Unacceptable Use Clause Samples

The Unacceptable Use clause defines specific actions or behaviors that are prohibited when using a product, service, or system. Typically, it outlines activities such as illegal conduct, attempts to compromise security, or misuse of resources, and may include examples like spamming, hacking, or distributing malware. By clearly delineating what constitutes unacceptable use, this clause helps protect the provider and other users from harm, ensures compliance with laws and policies, and provides grounds for restricting or terminating access in case of violations.
POPULAR SAMPLE Copied 4 times
Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Online gambling, inappropriate advertising, phishing and/or financial scams Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate or harmful Consensual and non-consensual sharing of nude and semi-nude images and/or videos and/or livestreams Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its pupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any programme, tool or item of software designed to interfere with the functioning of the school’s ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to the school’s ICT facilities Removing, deleting or disposing of the school’s ICT equipment, systems, programmes or information without permission from authorised personnel Causing a data breach by accessing, downloading, modifying, or sharing data (including personal data) to which a user is not permitted by authorised personnel to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering or monitoring mechanisms Engaging in content or conduct that is radicalised, extremist, racist, antisemitic or discriminatory in any other way Using AI tools and generative chatbots (such a...
Unacceptable Use. Giving out personal information about another person, including home address and phone number, is strictly prohibited.
Unacceptable Use. I am aware that the school monitors the pupil’s activity on this device. I agree that my child will not carry out any activity that constitutes ‘unacceptable use’. This includes, but is not limited to the following: ● Using ICT or the internet to bully or harass someone else, or to promote unlawful discrimination ● Any illegal conduct, or statements which are deemed to be advocating illegal activity ● Activity which defames or disparages the school, or risks bringing the school into disrepute ● Causing intentional damage to ICT facilities or materials ● Using inappropriate or offensive language I accept that the school will sanction the pupil, in line with our Behaviour Policy, if the pupil engages in any of the above at any time.
Unacceptable Use. Examples of activities which are NOT PERMITTED include (but are not limited to):
Unacceptable Use. Unacceptable uses of technologies and the Internet include, but are not limited to: • Causing harm to others or damage to their property. • In the opinion of the Administration, producing and/or uploading content/videos/images, either through the use of the District network or from home computers, which seriously results in the disruption of the educational process or day-to-day operations of the school. In these cases, students will be asked to remove the content and may be subject to discipline. • Use for personal gain, unauthorized fundraising, commercial solicitation and compensation of any kind. • Activities incurring liability or cost by the District. The District will not be responsible for unauthorized financial obligations resulting from the use, or access to, Greenwich Public School’s network or the Internet. • Downloading, installing other unauthorized applications (including shareware or freeware) without permission or approval from a District representative. • Support or opposition for ballot measures, candidates and any other political activity, ,excluding specific activities supporting school-related projects. • Hacking, cracking, vandalizing, the introduction of viruses, worms, Trojan horses, time bombs and changes to hardware, software and monitoring tools. • Uses that jeopardize the security of student or staff access and of the computer network or other networks on the Internet, for example, disclosing or sharing your password with others or impersonating another user. • Unauthorized access to other district computers, networks and information systems. • Using another’s password or some other user identifier that misleads message recipients into believing that someone other than you is communicating or otherwise using his/her access to the network or the Internet. • ▇▇▇▇▇▇▇▇▇▇▇▇▇, hate mail, defamation, harassment of any kind, discriminatory jokes and remarks. • The sending, sharing, viewing or possessing pictures, emails or other material of a sexual nature in electronic or any other form on a cell phone or other electronic device is prohibited in the school setting. • Information posted, sent or stored online that could endanger others (e.g., bomb construction, drug manufacturing). • Accessing, uploading, downloading, storage and/or distribution of obscene, pornographic or sexually explicit material. • Attaching unauthorized equipment to the network. Any such equipment will be confiscated. • Participating in blogs, wikis, bulletin boar...
Unacceptable Use. Don’t use copyrighted material that we aren’t licensed to use. - Don’t use any Company data, account, or equipment for any purpose other than Company business. - Do not share your password or other authentication details with anyone, unless expressly authorized to do so. If you do share such information, only do so via sanctioned means (eg. LastPass). - Do not provide information about, or lists of, Staff to parties outside the Company.
Unacceptable Use. Using the guiding statement ofeducational purpose,” some specific examples of prohibited use are shown below. However, this policy does not attempt to demonstrate all unacceptable behaviors. Behaviors considered unacceptable may result in termination of Internet access and/or the general use of electronic resources provided by GLCS. Depending upon the severity of a user's inappropriate action(s), disciplinary action up to and including student expulsion may occur. The following examples are considered unacceptable: ➢ Sharing of Usernames and Passwords is not allowed. ➢ Providing personal information such as Name, Address, Phone Number or Gender is not safe and not allowed. ➢ Purchasing or selling of products and services by students is not allowed. ➢ Hiding or falsifying your identity is not acceptable. ➢ Bullying, harassing, intimidating, threatening or offensive language is not to be used. Electronic communications will not contain profanity, obscene comments, sexually explicit material, or expressions of bigotry, racism, or hatred. ➢ Plagiarism and copyright infringement are prohibited. Ideas or writings of others are not to be used without the permission of the author. ➢ Gaining unlawful access to another person’s resources or organizational resources as well as knowingly circumventing or trying to circumvent security measures is not allowed. ➢ Making malicious attempts to harm or destroy data of any person or GLCS resource is unlawful and not allowed.
Unacceptable Use. The user is responsible for the user's actions and activities involving the network. Some examples of unacceptable uses are given below. The list is not intended to be exhaustive. The Administration may periodically revise the concepts of acceptable and unacceptable use. These revisions will become part of this document. A. Using the network for any illegal activity, including violation of copyright or other contracts, or transmitting any material in violation of any U.S. or State regulation; B. Unauthorized access or downloading of software, electronic files, e-mail, or other data; C. Downloading copyrighted material for other than legal personal or professional use; D. Using the network for private financial or commercial gain which adversely affects the District; E. Wastefully using District resources, such as file space; F. Gaining unauthorized access to resources or entities; G. Invading the privacy of individuals; H. Using another user's account or password; I. Posting material authored or created by another without his/her consent; J. Posting anonymous messages; K. Using the network for commercial or private advertising; L. Accessing, submitting, posting, publishing, or displaying any defamatory, inaccurate, abusive, obscene, profane, sexually oriented, threatening, racially offensive, harassing, or illegal material; M. Using the network while access privileges are suspended or revoked; N. Publishing or otherwise disseminating another person's identity, personal information, account, or password; O. Using the network for unauthorized product advertisement or political activity; P. Promoting or encouraging the use of illegal or controlledsubstances; Q. Forgery or alteration of e-mail; R. Unauthorized use of the network to play computer games, enroll in list serves, or participate in chat rooms.
Unacceptable Use. The user is responsible for all his/her actions and activities involving the network. Examples of prohibited conduct include but are not limited to the following: ❑ Using the network for any illegal activity, including violation of copyright or other contracts or transmitting any material in violation of U.S. and State regulations. ❑ Copying or downloading copyrighted material on any system connected to the school system's hardware/software without the owner's permission. Only the owner(s) or individuals specifically authorized by the owner(s) may copy or download copyrighted material to the system. School purchased software may not be copied for personal use. ❑ Students will not use district computers and laptops to copy or download copyrighted software, music or images, or for other violation of copyright laws. Peer-to-peer, file-sharing, torrent software may not be installed on a school system computer or laptop. ❑ Copying, printing or downloading copyrighted material for the users own use without the owner's permission. Users may redistribute copyrighted programs only with the owner’s permission. Such permission must be specified in the document or must be obtained directly from the owner in accordance with applicable copyright laws, Board policy and administrative procedures. This includes the district contracted photographer. ❑ Product advertisement or political lobbying is prohibited. ❑ Vandalism. Vandalism is defined as any malicious attempt to harm or destroy data of another user, the network or the Internet. This includes, but is not limited to, creating and/or uploading or downloading viruses, disconnect or disassemble any network or computer component. ❑ Using or attempting to use the network while privileges are suspended or revoked. ❑ Using the computer of a teacher, administrator, or other staff member without permission or supervision. ❑ Use of technology resources in such a way that you would disrupt other users (sounds and/or excessive bandwidth usage, e.g., radio/audio streaming, video streaming). ❑ Provide another student with user account information or passwords ❑ Unauthorized interception of electronic communications and other wiretapping, including electronic mail (The Electronic Communications Privacy Act 18 USC 2701-2709) ❑ Accessing, monitoring, and use of personal websites. ❑ Accessing, monitoring, and use of personal networks. ❑ Bypassing the firewall and bypass and attempt to circumvent network security, virus protection, netw...
Unacceptable Use. 2.1 The school reserves the right to block, disconnect or otherwise prevent what it considers to be unacceptable use of its IT Facilities. Unacceptable use includes, but is not limited to: 2.1.1 All actions or activities that are illegal or in conflict with the School’s policies, procedures, processes and regulations or which breach contracts or policies applied to the School by third party through a valid service contract or agreement. 2.1.2 Using the IT Facilities for access, creation, modification, storage, download, hosting or transmission of material that could be considered pornographic, offensive, obscene, or otherwise inappropriate, or for placing direct or indirect links to websites which publish or host pornographic, offensive or inappropriate material. 2.1.3 Publishing materials or making statements which the school may deem to be advocating illegal activity, or threatening, or harassing, or defamatory, or bullying or disparaging of others, or abusive, or libellous, or slanderous, or indecent, or obscene, or offensive or promotes unlawful discrimination, breaches copyright or otherwise causing annoyance, or inconvenience. 2.1.4 Unauthorised production, distribution, copying, selling, hiring, performing of copyrighted material including, but not limited to, digitisation and distribution of computer software, television, radio, streaming services, websites, photographs, magazines, books, music or any copyrighted sources and installation of any copyrighted software for which the School does not have an active licence or explicit permission of the copyright owner, is strictly prohibited. 2.1.5 Authoring or sending any form of electronic communications or messages, including, but not limited to, messages and emails that were unsolicited and may be considered junk mail, "chain letters", hoax warnings or advertising, and that do not correctly identify you as the sender, or messages which appear to originate from another person. 2.1.6 Unauthorised transmission, distribution, discussion or disclosure of information gained through a user’s presence within the School or through the use of IT Facilities. 2.1.7 Connecting any non-approved IT device, system or service (including wireless access points) to school networks or setting up any network services, without the explicit or delegated permission from Authorised Personnel. 2.1.8 Unauthorised access (or attempted unauthorised access) to any IT Facilities provided by the School. 2.1.9 Allowing, inciting, en...