Rules for Acceptable Use Sample Clauses

The "Rules for Acceptable Use" clause defines the standards and limitations for how users may interact with a product, service, or system. It typically outlines prohibited behaviors such as unauthorized access, misuse of resources, or activities that could harm the system or other users, and may include examples like spamming, distributing malware, or violating intellectual property rights. This clause serves to protect the integrity and security of the service, ensuring a safe and lawful environment for all users by clearly setting boundaries and expectations.
Rules for Acceptable Use. District technology resources are primarily for instructional and educational purposes. Limited personal use is allowed only if the rules in this agreement are followed and the use does not interfere with schoolwork. • If you are issued your own account and password, you must not share your account information with another person. • District-owned devices and personal devices that allow access to District email or potentially sensitive student or employee records must be password-protected. • You must remember that people who receive email or other communication from you through your school account might think your message represents the school’s point of view. • You must always keep your personal information and the personal information of others private. This includes names, addresses, photographs, or any other personally identifiable or private information. • Students will not download or sign up for any online resource or application without prior approval from their teacher or other District administrator. • Students age 13 or younger will not sign up for individual accounts but will use a District or classroom account as applicable. • When communicating through email or other electronic means, you must use appropriate language and etiquette as you would when communicating face to face. Always be respectful. • You must be sure to acknowledge the work and ideas of others when you reference them in your own work. • You must immediately report any suspicious behavior or other misuse of technology to your teacher or other campus administrator. • You will be held responsible at all times for the proper use of your account, and the District may suspend or revoke your access if you violate the rules. The following are examples of inappropriate use of technology resources that may result in loss of privileges or disciplinary action: • Using the resources for any illegal purpose, including threatening school safety; • Accessing the resources to knowingly alter, damage, or delete District property or information, or to breach any other electronic equipment, network, or electronic communications system in violation of the law or District policy; • Damaging electronic communications systems or electronic equipment, including knowingly or intentionally introducing a virus to a device or network, or not taking proper security steps to prevent a device or network from becoming vulnerable; • Disabling or attempting to disable or bypass any internet filtering device; ...
Rules for Acceptable Use. You may use your personal electronic device for instructional purposes only as authorized by your teacher. • When using the device for instructional purposes while on campus, you must use the District’s wireless internet services and are prohibited from using a personal wireless service. Any attempt to bypass the District’s filter will result in loss of privileges and disciplinary action as required by the Student Code of Conduct. • When accessing the District’s technology resources using your personal device, you must follow the District’s technology resources policy and associated administrative regulations, including the acceptable use agreement you signed for access to the District’s technology resources. • When not using the device for instructional purposes while on campus, you must follow the rules and guidelines for noninstructional use as published in the student handbook. The following are possible consequences of inappropriate use of technology resources: • Suspension of access to the District’s technology resources; • Revocation of permission to use personal electronic devices for instructional purposes while on campus; or • Other disciplinary or legal action in accordance with the Student Code of Conduct and applicable laws. The District is not responsible for damage to or loss of devices brought from home. I understand that my use of the District’s technology resources, including the District’s wireless internet services, is not private and that the District may monitor my activity. I understand that my personal electronic device may be searched by District administrators in accordance with policy FNF. I have read the applicable District policies, associated administrative regulations, and this user agreement regarding the District’s technology resources and use of student-owned electronic devices, and I agree to abide by their provisions. I understand that violation of these provisions may result in suspension or revocation of system access and/or suspension or revocation of permission to use my personal electronic device for instructional purposes while on campus. I have read the District’s technology resources policy, associated administrative regulations, and this user agreement. In consideration for the privilege of my child using the District’s technology resources, I hereby release the District, its operators, and any institutions with which it is affiliated from any and all claims and damages of any nature arising from my child’s use ...
Rules for Acceptable Use.  You may use your personal electronic device for instructional purposes only as author- ized by your teacher.

Related to Rules for Acceptable Use

  • Acceptable Use You agree that you are independently responsible for complying with all applicable laws in all of your activities related to your use of the Service, regardless of the purpose of the use, and for all communications you send through the Service. We and our Service Providers have the right but not the obligation to monitor and remove communications content that we find in our sole discretion to be objectionable in any way. In addition, you are prohibited from using the Service for communications or activities that: (a) violate any law, statute, ordinance or regulation; (b) promote hate, violence, racial intolerance, or the financial exploitation of a crime; (c) defame, abuse, harass or threaten others; (d) include any language or images that are bigoted, hateful, racially offensive, vulgar, obscene, indecent or discourteous; (e) infringe or violate any copyright, trademark, right of publicity or privacy or any other proprietary right under the laws of any jurisdiction; (f) impose an unreasonable or disproportionately large load on our infrastructure; (g) facilitate any viruses, trojan horses, worms or other computer programming routines that may damage, detrimentally interfere with, surreptitiously intercept or expropriate any system, data or information; (h) constitute use of any robot, spider, other automatic device, or manual process to monitor or copy the Service or the portion of the Site through which the Service is offered without our prior written permission; (i) constitute use of any device, software or routine to bypass technology protecting the Site or Service, or interfere or attempt to interfere, with the Site or the Service; or (j) may cause us or our Service Providers to lose any of the services from our internet service providers, payment processors, or other vendors. We encourage you to provide notice to us by the methods described in Section 6 of the General Terms above of any violations of the General Terms or the Agreement generally.

  • Acceptable Use Policy With respect to the Cloud Service, Customer will not: (a) disassemble, decompile, reverse-engineer, copy, translate or make derivative works, (b) transmit any content or data that is unlawful or infringes any intellectual property rights, or (c) circumvent or endanger its operation or security.

  • ACCEPTABLE USE RESTRICTIONS You must: • not use the App or any Service in any unlawful manner, for any unlawful purpose, or in any manner inconsistent with these terms, or act fraudulently or maliciously, for example, by hacking into or inserting malicious code, such as viruses, or harmful data, into the App, any Service or any operating system; • not infringe our intellectual property rights or those of any third party in relation to your use of the App or any Service, including by the submission of any material (to the extent that such use is not licensed by these terms); • not transmit any material that is defamatory, offensive or otherwise objectionable in relation to your use of the App or any Service; • not use the App or any Service in a way that could damage, disable, overburden, impair or compromise our systems or security or interfere with other users; and • not collect or harvest any information or data from any Service or our systems or attempt to decipher any transmissions to or from the servers running any Service.

  • Unacceptable Use ‌ 3.1 The following is considered unacceptable use of the trust’s ICT facilities by any member of the trust community. Any breach of this policy may result in disciplinary or behaviour proceedings 3.2 Unacceptable use of the trust’s ICT facilities includes the below list. This is not an exhaustive list. The trust reserves the right to amend this list at any time. The trust will use professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the trust’s ICT facilities • Using the trust’s ICT facilities to breach intellectual property rights or copyright • Using the trust’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination • Breaching the trust’s policies or procedures • Any illegal conduct, or statements which are deemed to be advocating illegal activity • Online gambling, inappropriate advertising, phishing and/or financial scams • Accessing, creating, storing, linking to, or sending material that is pornographic, offensive, obscene or otherwise inappropriate or harmful • Consensual and non-consensual sharing of nude and semi-nude images and/or videos and/or livestreams (also known as sexting or youth-produced sexual imagery) • Activity which defames or disparages the trust, or risks bringing the trust into disrepute • Sharing confidential information about the trust, its pupils, or other members of the trust community • Connecting any device to the trust’s ICT network without approval from authorised personnel • Setting up any software, applications, or web services on the trust’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data • Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel • Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the trust’s ICT facilities • Causing intentional damage to ICT facilities • Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel • Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation • Using inappropriate or offensive language • Promoting a private business, unless that business is directly related to the trust • Using websites or mechanisms to bypass the trust’s filtering mechanisms • Engaging in content or conduct that is radicalised, extremist, racist, anti-Semitic, or discriminatory in any other way • Leaving ICT equipment anywhere other than on your person, at work or at home e.g., in the car • Using a (generic portable solid-state data storage device): data stick, pen drive, thumb drive, USB drive

  • Additional Acceptable Uses of Student Data Contractor is prohibited from using Student Data for any secondary use not described in this agreement except: a. for adaptive learning or customized student learning purposes; b. to market an educational application or product to a parent or legal guardian of a student if Contractor did not use Data, shared by or collected per this Contract, to market the educational application or product; c. to use a recommendation engine to recommend to a student i. content that relates to learning or employment, within the third-party contractor's internal application, if the recommendation is not motivated by payment or other consideration from another party; or