Student Network, Computing & Software Usage Regulations Version th July 2006
|
|
- Myles Harrell
- 6 years ago
- Views:
Transcription
1 Student Network, Computing & Software Usage Regulations Version th July 2006 Copyright 2006 Institute of Technology, Sligo, Ireland. 1
2 1.1 General Computing Facilities Computing facilities provided by the Institute are to be used by students of the college solely for work associated with research and courses of the Institute. Computers, printers and college owned software and Internet access must not be used for any other purpose. 1.2 Software Licensing No software shall be installed by any student. 1.3 Access to Computers (a) (b) Students should not leave computers logged in and unattended. Students will be held personally liable for use of computers for noncourse related activity, and for documents and images stored or downloaded from the Internet or other sources, while the computer was left logged in and unattended. Students should be aware that all files saved to college computers and network servers are date, time and User ID stamped, as are all visits to websites outside the college. must not be used for propagation of chain or for the transmission of offensive images/cartoons or material which is unrelated to course work. Use of is governed by the AUP provided in section 3. The use of Internet Chat software such as ICQ or MIRC is forbidden at all times, and downloading copyright infringing MP3 or other music format files, is forbidden at all times. Students shall be personally liable for damages to the intellectual property owner. 1.4 Audit College management reserve the right to periodically and randomly audit student computers, and /network storage areas for breaches of this policy, without warning. 1.5 Penalties Penalties for Breaches of this code of practice and or the Internet/ Acceptable Use Policy will result in disciplinary action, up to and including suspension and/or expulsion. Copyright 2006 Institute of Technology, Sligo, Ireland. 2
3 It is understood that by using college provided computers, network and Internet you agree to be bound by the following Internet Acceptable Use Policies (AUP) Copyright 2006 Institute of Technology, Sligo, Ireland. 3
4 2. Internet Acceptable Use Policy The Institute of Technology, Sligo (ITS) Acceptable Use Policy has been formulated with the following goals in mind: 1. Ensure security, reliability and integrity of the colleges network, and the network of others. 2. Avoid situations that may cause the Institute to incur civil liability 3. Maintain the image and reputation of the Institute 4. Preserve the value of Internet resources as a conduit for free expression 5. Encourage the responsible use of network resources, discouraging practices, which degrade the usability of network resources and thus the value of Internet services 6. Preserve the privacy and security of individual users The Acceptable Use Policy below defines the actions which ITS considers to be abusive, and thus, strictly prohibited. The examples named in this list are non-exclusive, and are provided solely for guidance to ITS users. If you are unsure whether any contemplated use or action is permitted, please contact the IT Manager in writing. General Conduct Users are prohibited from uploading/downloading on or through any of ITS computers or network, any material that is, in IT Sligo's sole discretion, unlawful, threatening, abusive, libellous, pornographic, racial, hateful, or encourages conduct that would constitute a criminal offence, give rise to civil liability, or otherwise violate any national, EU or international law. ITS computer and network services may only be used for lawful purposes. Transmission, distribution, or storage of any information, data or material in violation of European Union or Irish National regulation or law, or by the common law, is prohibited. This includes, but is not limited to, material protected by copyright, trademark, trade secret, or any other statute. The provision of remote access to users is not permitted except through prior agreement with the Computing Services Department. The resale of ITS computer and network services is not permitted. Copyright 2006 Institute of Technology, Sligo, Ireland. 4
5 System and Network Security Users may not attempt to circumvent user authentication or security of any host, network, or account ("cracking"). This includes, but is not limited to, accessing data not intended for the User, logging into a server or account the User is not expressly authorized to access, or probing the security of other networks. Users may not attempt to interfere with service to any user, host, or network ("denial of service attacks"). This includes, but is not limited to, "flooding" of networks, deliberate attempts to overload a service, and attempts to "crash" a host. Users who violate systems or network security may incur criminal or civil liability. ITS will co-operate fully with investigations of violations of systems or network security at other sites, including co-operating with law enforcement authorities in the investigation of suspected criminal violations. USENET Postings to USENET newsgroups must comply with the written charters or FAQs for those newsgroups. Users are prohibited from posting the same or similar message to large numbers of newsgroups (excessive cross-posting or multiple-posting, also known as "USENET spam"). A User may not solicit mail for any other address other than that of the user's ITS account, with the intent to harass or collect replies after ITS network service has been terminated. IRC (Internet Relay Chat) ITS is not liable for the content of any communications made on IRC. ITS reserves the right to ban from IRC usage any user whose conduct is, in ITS's sole judgement, inappropriate or disruptive. IRC robots ("bots" or "clones") may not be run from ITS accounts, or on any ITS server. Users are prohibited from using IRC scripts or programs that interfere with or deny service to other users on any server or host. Users are also prohibited from engaging in activities, which harass other users. This includes, but is not limited to, "flooding" (rapidly entering text with the intent to fill the screens of others), "flashing" (disrupting terminal emulation), "take-overs" (forcibly seizing operator privileges), attempting to send private messages to those who do not wish to see them (via "ignore"), attempting to return to a channel after being banned from it, and other disruptive behaviours. Other Internet based Services The User is made aware that this AUP governs the use of other Internet based and/or future services not listed here. Copyright 2006 Institute of Technology, Sligo, Ireland. 5
6 3. Acceptable Use Policy Electronic mail enables Institute students to communicate promptly and efficiently with colleagues internally within the organisation and enables a prompt and efficient service from the Institute to its clients/customers/suppliers. can also be used to communicate with other individuals and organisations with whom Institute students interact with. While brings many benefits to the Institute in terms of its communications internally with members and externally it also brings risks to the organisations. For that reason it is necessary to have a code of practice which regulates its use and which sets down its specific rules for the use of e- mail and Internet. Every student has a responsibility to maintain the Institute's image, to use these electronic resources in a productive manner and to avoid placing the Institute at risk for legal liability based on their use. Use of is a personal computerised and efficient communication system which enables the sending and receiving of messages between students and between the Institute and its clients/customers/suppliers. Documents and materials can be attached to s. can effectively by-pass typewritten documents, faxes and the need to post documents. There, are, however risks attached to the sending of s and they are : 1. Your message may go to persons other than the intended recipient and if confidential or commercially sensitive this could be damaging to the Institute. 2. messages can carry computer viruses which are particularly dangerous to the Institute's computer operations generally. 3. Letters, files and other documents attached to s may belong to others and there may be copyright implications in sending or receiving them without permission. 4. is speedy and, as, such messages written in haste or written carelessly are sent simultaneously and without the opportunity to check or rephrase. This could give rise to legal liability on the Institute's part such as claims for defamation, etc. 5. An message may legally bind the Institute contractually in certain instances without the proper authority being obtained internally. 6. It should be remembered that all personal data contained in s may be accessible under Data Protection legislation and, furthermore, a substantial portion of s to Government and other public bodies may be accessible under Freedom of Information legislation. Copyright 2006 Institute of Technology, Sligo, Ireland. 6
7 7. s should be regarded as potentially public information which carry a heightened risk of legal liability for the sender, the recipient and the organisations for whom they work. Rules for use In order to avoid or reduce the risks inherent in the use of within the Institute the following rules are necessary : 1. The Institute's name is included in the heading carried with every message sent by a student member. This reflects on the Institute's image and reputation. Therefore, messages must be appropriate and professional. 2. is not for private purposes nor should be used for any purpose, other than Institute business. All s issued from the Institute will carry a disclaimer saying the is intended only for IT Sligo use and if used for any other purpose a named person should be contacted immediately within the Institute. 3. Particular care should be taken when sending confidential or commercially sensitive information. If in doubt please consult your Lecturer, Head of Department/School or Function Head. 4. Great care should also be taken when attaching documents as the ease with which one can download files from the Internet or 'cut and paste' materials from electronic sources increases the risks of infringement of the rights of others particularly the intellectual property and other proprietary rights. Also attaching documents may give rise to the release of information not intended hence the importance of vetting attachments. Again if in doubt please consult your Lecturer, Head of Department/School or Function Head. 5. Extra caution needs to be taken with messages in respect of any disparaging remarks that may be contained therein. An should be regarded as a written formal letter the recipients of which may be much wider than the sender intended hence any defamatory or careless remarks can have very serious consequences as can any indirect innuendo. Avoid the use of indecent, obscene, sexist, racist or other inappropriate remarks whether in written form, in cartoon form or otherwise. 6. If you receive any offensive, unpleasant, harassing or intimidating messages via the you are requested to inform your Lecturer, Head of Department/School or Function Head, or the IT Department immediately. It is important that we trace such s as quickly as possible. 7. Any important or potentially contentious communication which you have received through should be printed and a hard copy kept (e.g. confirmation of order etc.) Where important to do so you should obtain Copyright 2006 Institute of Technology, Sligo, Ireland. 7
8 confirmation that the recipient has received your The Institute reserves the right to review, audit, intercept, access and disclose all messages created, received or sent over the electronic mail system for any purpose. 9. The Use of Institute provided for the distribution of unsolicited bulk (SPAM) is expressly forbidden at all times. Notwithstanding the Institute's right to retrieve and read any electronic mail messages, such messages should be treated as confidential by other students and accessed only by the intended recipient. Students are not authorised to retrieve or read any messages that are not sent to them. Any exception to this policy must receive prior approval from college management. However, the confidentiality of any message should not be assumed. Even when a message is erased it is still possible to retrieve and read that message. Formal Acceptance of the Code of Practice I, the undersigned, hereby declare that I have read the college Computing Code of Practice and Internet Acceptable Use Policies and agree to be bound by them, in the full knowledge that any breach of the above policies and code may lead to suspension and or expulsion. Print Name Course Name and Year User Logon ID Signature Copyright 2006 Institute of Technology, Sligo, Ireland. 8
Acceptable Use Policy (AUP)
Acceptable Use Policy (AUP) Questions regarding this policy and complaints of violations of this policy by PLAINS INTERNET users can be directed to support@plainsinternet.com. Introduction Plains Internet
More informationAcceptable Use Policy ("AUP")
Acceptable Use Policy ("AUP") Pacificnet Hosting (PacHosting)'s Acceptable Use Policy ("AUP") is provided to give our customers and users a clear understanding of what PacHosting expects of them while
More informationNebraskaLink Acceptable Use Policy
NebraskaLink Acceptable Use Policy Introduction This acceptable use policy (the "Policy") defines acceptable practices relating to the use of NebraskaLink's services (the "Service") by customers of NebraskaLink
More informationAcceptable use policy for SLT idc services(ver 1.2)
Acceptable use policy for SLT idc services(ver 1.2) Important Note: SLT shall revise this Acceptable Use policy from time to time without notice by posting a new version of this document on the SLT idc
More informationAcceptable Use Policy
Acceptable Use Policy Jackson Energy Authority 731.422.7500 INTRODUCTION Jackson Energy Authority ( JEA ) has formulated this Acceptable Use Policy ( AUP ), in order to set forth terms regarding the responsible
More informationAcceptable Use Policy
1 INTRODUCTION and its subsidiaries ( us, we or our ) have produced this acceptable use policy in order to: Give you a better understanding of what is and is not acceptable when using the internet Encourage
More information1801 North Main Street Ste 25 Phone: Mitchell, SD Office Hours: M-F 8am-5pm Fax:
1801 North Main Street Ste 25 www.mitchelltelecom.com Phone: 605-990-1000 Mitchell, SD 57301 Office Hours: M-F 8am-5pm Fax: 605-990-1010 ACCEPTABLE USE POLICY Mitchell Telecom provides to business and
More informationGlenwood Telecommunications, Inc. Acceptable Use Policy (AUP)
Glenwood Telecommunications, Inc. Acceptable Use Policy (AUP) All customers should read this document. You are responsible for the policy written here, and your account WILL BE DISABLED WITHOUT WARNING
More informationACCEPTABLE USE POLICY
Great Lakes Energy Connections, Inc. Truestream ACCEPTABLE USE POLICY Contents OVERVIEW... 2 INTRODUCTION... 2 VIOLATION OF THIS ACCEPTABLE USE POLICY... 2 PROHIBITED USES AND ACTIVITIES... 2 CUSTOMER
More informationMagna5 reserves the right to make modifications to this policy at any time.
INTERNET ACCEPTABLE USE POLICY This Acceptable Use Policy specifies the actions prohibited by Magna5 to users of the Magna5 Network or the networks of third-party providers. Magna5 reserves the right to
More informationThis Policy applies to all staff and other authorised users in St Therese School.
St. Therese School Computer and Internet Policy STAFF Policy Statement All staff and other authorised users of St Therese information and communications technology are to use the technology only in a way
More informationAcceptable Use Policy
Acceptable Use Policy Why is Cleveland Broadband providing this Policy to me? Cleveland Broadband s goal is to provide its customers with the best Internet service possible. In order to help accomplish
More informationFreedomNet Solutions Acceptable Use Policy ( )
FreedomNet Solutions Acceptable Use Policy (02.10.2017) This Acceptable Use Policy ( Acceptable Use ) is a guide to the tolerable use of Member accounts and the Services provided by FreedomNet Solutions.
More informationWYANDOTTE MUNICIPAL SERVICES ACCEPTABLE USE POLICY
WYANDOTTE MUNICIPAL SERVICES ACCEPTABLE USE POLICY Wyandotte Municipal Services may modify this Acceptable Use Policy at any time without notifying its users. For this reason, Wyandotte Services High Speed
More informationMidstate Telephone & Midstate Communications. Acceptable Use Policy
Midstate Telephone & Midstate Communications Acceptable Use Policy Introduction Midstate is at all times committed to complying with the laws and regulations governing use of the Internet, e-mail transmission
More informationACCEPTABLE USE POLICY
ACCEPTABLE USE POLICY Introduction Failure to comply with this Acceptable Use Policy will result in the immediate suspension or termination of the Service, in accordance with the respective supply conditions.
More informationregion16.net Acceptable Use Policy ( AUP )
region16.net Acceptable Use Policy ( AUP ) Introduction By using service(s) provided by region16.net (including, but not necessarily limited to, Internet Services and videoconferencing), you agree to comply
More informationAcceptable Use Policy
Overview Acceptable Use Policy Defined as client based accounts on web servers administered by i7media, LLC. Adult content is not allowed. This includes, but is not limited to, pornographic images, text,
More informationNUCONNECT INTERNET ACCEPTABLE USE POLICY
NUCONNECT INTERNET ACCEPTABLE USE POLICY This Acceptable Use Policy ( AUP ) applies to NUconnect Internet and related services ("Services ) delivered by Newport Utilities. This policy is designed to encourage
More informationPRIMUS ACCEPTABLE USE POLICY
PRIMUS ACCEPTABLE USE POLICY For purposes of this Agreement, You, users, and account holders are used interchangeably, and where applicable. These terms are subject to the Privileges and Immunities of
More informationCommunication and Usage of Internet and Policy
Communication and Usage of Internet and Email Policy Policy Category Administration Policy Code ADM HE 27 Policy owner Chief Executive Officer Responsible Officer Chief Executive Officer Approving authority
More informationII.C.4. Policy: Southeastern Technical College Computer Use
II.C.4. Policy: Southeastern Technical College Computer Use 1.0 Overview Due to the technological revolution in the workplace, businesses such as Southeastern Technical College (STC) have turned to computer
More informationPTLGateway Acceptable Use Policy
1 PTLGateway Acceptable Use Policy Last Updated Date: 02 March 2018 Acceptable Use Policy Your use of our Services must fall within our Acceptable Usage Policy. Contents Key details... 1 COVERAGE OF THIS
More informationYou may contact The Translation Network by at You may also call The Translation Network at
The Translation Network Privacy Policy This is a privacy policy for The Translation Network Group Inc. The Translation Network has created this privacy statement in order to demonstrate its firm commitment
More informationAcceptable Use Policy
IT and Operations Section 100 Policy # Organizational Functional Area: Policy For: Date Originated: Date Revised: Date Board Approved: Department/Individual Responsible for Maintaining Policy: IT and Operations
More informationThe AUP applies to all Snowball products and services but is in particular applicable to internet services.
ACCEPTABLE USAGE POLICY Introduction Snowball is committed to complying with legislation and ensuring all its Customers have the ability to use its network and the Internet without interference or harassment
More informationAnnexure-2. Acceptable User Policy
Annexure-2 Acceptable User Policy I. This Acceptable User Policy ( AUP ) governs the usage of services of Cloud4C ( Services ) pursuant to the Master Services Agreement dated 06-03-2017 entered between
More informationPGTelco Internet TERMS OF SERVICE AND ACCEPTABLE USE POLICIES
PGTelco Internet TERMS OF SERVICE AND ACCEPTABLE USE POLICIES Thank you for choosing a PGTelco Internet as your internet service provider. PGTelco Internet is an affiliate of The Prairie Grove Telephone
More informationAcceptable Use Policy. Effective January 2017
Acceptable Use Policy Effective January 2017 THIS ACCEPTABLE USE POLICY IS A MATERIAL PART OF ANY AGREEMENT WITH STRAIGHTUPNET COMMUNICATIONS FOR PROVISION OF ITS SERVICES TO BUSINESS AND CONSUMER CUSTOMERS.
More informationREGULATION BOARD OF EDUCATION FRANKLIN BOROUGH
R 3321/Page 1 of 6 The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes only. The purpose of providing technology resources
More informationMERIDIANSOUNDINGBOARD.COM TERMS AND CONDITIONS
MERIDIANSOUNDINGBOARD.COM TERMS AND CONDITIONS Introduction This document sets forth the terms and conditions ("Terms and Conditions") governing your use of the MeridianHealth.com Web site ("Web Site")
More informationUCL Policy on Electronic Mail ( )
LONDON S GLOBAL UNIVERSITY UCL Policy on Electronic Mail (EMAIL) Information Security Policy University College London Document Summary Document ID Status Information Classification Document Version TBD
More informationThese terms are current as of November 8, 2018 and are subject to change from time to time. Please visit shaw.ca for the most current Terms of Use.
These terms are current as of November 8, 2018 and are subject to change from time to time. Please visit shaw.ca for the most current Terms of Use. Introduction Thank you for choosing Shaw's Internet Services!
More informationAcceptable Use Policy
Acceptable Use Policy This Acceptable Use Policy is in addition to South Central Communication s Terms of Service and together the documents constitute the Agreement between South Central Communications
More informationAcceptable Use Policies
1. Background Acceptable Use Policies From time to time Luminet may impose reasonable rules and regulations regarding the use of its services. Such rules and regulations are called Acceptable Use Policies
More information: Acceptable Use Policy
: Acceptable Use Policy This Acceptable Use Policy ("Policy") describes the proper and prohibited use of 's Hosting services ("Services") as subscribed to per the Master Service Agreement. This Policy
More informationAcceptable Use Policy Updated 1/16/2018
Acceptable Use Policy Updated 1/16/2018 THIS ACCEPTABLE USE POLICY ( AUP OR POLICY ) IS A MATERIAL PART OF ANY AGREEMENT WITH AIRLINK INTERNET SERVICES, LLC ( AIRLINK ) FOR ACCESS TO AND PROVISION OF BROADBAND
More informationAcceptable Use Policy Internet
1 These terms are current as of November 7, 2017 and are subject to change from time to time. Please visit shaw.ca for the most current Terms of Use. Acceptable Use Policy Internet Introduction Thank you
More informationTERMS & CONDITIONS PLEASE READ THESE TERMS AND CONDITIONS CAREFULLY BEFORE USING THE SITE
TERMS & CONDITIONS PLEASE READ THESE TERMS AND CONDITIONS CAREFULLY BEFORE USING THE SITE 1. General The term PPS refers to: Professional Provident Society Holdings Trust, (The Holding Trust); Professional
More informationBUCKEYE INTERNET SERVICE ACCEPTABLE USE POLICY
BUCKEYE INTERNET SERVICE ACCEPTABLE USE POLICY This ("the Policy") governs use of the Buckeye Internet service ("the Service"). All subscribers to the Service are required to comply with this. Failure
More informationAcceptable Use Policy
Acceptable Use Policy 1. Overview The Information Technology (IT) department s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Quincy College s established
More informationAcceptable Use and Publishing Policy
1. Purpose This Policy outlines the principles, guidelines and requirements of acceptable use of and publishing to ecreators Pty Ltd (ecreators) hosting products and services. The purpose of this Policy
More informationAcceptable Use Policy
Acceptable Use Policy 1. Purpose The purpose of this policy is to outline the acceptable use of computer equipment at Robotech CAD Solutions. These rules are in place to protect the employee and Robotech
More informationCorporate Policy. Revision Change Date Originator Description Rev Erick Edstrom Initial
Corporate Policy Information Systems Acceptable Use Document No: ISY-090-10 Effective Date: 2014-06-10 Page 1 of 5 Rev. No: 0 Issuing Policy: Information Systems Department Policy Originator: Erick Edstrom
More informationWave s High-Speed Internet Service Acceptable Use Policy
Wave s High-Speed Internet Service Acceptable Use Policy Introduction. It is Wave's intent to provide our customers with the best Internet service possible. In order to accomplish this task, we have adopted
More informationInternet, , and Computer Usage Policy
Important disclaimer: The policy available on this page is only an example and is furnished merely as an illustration of its category. It is not meant to be taken and used without consultation with a licensed
More information300 Lena Drive Aurora, Ohio P: F: Page 1 of 5
Privacy MindStreams LLC respects the privacy of users who visit each of the sites within the MindStreams network. No effort is made to identify individuals without their knowledge. The following policies
More informationACCEPTABLE USE ISO INFORMATION SECURITY POLICY. Author: Owner: Organisation: Document No: Version No: 1.0 Date: 10 th January 2010
INFORMATION SECURITY POLICY EMAIL ACCEPTABLE USE ISO 27002 7.1.3 Author: Owner: Organisation: Document No: Chris Stone Ruskwig TruePersona Ltd SP-7.1.3 No: 1.0 Date: 10 th January 2010 Copyright Ruskwig
More informationCleveland State University General Policy for University Information and Technology Resources
Cleveland State University General Policy for University Information and Technology Resources 08/13/2007 1 Introduction As an institution of higher learning, Cleveland State University both uses information
More informationDONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY
DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY Published By: Fusion Factor Corporation 2647 Gateway Road Ste 105-303 Carlsbad, CA 92009 USA 1.0 Overview Fusion Factor s intentions for publishing an
More informationAcceptable Use Policy
Acceptable Use Policy 1. Overview ONS IT s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to ONS established culture of openness, trust and integrity.
More informationViolations of any portion of this policy may be subject to disciplinary action up to and including termination of employment.
Page 1 of 6 Policy: All computer resources are the property of Lee County and are intended to be used for approved County business purposes. Users are permitted access to the computer system to assist
More informationBreckenridge Financial Supplies Website Use Policy
Breckenridge Financial Supplies Website Use Policy Revised January 2014 Thank You for visiting the Breckenridge Financial Supplies Website (the Website ) and reviewing our Online Website Use and Privacy
More informationamaysim NBN Broadband Fair Go Policy Valid as of May 2017
Valid as of May 2017 Table of Contents 1. ABOUT THIS POLICY 2 2. GENERAL 2 3. ILLEGAL ACTIVITY 3 4. SECURITY 3 5. RISKS OF THE INTERNET 4 6. CONTENT PUBLISHING 5 7. ELECTRONIC MESSAGING 6 8. ONLINE FORUMS
More informationAcceptable Usage Policy
High Quality Web Hosting Acceptable Usage Policy Serventus Inc. (www.serventus.com) Content Introduction... 2 Prohibited Content... 3 Users Security Obligation... 3 Network Abuse... 3 Intellectual Property
More informationKeystone Acceptable Use Policy
Keystone Acceptable Use Policy Keystone Learning Services, ("Keystone") Acceptable Use Policy ("AUP") is intended for Keystone products and services with the goal of protecting Keystone Subsidiaries, Affiliates,
More informationComputer Use and File Sharing Policy
Computer Use and File Sharing Policy Williamson College recognizes the value of computer and other electronic resources to improve student learning and enhance the administration and operation of its school.
More informationAcceptable Use Policy
Acceptable Use Policy. August 2016 1. Overview Kalamazoo College provides and maintains information technology resources to support its academic programs and administrative operations. This Acceptable
More informationAcceptable Use Policy
Acceptable Use Policy Effective: September 2, 2016 Purpose Montreat College is committed to protecting its employees, partners, and itself from illegal or damaging actions by individuals, either knowingly
More informationTERMS OF USE FOR NAT TRAVERSAL FUNCTION TRIAL VERSION
TERMS OF USE FOR NAT TRAVERSAL FUNCTION TRIAL VERSION THESE TERMS OF USE INCLUDE IMPORTANT LEGAL INFORMATION REGARD- ING YOUR ACCESS AND USE OF THIS FUNCTION. PLEASE READ THEM CARE- FULLY BEFORE PROCEEDING.
More informationThe following is the Lightning IP Acceptable Usage Policy ( AUP ) for all Users of the Lightning IP Services. In General
The following is the Lightning IP Acceptable Usage Policy ( AUP ) for all Users of the Lightning IP Services. While Lightning IP does not normally monitor the stored content or transmissions of its Users,
More informationMANAGED HOSTING ACCEPTABLE USE POLICY
MANAGED HOSTING ACCEPTABLE USE POLICY Providing High Availability Systems and Solutions by Maintaining Highest Levels of Uptime using All-Inclusive Managed IT Services Updated Date: 12/31/2010 CCNet Managed
More informationE RADAR. All Rights Reserved. Acceptable Use Policy
Email Acceptable Use Policy For further help, please contact support@eradar.eu Item Number LD 0002 Author E RADAR LIMITED Disclaimer This template is provided with the understanding that the publisher
More informationWAFA X3 Evolution Grade of Service. 13 October 2008
Evolution Grade of Service 13 October 2008 1 Grades of Service at a glance The following table (Figure 1) highlights the various Grades of Service that are available on the Evolution Service. It enables
More informationAcceptable Usage Policy Published by FirstNet March 2015
Acceptable Usage Policy (AUP) General Notice Thank you for reading FirstNet's Acceptable Use Policy (AUP). By accessing this website, or by contracting with us for service, you agree, without limitation
More information13. Acceptable Use Policy
13. Acceptable Use Policy Purpose Indian River State College s intention for publishing an Acceptable Use Policy is to outline the acceptable use of computer equipment and services at Indian River State
More informationAcceptable Use Policy
Acceptable Use Policy Introduction and Scope General: This Acceptable Use Policy ( AUP ) sets forth acceptable practices relating to the use of the Crown Castle entities (collectively, Crown Castle ) Internet
More informationAcceptable Use Policy for EWC HousingNet Internet Service Customers
Acceptable Use Policy for EWC HousingNet Internet Service Customers 1. INTRODUCTION AND COVERAGE General This Acceptable Use Policy (AUP) governs the use of the EWC HousingNet resources and is in place
More informationICT Acceptable Use Policy for Students
ICT Acceptable Use Policy for Students a 52 Eurobin Avenue, Manly NSW 2095 t +61 2 9977 5144 f +61 2 9976 2753 cricos 03290E e administration@stellamaris.nsw.edu.au w www.stellamaris.nsw.edu.au abn 88
More informationAcceptable Use Policy
Acceptable Use Policy OneCommunity uses various upstream providers to provide subscribers with direct access to the Internet via OneCommunity network services. Therefore, OneCommunity Subscribers use of
More informationNETCOM.cm Acceptable Use Policy
NETCOM.cm Acceptable Use Policy ANTIC, (l Agence Nationale des Technologies de l Information et de la Communication), the Cameroon National Agency for Information and Communication Technologies, is the
More informationACCEPTABLE USE POLICY
Background FireNet s Acceptable Use Policy (AUP) is designed to provide a clear understanding of the rules, regulations and restrictions regarding the use of FireNet s services. By registering for and
More informationDraft. Policies of Colorado State University University Policy. Category: Information Technology
Policies of Colorado State University University Policy Policy Title: Acceptable Use for Computing and Networking Resources Category: Information Technology Owner: Vice President for Information Technology
More informationEach member of the St. Margaret s Community has the privilege to access Google Apps provided by the school s network
NETWORK APPROPRIATE USE AGREEMENT 2018-2019 We are pleased to offer students of St. Margaret s School access to our computer network for electronic mail and the Internet. To gain access to e-mail and the
More informationMON-CRE TELEPHONE COOPERATIVE, INC. ACCEPTABLE USE POLICY
MON-CRE TELEPHONE COOPERATIVE, INC. ACCEPTABLE USE POLICY By ordering and using Internet services (the Service ) from Mon-Cre Telephone Cooperative, Inc. ( Mon-Cre ) you agree to abide by this Acceptable
More informationTerms Of Use AGREEMENT BETWEEN USER AND DRAKE MODIFICATION OF THESE TERMS OF USE LINKS TO THIRD PARTY WEB SITES USE OF COOKIES
Terms Of Use AGREEMENT BETWEEN USER AND DRAKE This website and other related websites and mobile applications (collectively referred to as "Sites") comprise various web pages and services operated by Drake
More informationAcceptable Use Policy
Acceptable Use Policy POLICY 07.01.01 Effective Date: 01/01/2015 The following are responsible for the accuracy of the information contained in this document Responsible Policy Administrator Information
More informationResidential Acceptable Use Policy
Residential Acceptable Use Policy This following are policies ("these Policies") for use of the Operator Internet access service that is provided, through cable modems, to cable television system subscribers.
More informationGrades of Service at a glance
1st August 2013 Grades of Service at a glance The following table (Figure 1) highlights the various Grades of Service that are available on the Bentley X3 Evolution Service. It enables people to easily
More informationUSAGE POLICIES. is defamatory, offensive, abusive, indecent, obscene, or constitutes harassment;
USAGE POLICIES Any terms in capitals not defined in these Usage Policies will have the same meaning as in your Contract. These Usage Policies apply to you and anybody you allow to use NOW Broadband and
More informationThe Safe and Sound Services are available for individuals aged 18 years or older.
Safe and Sound Terms of Use Altech Netstar (Pty) Ltd and its affiliates ("ALTECH NETSTAR," "we" or "us") provide amongst other services telematics and ancillary products and services, including, but not
More informationTELEPHONE AND MOBILE USE POLICY
TELEPHONE AND MOBILE USE POLICY Date first approved: 9 December 2016 Date of effect: 9 December Date last amended: (refer Version Control Table) Date of Next Review: December 2021 First Approved by: University
More informationTERMS OF USE Terms You Your CMT Underlying Agreement CMT Network Subscribers Services Workforce User Authorization to Access and Use Services.
TERMS OF USE A. PLEASE READ THESE TERMS CAREFULLY. YOUR ACCESS TO AND USE OF THE SERVICES ARE SUBJECT TO THESE TERMS. IF YOU DISAGREE OR CANNOT FULLY COMPLY WITH THESE TERMS, DO NOT ATTEMPT TO ACCESS AND/OR
More informationAPPLICATION TO OPEN PORTS THROUGH THE FIREWALL
P: +61 2 9231 3644 E: admin@ccl.com.au W: www.ccl.com.au A.B.N. 72 000 111 Level 1 Selborne Chambers 174 Phillip Street Sydney NSW 2000 APPLICATION TO OPEN PORTS THROUGH THE FIREWALL Only outbound data
More informationACCEPTABLE USE POLICY (AUP) 3W INFRA reserves the right to unilaterally amend the conditions set out in the Acceptable Use Policy (the Policies ).
ACCEPTABLE USE POLICY (AUP) 1. SERVICE AGREEMENT 3W INFRA and CUSTOMER have executed a Service Agreement (the Agreement ). The Parties agree that the terms and conditions of the Agreement govern this document.
More informationStaff Information System Acceptable Use Policy
Staff Information System Acceptable Use Policy Hing Shung Chan Vice President of Information Technology Information Security Officer Table of Contents I. Definitions II. Rights and Responsibilities III.
More informationINTERNET ACCESS SERVICE AGREEMENT PLEASE READ CAREFULLY
INTERNET ACCESS SERVICE AGREEMENT PLEASE READ CAREFULLY Plains Communication Services ( PCS ), LLC and Plainstel.com provides its subscribers with access to the Internet only on the terms and conditions
More informationTerms and Conditions
1. ACCEPTANCE OF TERMS Terms and Conditions ASME Human Powered Vehicle (HPVC) Challenge is open to all ME/Multidisciplinary Engineering and Technology undergraduate students, subject to the following Terms
More informationHerkimer County Community College. Department of Information Services Computer Use Policy and Guidelines
Herkimer County Community College I. General Information: Department of Information Services Computer Use Policy and Guidelines Computer resources are provided to members of the HCCC community for use
More informationJacksonville State University Acceptable Use Policy 1. Overview 2. Purpose 3. Scope
Jacksonville State University Acceptable Use Policy 1. Overview Information Technology s (IT) intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Jacksonville
More informationCOMPUTER USE POLICY Staff
COMPUTER USE POLICY Staff Introduction The Pontifical Council for Social Communications (2002) has acknowledged the powerful contribution that the Internet 1 can make to the development of human life and
More information2.1 Website means operated and owned by UCS Technology Services, including any page, part of element thereof;
WEBSITE USAGE TERMS AND CONDITIONS Acceptable Usage Terms 1. Introduction 1.1 By accessing the UCS Technology Services website, web pages or any part thereof for any reason whatsoever, the User agrees
More informationElectronic Network Acceptable Use Policy
Electronic Network Acceptable Use Policy 2016-2017 www.timothychristian.com ELECTRONIC NETWORK ACCEPTABLE USE POLICY Electronic Network This Policy is intended to serve as a guide to the scope of TCS s
More informationTerms and Conditions 01 January 2016
Terms and Conditions 01 January 2016 thehealthsource: Terms and Conditions Page 1 of 7 This Agreement (the Agreement ) is entered into by and between thehealthsource (Pty) Ltd and the entity agreeing to
More informationBroadband Internet Access Agreement
Broadband Internet Access Agreement You are expected to use the Internet with respect, courtesy, and responsibility, giving due regard to the rights of other Internet users. We expect you to have a basic
More informationAcceptable Use Policy (AUP) For ALL Technology Items, , and Wireless Devices within Hubbard ISD
General User Policy Acceptable Use Policy (AUP) For ALL Technology Items, E-Mail, and Wireless Devices within Hubbard ISD NETWORK AND INTERNET ACCESS Hubbard ISD provides many tools to its employees and
More informationShout! Radio Automation Terms Of Service
Shout! Radio Automation Terms Of Service -------------------------------------------------------------------------------- version 1.1 support@shoutautomation.com Created 1/1/2010 Revised 2/26/2012 (Revisions
More informationUse of College Electronic Communication Services
Use of College Electronic Communication Services Palmer College of Chiropractic (College) provides telephone, voice mail, facsimile, computer, software, network and Internet services to employees and students
More informationUSE POLICY. iprimus.com.au
ACCEPTABLE USE POLICY iprimus.com.au iprimus ACCEPTABLE USE POLICY 1. ABOUT THIS POLICY This document is the iprimus Acceptable Use Policy (Policy). In this Policy you and your mean the Customer; and iprimus,
More information2. VIOLATIONS OF ACCESSHOSTING.COM S ACCEPTABLE USE POLICY. b. Harm to minors. Using the Services to harm, or attempt to harm, minors in any way.
1. INTRODUCTION Accesshosting.com's ("AUP") is intended to help enhance the use of the Access Hosting Service by preventing unacceptable use. All users of Accesshosting.com s Access Hosting Services (the
More information