Common use of Unacceptable Uses Clause in Contracts

Unacceptable Uses. A. Using the Internet in a manner that would violate any federal, state, or local statute, regulation, rule or policy. B. Using threatening, defamatory, discriminatory, or harassing language or language that constitutes a criminal offense, or that is detrimental to or in opposition to the NASD’s educational mission in any e-mail message or other Internet communication. C. Displaying or downloading any kind of sexually explicit offensive image or document. In addition, sexually offensive material may not be archived, stored, distributed, edited, or recorded using NASD’s network or computing resources. D. Knowingly engaging in any activity that could result in damage to NASD technology. ▇. ▇▇▇▇▇▇▇ passwords or assigned accounts, without the express authorization of the NASD. F. Engaging in activities designed to, or that might reasonably be foreseen to, expose NASD technology or other computers to computer viruses, other harmful software, or other injury or damage. G. E-mailing or instant messaging students who are unrelated to the User for non-school business- related reasons. School business use of instant messaging software or chat rooms for communication with students should only be done with the authorization of the NASD. H. Downloading, using or distributing pirated software or data and downloading, using or distributing any software that is not authorized by the NASD. I. Unauthorized copying, downloading, or distributing of copyrighted software or materials. This includes, but is not limited to: e-mail, text files, program files, image files, database files, sound files, music files, and video files. J. Providing private and/or confidential information about any individual other than the User, or the User’s immediate family, over NASD technology for non-school business use. K. Using NASD technology to transmit or display material confidential to NASD to uninvolved parties without the authorization of the NASD. This includes material posted in chat rooms, newsgroups, blogs, or other public forums. L. Downloading entertainment software or games, except where the User obtains the prior written authorization of the NASD. M. Installing and/or operating peer-to-peer software. N. Attempting to harm, maliciously modify, or destroy data that has been created by another.

Appears in 3 contracts

Sources: Technology Use Policy and Agreement, Technology Use Policy and Agreement, Technology Use Policy and Agreement