3. Fee. You are entitled to use the Equipment without cost so long as you abide by the terms and conditions of this Agreement.

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "3. Fee. You are entitled to use the Equipment without cost so long as you abide by the terms and conditions of this Agreement."

Transcription

1 Last Name, First Name THE CITY UNIVERSITY OF NEW YORK Notebook Computer License Agreement This document describes the license agreement between The City University of New York ( CUNY ) and the individual Macaulay Honors College student named below ( you or Student ). Student: Address: MHC Campus: Licensed Equipment. The Equipment is owned by CUNY and licensed to you pursuant to the terms of this Agreement. The licensed equipment ( Equipment ) is as follows: Apple MacBook Pro 2.26 GHz Intel Core Duo, 13.3" TFT display CUNY Tag # Serial # 2GB 1066MHz DDR3 SDRAM - 2x1GB 160GB Serial ATA 5400 rpm SuperDrive 8x (DVD±R DL/DVD±RW/CD-RW) Additional Licensed Software: Microsoft Office 2008 Norton Anti-virus iwork 2. Term. The Equipment is licensed to you for as long as you are a participant in good standing in the Macaulay Honors College. You will use the Equipment you receive as a freshman for three years as long as you remain an Honors College student in good standing. At the end of the third year, you may purchase the Equipment (and a license to continue using the Included Software, see Section 8 below) for one dollar ($1.00). 3. Fee. You are entitled to use the Equipment without cost so long as you abide by the terms and conditions of this Agreement. 4. Use of the Equipment. The Equipment is provided to you for your use while a participant in the Macaulay Honors College. By accepting the Equipment and signing this Agreement, you agree that during the term of the Agreement you will abide by the following rules: (c) (d) (e) You will use the Equipment only in connection with your enrollment in the Macaulay Honors College. You will not permit any other person to possess or use the Equipment. You will not sell, lease, license or otherwise grant anyone rights to the Equipment. You will follow the CUNY Computer User Responsibilities, a copy of which is attached as Appendix A. You must comply with the limitations described in the Microsoft Campus Agreement and the CUNY Computer User Responsibilities, in addition to other policies and procedures all posted on the Macaulay website at 1

2 5. Care of the Equipment. (c) (d) You are responsible for the care of the Equipment and must keep it in good working condition. If the Equipment malfunctions or is damaged, you are responsible for arranging repairs. The notebook computer provided by this Agreement is covered for the term of this License by an extended warranty ( AppleCare ) purchased by CUNY from Apple Computer, Inc. This three-year warranty covers defects in materials and workmanship, as determined by Apple Computer, Inc. If you encounter difficulties with your Equipment, you should first consult the Instructional Technology Fellow at your campus Honors College office. If a repair is necessary, you will be instructed to call Apple Education Technical Support at , option 3, or to visit an Apple Store or an Apple Authorized Repair Center. Any incident of Equipment loss or theft must be reported to the Macaulay Honors College as soon as possible, but no later than 48 hours after the incident. All cases of loss or theft will be fully investigated by CUNY Security and by the police. You will be asked to check in the Equipment with the Macaulay Honors College once a year so that CUNY can ensure asset protection. Failure to comply with this requirement may result in a fine or the revocation of your privilege to remove the laptop from your campus or use it when classes are not in session. You are responsible for all data backups. CUNY will not be responsible for data loss due to hardware failure, software failure, or any other issue. 6. Modification of the Equipment. You may not alter or modify the Equipment. You may not add any software or hardware without the permission of the Macaulay Honors College. 7. Change in Status. If you are dismissed or you withdraw from the Honors College program, you must immediately return the Equipment to the Macaulay Honors College. Failure to return the Equipment may result in criminal prosecution or civil liability. 8. Use of Included Software. The notebook computer you receive as part of the Equipment will be loaded with certain computer software programs, and additional software may be added by CUNY during the term of this Agreement (collectively, the "Included Software"). You are provided with the Included Software on the basis of your status as a participant in the Honors College. You must comply with any software licenses applicable to the Included Software. If you choose to purchase the Equipment for one dollar ($1.00) after three years, you will gain title and rights to the Equipment, and license to use the Included Software. 9. Limitation of Liability. CUNY is not responsible or accountable to you for any loss, damage, claim, demand, liability, cost or expense of any nature or kind, including indirect, special or consequential damages, arising directly or indirectly out of your possession, use, control or operation of the Equipment, including those resulting from the inadequacy of the Equipment, or the results obtained from it, or any defect in it, or from mechanical failures of the Equipment, loss of data, or from interruption of information technology use while such failures are being remedied or while other repairs and/or maintenance are being performed. 2

3 10. Default. You will be in default of this Agreement if (i) you fail to care for and maintain the condition of the Equipment; (ii) you loan or make any other transfer of the Equipment; or (iii) you violate any of the other terms or conditions of this Agreement. A default may result in criminal prosecution or civil liability. In addition, upon your default, CUNY has the right to take immediate possession of the Equipment. Student Signature I have read this Agreement and its attachments and agree to abide by its terms and conditions. Student's Name (print) Parent s Name (if student is under age 18) Signature Parent s Signature (if student is under age 18) CUNY Signature The City University of New York By: Title 3

4 APPENDIX A CUNY COMPUTER USER RESPONSIBILITIES NOTE: The City University of New York Computer User Responsibilities is a statement originally prepared by the University's Computer Policy Committee. It underwent review by the University Faculty Senate and the CUNY Office of the Vice Chancellor for Legal Affairs. The computer resources** of The City University of New York must be used in a manner that is consistent with the University's educational purposes and environment. All users of computer resources are expected to act in a spirit of mutual respect and cooperation, and to adhere to the regulations for their use set forth in this document. As a user of CUNY computer resources: You must have a valid authorized account to use computer resources that require one and may use only those computer resources that are specifically authorized. You may use your account only in accordance with its authorized purposes and may not use an unauthorized account for any purpose. You are responsible for the safeguarding of your computer account. For a mainframe computer account, you should change your password frequently and should not disclose it to anyone. You should take all necessary precautions in protecting the account, no matter what type of computer resources you are using. You may not circumvent system protection facilities. You may not knowingly use any system to produce system failure or degraded performance. You may not engage in unauthorized duplication, alteration or destruction of data, programs or software. You may not transmit or disclose data, programs or software belonging to others and may not duplicate copyrighted material. You may not engage in abusive or improper use of computer hardware. This includes, but is not limited to, tampering with equipment, unauthorized attempts at repairing equipment and unauthorized removal of equipment components. You may not use computer resources for private purposes, including, but not limited to, the use of computer resources for profit making or illegal purposes. You may not use computer resources to engage in abuse of computer personnel or other users. Such abuse includes the sending of abusive, anonymous, or unsolicited messages within CUNY or beyond via network facilities. The use of college computer resources may be subject to college regulations, and you are expected to be familiar with those regulations. These regulations and college regulations are subject to revision. You are expected to be familiar with any revisions in regulations. 4

5 The University reserves the right to monitor, under appropriate conditions, all data contained in the system to protect the integrity of the system and to insure compliance with regulations. Any user who is found to be in violation of these rules shall be subject to the following: Suspension and/or termination of computer privileges; Disciplinary action by appropriate college and/or University officials; Referral to law enforcement authorities for criminal prosecution; Other legal action, including action to recover civil damages and penalties. ******* ** "Computer Resources" is an inclusive term referring to any and all computing/information technology: hardware, software and access. Hardware includes, but is not limited to, terminals, personal computers, workstations, printers, mice, monitors, cabling, peripheral devices. Software includes, but is not limited to, mainframe shared software, networked software, and stand-alone software residing on personal computers. Access includes, but is not limited to, accounts on timesharing systems as well as access to stand-alone personal computing systems and other relevant technology. Revised 1/95 If you have any questions about the statement please contact the CUNY Help Desk at or via 5

Administrative Procedure 3720 Computer and Network Use

Administrative Procedure 3720 Computer and Network Use Reference: 17 U.S.C. Section 101 et seq.; Penal Code Section 502, Cal. Const., Art. 1 Section 1; Government Code Section 3543.1(b); Federal Rules of Civil Procedure, Rules 16, 26, 33, 34, 37, 45 The District

More information

Appendix I. The City University of New York Policy on Acceptable Use of Computer Resources

Appendix I. The City University of New York Policy on Acceptable Use of Computer Resources Appendix I The City University of New York Policy on Acceptable Use of Computer Resources Introduction CUNY s computer resources are dedicated to the support of the university s mission of education, research

More information

INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security

INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security State Fair Community College shall provide a central administrative system for use in data collection and extraction. Any system user

More information

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Software Policy Number: 04.71.12 Issuing Authority: Office of the Vice President for Computer & Financial Services and CIO Responsible Officer: Vice

More information

Coppin State University Title: CSU Faculty/Staff Computer Use and Internet Access Policy

Coppin State University Title: CSU Faculty/Staff Computer Use and Internet Access Policy 1.0 PURPOSE To establish a policy to ensure the proper use of Coppin State University s computer and network resources and services by its employees, students, independent contractors and other computer

More information

RESPONSIBLE COMPUTER USE POLICY (ADOPTED AUGUST 3, 2006)

RESPONSIBLE COMPUTER USE POLICY (ADOPTED AUGUST 3, 2006) RESPONSIBLE COMPUTER USE POLICY (ADOPTED AUGUST 3, 2006) on-line at www.ccc.edu I. INTRODUCTION All users shall abide by the following provisions contained herein, or otherwise may be subject to disciplinary

More information

Information Technology Security Policies

Information Technology Security Policies Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral

More information

Use of ESF Computing and Network Resources

Use of ESF Computing and Network Resources Use of ESF Computing and Network Resources Introduction: The electronic resources of the State University of New York College of Environmental Science and Forestry (ESF) are powerful tools, shared among

More information

THE CITY UNIVERSITY OF NEW YORK POLICY ON ACCEPTABLE USE OF COMPUTER RESOURCES

THE CITY UNIVERSITY OF NEW YORK POLICY ON ACCEPTABLE USE OF COMPUTER RESOURCES THE CITY UNIVERSITY OF NEW YORK POLICY ON ACCEPTABLE USE OF COMPUTER RESOURCES I. INTRODUCTION CUNY s computer resources are dedicated to the support of the University s mission of education, research

More information

Riverside Community College District Policy No. 3720 General Institution

Riverside Community College District Policy No. 3720 General Institution Riverside Community College District Policy No. 3720 General Institution BP 3720 COMPUTER AND NETWORK USE References: Education Code Section 72400 Penal Code 502 17 U.S. Code Sections 101, et seq. It shall

More information

BEConnected User Agreement

BEConnected User Agreement BEConnected User Agreement Page 1 of 5 INTRODUCTION This is a legal document between you and the owner ( Belmont College ) of the Apple ipad tablet ( ipad ) in connection with the delivery of an ipad to

More information

Caldwell Community College and Technical Institute

Caldwell Community College and Technical Institute Caldwell Community College and Technical Institute Employee Computer Usage Policies and Procedures I. PURPOSE: The purpose of this section is to define the policies and procedures for using the administrative

More information

Computer and Network Use

Computer and Network Use AP 3720 Computer and Network Use Reference: Education Code Section 70902; Board Policies 3720, 4030; Title 5 Sections 58050, 58164, 58168, 58170, 58172; Federal Rules of Civil Procedure, Rules 16, 26,

More information

Use of Information Technology Resources

Use of Information Technology Resources Title Policy Area Policy Number (to be assigned by Information Services) See also (related policies) Use of Information Technology Resources Operations College Systems and Resources E.5.1 Sexual Violence

More information

Information Resources Security Guidelines

Information Resources Security Guidelines Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive

More information

The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3

The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3 Table of Contents 1 Acceptable use 1 Violations 1 Administration 1 Director and Supervisor Responsibilities 1 MIS Director Responsibilities 1 The Internet and e-mail 2 Acceptable use 2 Unacceptable use

More information

HIPAA Security Training Manual

HIPAA Security Training Manual HIPAA Security Training Manual The final HIPAA Security Rule for Montrose Memorial Hospital went into effect in February 2005. The Security Rule includes 3 categories of compliance; Administrative Safeguards,

More information

Policy for the Acceptable Use of Information Technology Resources

Policy for the Acceptable Use of Information Technology Resources Policy for the Acceptable Use of Information Technology Resources Purpose... 1 Scope... 1 Definitions... 1 Compliance... 2 Limitations... 2 User Accounts... 3 Ownership... 3 Privacy... 3 Data Security...

More information

ipad Acceptable Use Regulation

ipad Acceptable Use Regulation ipad Acceptable Use Regulation The Mamaroneck School District has purchased Apple ipads for selected students of the Mamaroneck School District. These students will be issued ipads with predetermined applications

More information

One-to-One Technology Initiative Table of Contents

One-to-One Technology Initiative Table of Contents One-to-One Technology Initiative Table of Contents 1. Acceptable Use... 2-4 General Staff Responsibilities Parent and Guardian Responsibilities User Responsibilities Consequences 2. ipad Identification

More information

Hardware and Software

Hardware and Software Hardware and Software Purpose Bellevue School District (BSD) provides and requires faculty, staff and students to use data processing equipment and peripherals. BSD maintains multiple computer systems

More information

TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320

TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320 TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320 The Edgecombe County Board of Education (the Board ) provides its students and staff access to a variety of technological resources. These resources

More information

University of Hartford. Software Management and Compliance Guidelines

University of Hartford. Software Management and Compliance Guidelines University of Hartford Software Management and Compliance Guidelines This policy is issued in an effort to remind the University community of the importance of complying with that policy and to reiterate

More information

NIAGARA COLLEGE OF APPLIED ARTS & TECHNOLOGY 300 Woodlawn Road Welland, ON L3C 7L3 LAPTOP COMPUTER AGREEMENT & SUPPLEMENTARY GUIDELINES

NIAGARA COLLEGE OF APPLIED ARTS & TECHNOLOGY 300 Woodlawn Road Welland, ON L3C 7L3 LAPTOP COMPUTER AGREEMENT & SUPPLEMENTARY GUIDELINES NIAGARA COLLEGE OF APPLIED ARTS & TECHNOLOGY 300 Woodlawn Road Welland, ON L3C 7L3 LAPTOP COMPUTER AGREEMENT & SUPPLEMENTARY GUIDELINES This COMPUTER AGREEMENT (this Agreement ) is made effective as of,

More information

OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY

OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY 1. Purpose Oxford Community Schools (the District ) recognizes that advancements in technology affect the

More information

Bates Technical College. Information Technology Acceptable Use Policy

Bates Technical College. Information Technology Acceptable Use Policy Bates Technical College Information Technology Acceptable Use Policy Consistent with policy adopted by the Board of Trustees, Bates Technical College, hereinafter referred to as the College, has a commitment

More information

WYOMING CENTER FOR LEGAL AID

WYOMING CENTER FOR LEGAL AID (Please Print Information Below) WYOMING CENTER FOR LEGAL AID Skype Clinic Laptop and Printer Loan Agreement Site Host Host Organization Mailing Address Contact Phone Number City, State, ZIP Fax Number

More information

DATA ACCESS POLICY. Attached is a policy statement regarding data access at the New Jersey Institute of Technology.

DATA ACCESS POLICY. Attached is a policy statement regarding data access at the New Jersey Institute of Technology. DATA ACCESS POLICY As NJIT has moved to a distributed data access environment, policy has been established to protect the computer-based institutional data from unauthorized (c.q. other improprietary)

More information

Code of Virginia, 1950, as amended, Sections 18.2 372, 18.2 374.1:1, 18.2 390, 22.1 70.2, and 22.1 78

Code of Virginia, 1950, as amended, Sections 18.2 372, 18.2 374.1:1, 18.2 390, 22.1 70.2, and 22.1 78 Book Section Title Number Status SCS Policy Manual I INSTRUCTION Acceptable Use of Electronic Network Resources and Internet Safety IIBEA * R Active Legal 18 U.S.C. Sections 1460 and 2256 47 U.S.C. Section

More information

EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197

EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197 (Return this page to the Executive Staff member or Principal) MEMPHIS CITY SCHOOLS EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197 As a condition of using the MCS network, I

More information

William Jewell College Jewellverse Policies

William Jewell College Jewellverse Policies William Jewell College Jewellverse Policies Prior to receiving a William Jewell College network account, all students, faculty and staff are required to read and sign the College s Acceptable Use Policy.

More information

SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE

SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE Page 1 of 8 I. PURPOSE To outline the University's policies for students, faculty, staff and others, concerning the use of the University's computing and communication resources, including those dealing

More information

Responsible Use of Technology and Information Resources

Responsible Use of Technology and Information Resources Responsible Use of Technology and Information Resources Introduction: The policies and guidelines outlined in this document apply to the entire Wagner College community: students, faculty, staff, alumni

More information

New York State Office Of Children And Family Services VPN

New York State Office Of Children And Family Services VPN CLIENT VPN New York State Office Of Children & Family Services New York State Office of Children & Family Services (OCFS) Client Virtual Private Network (VPN) Access to the Human Services Enterprise Network

More information

Claremont Graduate University and The Claremont Colleges Policy Regarding Appropriate Use of Campus Computing and Network Resources

Claremont Graduate University and The Claremont Colleges Policy Regarding Appropriate Use of Campus Computing and Network Resources Claremont Graduate University and The Claremont Colleges Policy Regarding Appropriate Use of Campus Computing and Network Resources An overall guiding mission of The Claremont Colleges is education in

More information

TEKAMAH-HERMAN COMMUNITY SCHOOLS LEARNING INITIATIVE POLICY AND PROCEDURES 2014-2015

TEKAMAH-HERMAN COMMUNITY SCHOOLS LEARNING INITIATIVE POLICY AND PROCEDURES 2014-2015 TEKAMAH-HERMAN COMMUNITY SCHOOLS LEARNING INITIATIVE POLICY AND PROCEDURES 2014-2015 Tekamah-Herman Community Schools is proud to offer our High School Students Apple MacBook Air computers for use at school

More information

III. RESPONSIBILITIES

III. RESPONSIBILITIES Issued by: Calvin O. Butts, III, President Effective Date: September 23, 2013 Page 1 of 5 I. POLICY & SCOPE This is the SUNY College at Old Westbury policy on College-provided access to electronic information

More information

COLORADO STATE UNIVERSITY SYSTEM

COLORADO STATE UNIVERSITY SYSTEM Board Policy: The purpose of this ipad Usage Policy is to establish guidelines and procedures for staff and Board members of the Colorado State University System (CSUS) to implement the efficient use of

More information

Valdosta State University. Information Resources Acceptable Use Policy

Valdosta State University. Information Resources Acceptable Use Policy Valdosta State University Information Resources Acceptable Use Policy Date: December 10, 2010 1. OVERVIEW... 3 2. SCOPE... 3 3. DESIGNATION OF REPRESENTATIVES... 3 3.1 UNIVERSITY PRESIDENT... 3 3.2 VICE

More information

STATE UNIVERSITY OF NEW YORK AT BROOKLYN DOWNSTATE MEDICAL CENTER COMPUTER and NETWORK USAGE POLICY I. INTRODUCTION

STATE UNIVERSITY OF NEW YORK AT BROOKLYN DOWNSTATE MEDICAL CENTER COMPUTER and NETWORK USAGE POLICY I. INTRODUCTION STATE UNIVERSITY OF NEW YORK AT BROOKLYN DOWNSTATE MEDICAL CENTER COMPUTER and NETWORK USAGE POLICY I. INTRODUCTION Access to modern information technology is essential to the state university mission

More information

TELECOMMUNICATION PLAN AND ELECTRONIC COMMUNICATION USE 8.60+

TELECOMMUNICATION PLAN AND ELECTRONIC COMMUNICATION USE 8.60+ TELECOMMUNICATION PLAN AND ELECTRONIC COMMUNICATION USE 8.60+ BYOD (Bring Your Own Device) Technology Acceptable Use Washington District Schools provides all students access to technology, the district

More information

Purchase College Mobile Computing Device Usage Policy Purpose

Purchase College Mobile Computing Device Usage Policy Purpose Purchase College Mobile Computing Device Usage Policy Purpose This policy offers some best practices regarding the use and safekeeping of laptops, tablets, and mobile computing devices, and governs the

More information

Boston Public Schools. Guidelines for Implementation of Acceptable Use Policy for Digital Information, Communication, and. Technology Resources

Boston Public Schools. Guidelines for Implementation of Acceptable Use Policy for Digital Information, Communication, and. Technology Resources Boston Public Schools Guidelines for Implementation of Acceptable Use Policy for Digital Information, Communication, and Scope of Policy Technology Resources ACCEPTABLE USE POLICY AND GUIDELINES Boston

More information

Appropriate Use of Campus Computing and Network Resources

Appropriate Use of Campus Computing and Network Resources The Claremont Colleges Policy Regarding Appropriate Use of Campus Computing and Network Resources Approved by the Council of The Claremont Colleges on 08/20/04 An overall guiding mission of The Claremont

More information

KINGS COUNTY OFFICE OF EDUCATION ACCEPTABLE USE POLICY

KINGS COUNTY OFFICE OF EDUCATION ACCEPTABLE USE POLICY KINGS COUNTY OFFICE OF EDUCATION ACCEPTABLE USE POLICY 1. Internet access is provided by Kings County Office of Education (KCOE). In order to utilize this service, users must agree and abide by this acceptable

More information

Information Security Handbook

Information Security Handbook Information Security Handbook Adopted 6/4/14 Page 0 Page 1 1. Introduction... 5 1.1. Executive Summary... 5 1.2. Governance... 5 1.3. Scope and Application... 5 1.4. Biennial Review... 5 2. Definitions...

More information

COMPUTER USE POLICY. 1.0 Purpose and Summary

COMPUTER USE POLICY. 1.0 Purpose and Summary COMPUTER USE POLICY 1.0 Purpose and Summary 1. This document provides guidelines for appropriate use of the wide variety of computing and network resources at Methodist University. It is not an all-inclusive

More information

PURPOSE To establish standards for the use of College networks and computer accounts.

PURPOSE To establish standards for the use of College networks and computer accounts. IT 01 Classification: Responsible Authority: Executive Sponsor: Approval Authority: Date First Approved: 1998.03.02 Date Last Reviewed: 2011.11.23 Mandatory Review Date: 2016.11.23 Acceptable Use of Computer

More information

2.5.1 Policy on Responsible Use of University Computing Resources Introduction This policy governs the proper use and management of all University of

2.5.1 Policy on Responsible Use of University Computing Resources Introduction This policy governs the proper use and management of all University of 2.5.1 Policy on Responsible Use of University Computing Resources Introduction This policy governs the proper use and management of all University of San Diego computing and network resources. This policy

More information

Autodesk EMEA Campus License Agreement

Autodesk EMEA Campus License Agreement IMPORTANT. BY SIGNING THIS LICENSE AGREEMENT, INSTITUTION AGREES TO BE BOUND BY THE TERMS AND CONDITIONS OF THIS EMEA CAMPUS LICENSE AGREEMENT ( LICENSE AGREEMENT ). THESE ARE THE ONLY TERMS UPON WHICH

More information

Decatur Public Schools Microsoft Surface Pro 3 Tablet Acceptable Use Policy and Procedures

Decatur Public Schools Microsoft Surface Pro 3 Tablet Acceptable Use Policy and Procedures Decatur Public Schools Microsoft Surface Pro 3 Tablet Acceptable Use Policy and Procedures 2016-2017 DPS Tablet Assigned to: Tablet TAG: Serial Number: Revised May 2016 Distribution of Devices Surface

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Department of Information Technology Olivet Nazarene University (815) 939-5302 Published August 2013 Ver. 4.0 Policy Overview 1. Executive Summary This summary is intended to present

More information

All individuals with access to Twin Falls School District technology and computer networks will:

All individuals with access to Twin Falls School District technology and computer networks will: Twin Falls School District #411 Computer and Network Use Policy 201 Main Avenue West Twin Falls, Idaho 83301 Telephone: 208-733-6900 Fax: 208-733-6987 Technology users responsibilities go beyond general

More information

Delaware State University Policy

Delaware State University Policy Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message

More information

Eastwood Local Schools Laptop Policies and Handbook

Eastwood Local Schools Laptop Policies and Handbook Eastwood Local Schools Laptop Policies and Handbook Table of Contents Program Overview - 3 Acceptable Use Policy - 4 Information Technology Resources Responsibilities & Agreement - 7 District Laptop Service

More information

Covered California. Terms and Conditions of Use

Covered California. Terms and Conditions of Use Terms and Conditions of Use Contents: Purpose Of This Agreement Privacy Policy Modification Of This Agreement Permission To Act On Your Behalf How We Identify You Registration Additional Terms For Products

More information

OCS Student / Parent Laptop Agreement

OCS Student / Parent Laptop Agreement OCS Student / Parent Laptop Agreement Terms and Conditions of Use By signing this form, the student and the student s parent/guardian certify that they have thoroughly read, understand, and accept the

More information

Franciscan University of Steubenville Information Security Policy

Franciscan University of Steubenville Information Security Policy Franciscan University of Steubenville Information Security Policy Scope This policy is intended for use by all personnel, contractors, and third parties assisting in the direct implementation, support,

More information

InnoCaption TM Service Terms of Use

InnoCaption TM Service Terms of Use PRIOR TO USING THE INNOCAPTION SERVICE YOU MUST REVIEW AND AGREE TO THE TERMS AND CONDITIONS OF THIS SERVICE AGREEMENT ( AGREEMENT ) BY COMPLETING YOUR REGISTRATION ( SIGN UP ) FOR INNOCAPTION SERVICE.

More information

REEF-SUNSET UNIFIED SCHOOL DISTRICT ACCEPTABLE USE POLICY

REEF-SUNSET UNIFIED SCHOOL DISTRICT ACCEPTABLE USE POLICY RSUSD Use Policy Page 1 REEF-SUNSET UNIFIED SCHOOL DISTRICT ACCEPTABLE USE POLICY 1. Internet access is provided by Reef-sunset Unified school District (RSUSD) and the Kings County Office of Education

More information

Henderson County Early College High School Technology Program. Parent and Student Technology Use Handbook

Henderson County Early College High School Technology Program. Parent and Student Technology Use Handbook Henderson County Early College High School Technology Program Parent and Student Technology Use Handbook ROADRUNNERS 2012-13 I. Assigned Graphing Calculators TI-84+ graphing calculators are assigned to

More information

CC. TECHNOLOGY ACCEPTABLE USE POLICY. 1. Purpose

CC. TECHNOLOGY ACCEPTABLE USE POLICY. 1. Purpose CC. TECHNOLOGY ACCEPTABLE USE POLICY 1. Purpose a. The Children s Internet Protection Act (CIPA), 47 U.S.C. 254(h)(5), and South Dakota Consolidated Statues Section 22-24-55 require public schools to implement

More information

R345, Information Technology Resource Security 1

R345, Information Technology Resource Security 1 R345, Information Technology Resource Security 1 R345-1. Purpose: To provide policy to secure the private sensitive information of faculty, staff, patients, students, and others affiliated with USHE institutions,

More information

Laptops for Students Program

Laptops for Students Program Laptops for Students Program Technology Use Agreement Handbook Expanding Learning to the 21st Century and Beyond PAGE 1 OF 13 Table of Contents Laptop Policy & Procedures Handbook 3 Objectives 3 Laptop

More information

Computing and Network Use Policy

Computing and Network Use Policy Computing and Network Use Policy Category: University Area Date Established: Responsible Office: Office of the Chief Information Officer Date Last Revised: - 3/26/2007 Responsible Executive: CIO Date Posted

More information

Decatur Public Schools Microsoft Surface Pro 3 Tablet Acceptable Use Policy and Procedures

Decatur Public Schools Microsoft Surface Pro 3 Tablet Acceptable Use Policy and Procedures Decatur Public Schools Microsoft Surface Pro 3 Tablet Acceptable Use Policy and Procedures 2015-2016 DPS Tablet Assigned to: Tablet TAG: Serial Number: Distribution of Devices Surface Pro Tablets and accessories

More information

AP 417 Information and Communication Services

AP 417 Information and Communication Services AP 417 Information and Communication Services Background Access and use of information and communication services (ICS) are an integral component of the learning and working environment. The ability for

More information

Eastern School District Acceptable Use of Information and Communications Technology

Eastern School District Acceptable Use of Information and Communications Technology ADMINISTRATIVE REGULATIONS Definitions Information and Communications Technology (ICT) System refers to computers which are operating as stand-alone units or connected via cabling and/or wireless technology,

More information

Ethical and Responsible Use of EagleNet 03/26/14 AMW

Ethical and Responsible Use of EagleNet 03/26/14 AMW Campus Technology Services Solutions Center Juniata College 814.641.3619 help@juniata.edu http://services.juniata.edu/cts Ethical and Responsible Use of EagleNet 03/26/14 AMW Preamble The resources of

More information

New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email,

New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email, New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email, Computer, And Networking Technologies Usage 1.0 Purpose

More information

Bring Your Own Device (BYOD) Handbook. Smackover-Norphlet School District

Bring Your Own Device (BYOD) Handbook. Smackover-Norphlet School District Bring Your Own Device (BYOD) Handbook Smackover-Norphlet School District August, 2014 For the purposes of BYOD, devices means personally owned, wireless portable electronic equipment used for instructional

More information

NOTRE DAME PREPARATORY AND MARIST ACADEMY

NOTRE DAME PREPARATORY AND MARIST ACADEMY NOTRE DAME PREPARATORY AND MARIST ACADEMY Parent/Student Microsoft Surface Terms and Agreement Contract Notre Dame Preparatory School and Marist Academy is committed to preparing its students for a 21

More information

Computer Use. Procedure No. 27.99.99.T1.01 (Effective 5/16/03)

Computer Use. Procedure No. 27.99.99.T1.01 (Effective 5/16/03) Procedure No. 27.99.99.T1.01 (Effective 5/16/03) Computer Use PROCEDURE: Tarleton State University provides each of its students, faculty and staff with one or more computer accounts (user-ids) that permit

More information

TOLEDOTEL INTERNET SERVICE AGREEMENT (As of July, 2014)

TOLEDOTEL INTERNET SERVICE AGREEMENT (As of July, 2014) TOLEDOTEL INTERNET SERVICE AGREEMENT (As of July, 2014) This agreement sets forth the terms and conditions under which ToledoTel will provide Internet service to you at your home or business. 1. The Service

More information

Please review and make copies of the following documents for each designated staff in need of Valley Express access.

Please review and make copies of the following documents for each designated staff in need of Valley Express access. Welcome to Valley Express (VE) Valley Express is Valley Health Plan s (VHP) Authorization and Referral data system. By signing this document, the individual signifies that the County s User Responsibility

More information

B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.

B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources. Chicago Public Schools Policy Manual Title: ACCEPTABLE USE OF THE CPS NETWORK AND COMPUTER RESOURCES Section: 604.1 Board Report: 09-0722-PO3 Date Adopted: July 22, 2009 Policy: THE CHIEF EXECUTIVE OFFICER

More information

Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the Springfield Public Schools

Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the Springfield Public Schools Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the The computer and information technology resources, which includes World Wide Web access and electronic mail capability,

More information

Lutheran Education Association of Houston Acceptable Use Policy (Students)

Lutheran Education Association of Houston Acceptable Use Policy (Students) Lutheran Education Association of Houston Acceptable Use Policy (Students) With the use of technology, including the Internet, Intranet, hardware and software, the Lutheran Education Association of Houston

More information

Encryption Security Standard

Encryption Security Standard Virginia Commonwealth University Information Security Standard Title: Encryption Security Standard Scope: Approval February 22, 2012 This document provides the encryption requirements for all data generated,

More information

Conditions of Use. Communications and IT Facilities

Conditions of Use. Communications and IT Facilities Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other

More information

Dracut Public Schools Technology Acceptable Use Policy Revised 2014

Dracut Public Schools Technology Acceptable Use Policy Revised 2014 1 Dracut Public Schools Technology Acceptable Use Policy Revised 2014 The Dracut Public Schools (DPS) encourages the use of information technology to assist staff and students with academic success, preparation

More information

Hamlin School District Student Computer Handbook

Hamlin School District Student Computer Handbook Hamlin School District Student Computer Handbook 2014-2015 INTRODUCTION All 9 th -12 th grade students will be issued computers for use as part of their educational curriculum. The purpose of these computers

More information

END USER LICENSE AGREEMENT

END USER LICENSE AGREEMENT END USER LICENSE AGREEMENT 1. SCOPE OF THIS AGREEMENT. This END USER LICENSE AGREEMENT ("EULA") is a legal agreement between you (either an individual or a single entity) and TradeStation ("TS") governing

More information

3. Electronic Mail (E-mail)

3. Electronic Mail (E-mail) - Title of Agency - Internet Acceptable Use Policy The Following Internet Acceptable Use Policy Applies to the (AGENCY NAME) Staff 1. Introduction The (AGENCY NAME) provides its staff and (other entity(s)

More information

Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks

Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks The Valmeyer Community Unit School District #3 Board of Education supports the use of the Internet and other computer

More information

Computer and Information Systems Policy of The Baptist College of Florida

Computer and Information Systems Policy of The Baptist College of Florida Computer and Information Systems Policy of The Baptist College of Florida I. Overview The Baptist College of Florida's intentions for publishing a Computer and Information Systems Policy are not to impose

More information

University of Maryland Baltimore Information Technology Acceptable Use Policy

University of Maryland Baltimore Information Technology Acceptable Use Policy The UMB School of Nursing follows and adheres to the UMB Campus Information Technology Acceptable Use Policy. The UMSON further defines Authorized User to also include any person who receives a password

More information

GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY

GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY Telecommunications is radically changing the way the world accesses information. A computer network, linked to the Internet, an international computer network

More information

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy I. Introduction Each employee, student or non-student user of Greenville County Schools (GCS) information system is expected to be familiar with and follow the expectations and requirements

More information

Coffeyville Community College Computer and Network Usage Policy

Coffeyville Community College Computer and Network Usage Policy Coffeyville Community College Computer and Network Usage Policy Computer and Network Usage Policy Page 1 Introduction "Respect for intellectual labor and creativity is vital to academic discourse and enterprise.

More information

Westchester Community College Student Technology Use Policy Version 2 / April 2015 Table of Contents

Westchester Community College Student Technology Use Policy Version 2 / April 2015 Table of Contents Westchester Community College Student Technology Use Policy Version 2 / April 2015 Table of Contents Introduction... 2 Prohibited Use... 2 Electronic Communication & Computer Usage... 3 Identification

More information

Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014

Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014 I. Introduction Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014 Ohio Wesleyan University (OWU) provides computing resources to support the educational mission and administration

More information

Service Description: Dell Backup and Recovery Cloud Storage

Service Description: Dell Backup and Recovery Cloud Storage Service Description: Dell Backup and Recovery Cloud Storage Service Providers: Dell Marketing L.P. ( Dell ), One Dell Way, Round Rock, Texas 78682, and it s worldwide subsidiaries, and authorized third

More information

Warren County Public Schools. Electronic Resources Acceptable Use Procedures, Guidelines, and Signature Forms

Warren County Public Schools. Electronic Resources Acceptable Use Procedures, Guidelines, and Signature Forms Warren County Public Schools Electronic Resources Acceptable Use Procedures, Guidelines, and Signature Forms Revised January 2012 Overview and Rational of the Warren County Public Schools Acceptable Use

More information

APPROPRIATE USE OF INFORMATION POLICY 3511 TECHNOLOGY RESOURCES ADOPTED: 06/17/08 PAGE 1 of 5

APPROPRIATE USE OF INFORMATION POLICY 3511 TECHNOLOGY RESOURCES ADOPTED: 06/17/08 PAGE 1 of 5 PAGE 1 of 5 PURPOSE Triton College s computer and information network is a continually growing and changing resource supporting thousands of users and systems. These resources are vital for the fulfillment

More information

Network and Workstation Acceptable Use Policy

Network and Workstation Acceptable Use Policy CONTENT: Introduction Purpose Policy / Procedure References INTRODUCTION Information Technology services including, staff, workstations, peripherals and network infrastructures are an integral part of

More information

Guidelines Applicability... 2. Guidelines Statements... 2. Guidelines Administration... 4. Management Responsibility... 4

Guidelines Applicability... 2. Guidelines Statements... 2. Guidelines Administration... 4. Management Responsibility... 4 Guidelines Applicability... 2 Guidelines Statements... 2 Guidelines Administration... 4 Management Responsibility... 4 Administrative Data Ownership... 4 Data Custodian Responsibilities... 4 Data User

More information

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted

More information

BOARD OF EDUCATION Cherry Hill, New Jersey

BOARD OF EDUCATION Cherry Hill, New Jersey BOARD OF EDUCATION Cherry Hill, New Jersey POLICY 6142.12 ACCEPTABLE USE OF TECHNOLOGY Introduction The Board of Education encourages the use of technology in the classroom as an educational tool and to

More information