information; (h) constitute use of any robot, spider, other automatic device, or manual process to monitor or copy the Service or the portion of the Site through which the Service is offered without our prior written permission; (i) constitute use of any device, software or routine to bypass technology protecting the Site or Service, or interfere or attempt to interfere, with the Site or the Service; or (j) may cause us or our Service Providers to lose any of the services from our internet service providers, payment processors, or other vendors. We encourage you to provide notice to us by the methods described in Section 6 of the General Terms above of any violations of the General Terms or the Agreement generally.
Acceptable Use Policy With respect to the Cloud Service, Customer will not: (a) disassemble, decompile, reverse-engineer, copy, translate or make derivative works, (b) transmit any content or data that is unlawful or infringes any intellectual property rights, or (c) circumvent or endanger its operation or security.
ACCEPTABLE USE RESTRICTIONS You must: • not use the App or any Service in any unlawful manner, for any unlawful purpose, or in any manner inconsistent with these terms, or act fraudulently or maliciously, for example, by hacking into or inserting malicious code, such as viruses, or harmful data, into the App, any Service or any operating system; • not infringe our intellectual property rights or those of any third party in relation to your use of the App or any Service, including by the submission of any material (to the extent that such use is not licensed by these terms); • not transmit any material that is defamatory, offensive or otherwise objectionable in relation to your use of the App or any Service; • not use the App or any Service in a way that could damage, disable, overburden, impair or compromise our systems or security or interfere with other users; and • not collect or harvest any information or data from any Service or our systems or attempt to decipher any transmissions to or from the servers running any Service.
Unacceptable Use 3.1 The following is considered unacceptable use of the trust’s ICT facilities by any member of the trust community. Any breach of this policy may result in disciplinary or behaviour proceedings 3.2 Unacceptable use of the trust’s ICT facilities includes the below list. This is not an exhaustive list. The trust reserves the right to amend this list at any time. The trust will use professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the trust’s ICT facilities • Using the trust’s ICT facilities to breach intellectual property rights or copyright • Using the trust’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination • Breaching the trust’s policies or procedures • Any illegal conduct, or statements which are deemed to be advocating illegal activity • Online gambling, inappropriate advertising, phishing and/or financial scams • Accessing, creating, storing, linking to, or sending material that is pornographic, offensive, obscene or otherwise inappropriate or harmful • Consensual and non-consensual sharing of nude and semi-nude images and/or videos and/or livestreams (also known as sexting or youth-produced sexual imagery) • Activity which defames or disparages the trust, or risks bringing the trust into disrepute • Sharing confidential information about the trust, its pupils, or other members of the trust community • Connecting any device to the trust’s ICT network without approval from authorised personnel • Setting up any software, applications, or web services on the trust’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data • Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel • Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the trust’s ICT facilities • Causing intentional damage to ICT facilities • Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel • Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation • Using inappropriate or offensive language • Promoting a private business, unless that business is directly related to the trust • Using websites or mechanisms to bypass the trust’s filtering mechanisms • Engaging in content or conduct that is radicalised, extremist, racist, anti-Semitic, or discriminatory in any other way • Leaving ICT equipment anywhere other than on your person, at work or at home e.g., in the car • Using a (generic portable solid-state data storage device): data stick, pen drive, thumb drive, USB drive
Additional Acceptable Uses of Student Data Contractor is prohibited from using Student Data for any secondary use not described in this agreement except: a. for adaptive learning or customized student learning purposes; b. to market an educational application or product to a parent or legal guardian of a student if Contractor did not use Data, shared by or collected per this Contract, to market the educational application or product; c. to use a recommendation engine to recommend to a student i. content that relates to learning or employment, within the third-party contractor's internal application, if the recommendation is not motivated by payment or other consideration from another party; or