Tizen Validation Guidelines
|
|
|
- Phyllis McGee
- 9 years ago
- Views:
Transcription
1 Tizen Validation Guidelines
2 Tizen Validation Guide Index 1. Introduction Application Validation Process Initial Inspection & Dynamic Analysis Content Review & Final Confirmation Tizen Validation Policy Functionality Metadata Intellectual Property Adult Content Violence Alcohol, Drugs and Tobacco Legal Requirement Defamation Game User Privacy and Opt-in Advertisement Tizen Application Compliance Namespace Application packaging and SDK use Privileges Interrupt Handling, Messaging and Calls Network Usage Security Age Rating Guide Age Rating Grade Overview
3 1. Introduction Before you submitting your application on Tizen Store and distribute it to users, you need to confirm if your application is secure and reliable to users. This document helps you understand the publishing process and get ready for a successful product launch on Tizen Store. It summarizes some of the tasks you'll need to complete before publishing your application on Tizen Store, such as understanding the functional or legal requirements of the application, and Tizen Store policies on content. Tizen Store will from time to time update and conduct audits to satisfy that this policy is being complied with for stakeholders; users, sellers, mobile operators or the public. Tizen Store reserves the right to approve or withhold approval and reject any content at its sole discretion. If any registered content is found objectionable by users, or if it does not comply with validation guidelines, Tizen Store reserves the right to remove any content from Tizen Store at any time without seller's consent. 3
4 2. Application Validation Process - Application Functionality Test - API & Privilege Validation - Integrity & Malware Analysis App submission Phase 1. Initial Inspection & Dynamic Analysis Phase 2. Content Review & Final Confirmation For sale Tizen Validation System Final Reviewer - Content Review based on Policy. Social Norms, Violence, etc. - Usability Test based on Test Case The Validation Process represents the whole procedure ranging from the application s registration to the final confirmation. It is divided into two phases: one is automatically done by a system, referred to as Initial Inspection & Dynamic Analysis, and the second phase is performed manually by Final reviewer, and is referred to as Review & Final Confirmation. If an application passes the process, its status will be changed to ready for sale in the Tizen Store. If an application fails, a detailed validation report will be sent to the seller. The Validation Process takes three business days on average. 2.1 Initial Inspection & Dynamic Analysis In this phase an application is validated by the automation system on the basis of the system s Defect Library. Tizen Security Analysis System filters out security threats, e.g. malware, API privilege, web attack patterns, etc. Tizen Test Automation System checks the metadata and the application s basic functions. 4
5 2.2 Content Review & Final Confirmation This is the second and last phase in which a reviewer makes a final decision regarding the application s approval and delivers the result to the seller. In this stage reviewer validates applications on the basis of the Tizen Validation Guide. 5
6 3. Tizen Validation Policy 3.1 Functionality Application should be installed on its target device without any errors Icon image should be displayed on the target device s main menu after installation Application should be launched within 10 seconds after clicking on the icon unless there is a visual indication of progress, e.g. a progress bar Application should provide the functions corresponding to its description Each feature of an application should work normally without malfunctions Users should be able to upgrade to the newest version without any errors If an application s function does not work as expected, it will be rejected It should be possible to remove application without any errors Application should not crash or cause malfunctions due to H/W usage (e.g. MENU, HOME, BACK, VOLUME, HOLD key) H/W key itself should work as user can normally expect when user executes application. Look at UX Guide for further details Application should not crash or create malfunctions to the embedded phone features such as GPS, Camera, motion sensors, Bluetooth, WIFI etc UI/UX - Menu, graphics and text must be clearly visible and work correctly. - The main icon represents the application and it is recommended to be a circular shape. - Application should cover the entire screen of a device. - Application should use input capabilities applicable to the device. - Application should not contain any overlapped or truncated text, graphics distortion, or any kinds of display errors. - Application should be displayed and work correctly regardless of the screen s orientation Application should provide information required to fully validate the application, such as: - Test account for log-in features. - Instructions for accessing and downloading additional files. - Pre-release versions (demo) should notify the users about the limitations (e.g. expiration dates or limited functionality). 6
7 Application should be designed to be valuable, entertaining, unique or informative. If application just offers the simple web site links or puzzles which only changed puzzle board color, it may be rejected Application must not link to other application store. 3.2 Metadata Icon, screenshots, description and tag in the Tizen Store should be consistent with those installed on device and should be appropriate for children (refer to the Age Rating Guide, page 13, for details) Application title and default description should be written in English if selecting two or more countries for sale. - You can add application title and description in 6 languages in the seller office Age rating should comply with the Age Rating Guide Valid addresses and Support URLs are required to get in contact with Developers. 3.3 Intellectual Property Application should not violate brand name, trademark, logos, and other source identifiers including Tizen brand Application should not use copyright-protected content without permission from the copyright holder Application should not provide any method to share copyrighted content such as media or images via P2P or a server. The seller is required to own the right or obtain adequate license from the copyright owner for all the content submitted to the Tizen Store. The seller is solely responsible for any offenses that result from not complying with the Tizen Validation Guide and any infringement of copyright that is found in their applications. 3.4 Adult Content Content should not depict or encourage pornography, nudity, sexually explicit behavior or violence (especially exploitative or sadistic violence towards vulnerable people, minors or animals) Content must not contain explicit sex scenes (images of sexual or sexually 7
8 suggestive activities) - Application for educational purpose if the age rating is 18+ (several countries will be excluded from the countries of service) Content must not contain nudity (images that reveal genitals, buttocks, nipples) Content must not contain images or words of a sexually suggestive manner. Age Rating Guide for sexual content All Not Allowed No sexual content Mild sexual behaviors (e.g. kissing, lingerie, bikini) but not to arouse sexual urges Non-explicit depiction of sexual behavior; can refer to sex in a mild way Suggestive or intense sexual references; full front view of a body without exposure of genitals, buttocks or breast Pornography 3.5 Violence Content must not describe killing Content must not depict blood in a cruel way Content must not depict violence towards vulnerable people, minors and animals Content must not describe child abuse Content must not depict intense violence, including masochism and torture Content must not depict sexual harassment or rape. Age Rating Guide for violent content All Not Allowed Educational purpose Violent scenes of mild, unrealistic or fantasy character Very violent scenes, both realistic and animated Extremely violent graphic images Glamorizing death, torture, weapons, etc. 3.6 Alcohol, Drugs and Tobacco Content must not depict illegal alcohol, drugs and tobacco use directly or indirectly Content has to include a warning, in the description or in the application, about drugs or medicine information available within the application. Age Rating Guide for alcohol, drugs and tobacco content All Not Allowed 8
9 All Not Allowed No usage of alcohol, drugs and tobacco Mild reference to images or descriptions of alcohol, drugs or tobacco Depiction of alcohol, drug and tobacco Advertisements of alcohol, drugs and tobacco 3.7 Legal Requirement Content should not link to websites that contain illegal or inappropriate materials Content must observe legal requirements as well as the moral values of countries where it is available. If content fails to comply with any legal requirements or moral values, it will be rejected. 3.8 Defamation Content must not disparage a person or a group of people on the basis of: - Race - Gender - Ethnicity - Nationality - Religion - Disability - Ideology - Disparage a public figure (historical character, celebrity, politician, royal family, etc.) - Any other distinction that might be considered offensive Content must not contain any material that promotes political propaganda. 3.9 Game Application must not include any lottery, betting or gambling elements that require real money or transfer virtual money into real money or prizes if the player risks losing money or valuables In case of an 18+ game application for the Korean market, only game applications that use the GRB age rating are acceptable. Age Rating Guide for gaming All Not Allowed 9
10 All Not Allowed No gambling content Mild reference to images or descriptions of gambling activities Simulated gambling without real money betting Gambling with real money 3.10 User Privacy and Opt-in Application that uses transfers and/or transmits the user s location information must notify the user prior to each use of the application and obtain their consent Application that uses personal information must notify users how and why their personal data is gathered disclosed or shared. Example of such data include: - Contacts - Phone numbers - Credit card data - Multimedia files (photos, audio and video) - Text or voice communication (SMS, MMS and Call log) - Browsing history - Location information - Other data saved on mobile devices or cloud storage services Transmission of personal information is forbidden without the user s explicit consent (Opt-in) and must be encrypted while being transmitted Transmission of personal information to a third-party must be disclosed to the Tizen Validation Team in the Notes to Validation Team notes section on the submission page Advertisement Advertisement in application should be consistent with age rating of the application itself Advertisement in application should comply with Tizen Validation Guide. - Any advertisement must not contain illegal activities, violence, sexually explicit content, and privacy violations in application. - Any advertisement must consistent with age rating of its application. (e.g. application for all ages should not contain advertisement for 18+.) 10
11 Push advertisement should get user consent. - User must be able to dismiss push advertisement without any penalty. 4. Tizen Application Compliance 4.1 Namespace Application should include a namespace, such as: <Company>; <application> Application must not overwrite the Tizen API namespaces. 4.2 Application packaging and SDK use Application that is not packaged using Tizen SDK will be rejected Application that does not use the Tizen SDK will be rejected 4.3 Privileges Application that uses a method of privilege that is not specified in the manifest file will be rejected Application that uses system privilege level without permission will be rejected Application that uses programming interface embedded in the official SDK but not specified as official Tizen API s shall be rejected Application that does not use any method of privilege defined in the manifest file will be rejected. 4.4 Interrupt Handling, Messaging and Calls Application that sends and/or receives SMS or MMS messages should send the messages successfully Users should be able to accept an incoming phone call while the application is running. Furthermore, it should resume from the same point, or at a reasonable restarting point, when the call is ended Application should not block the user from making emergency calls on a cellular network Application should not crash or cause malfunctions due to system performance while the application is running (e.g. alarm, SMS/MMS, , receiving a call). 11
12 4.5 Network Usage Application should not excessively use network capacity or bandwidth Application should handle the network connection being invalid/unusable (e.g. data connection/apn not properly set up or invalid for current carrier) or the device being switched into offline/flight mode Users should be notified by a message if network delays or connection errors occur. 4.6 Security Application that contains viruses, spyware, Trojan, malicious or harmful code which could damage, destroy, or adversely affect other software, firmware, hardware, data, systems, services or networks will be rejected Application that uses advertising networks that promote malware will be rejected. 12
13 5. Age Rating Guide 5.1 Age Rating Grade Age Rating Guide is used to ensure that applications available in the Tizen Store are labeled by age according to the content. Age rating provides guidance to users, particularly parents, to help them decide whether to download a particular application or not. The rating of an application confirms that it is suitable for users over a certain age. Age rating is classified in the following way: All : Applications that everyone can play. 12+ : Applications that child under the age of 12 cannot play unless accompanied by ad ults. 16+ : Applications that children and teenagers under the age of 16 cannot play unless a ccompanied by adults. 18+ : Applications that teenager and children (under 18) cannot play. Content rating in the TIZEN store has been created according to international age rating standards for video/game content such as ESRB, PEGI. Therefore, if any content has an international age rating level, the level will be accepted without further review. Tizen ESRB PEGI GRB MJ/DEJUS ALL EC 3+ ER/L All E E , T Mature Overview The following table describes age level criteria. Content descriptor Sexual (3.4) All Not Allowed No sexual content Mild sexual behaviors (e.g. kissing, lingerie, bikini) but not to arouse sexual urges Non-explicit depiction of sexual behavior; can refer to sex in a mild way 13 Suggestive or intense sexual references; full front view of a body without exposure of genitals, buttocks or breast Pornography
14 Content descriptor All Not Allowed Violence (3.5) Educational purpose Violent scenes of mild, unrealistic or fantasy character Very violent scenes, both realistic and animated Extremely violent graphic images Glamorizing death, torture, weapons, etc. Alcohol, drug and tobacco (3.6) No usage of alcohol, drugs and tobacco Mild reference to images or descriptions of alcohol, drugs or tobacco Depiction of alcohol, drug and tobacco Advertisements of alcohol, drugs and tobacco Game (3.9) No gambling content Mild reference to images or descriptions of gambling activities Simulated Gambling with real gambling without money real money betting Horror/ Fear No horror or fearful content Very mild horror content Mild or infrequent occurrences of horror-themed images, sounds and text. Strong threats; Strong gory images or cruelty including a high level of fear or anxiety Extreme threads; Extreme gory images or cruelty including a high level of fear or anxiety Bad language No bad language Mild use of bad language Infrequent use of strong language such as the word fuck Frequent use of offensive language or explicit sexual references Unacceptable use of offensive language or extremely explicit sexual references 14
Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety
Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Student Policy--SP004 Ventura Charter School of Arts and Global Education ("School") recognizes the
ios Developer Program Information
apple ios Developer Program Information Introduction The ios Developer Program provides a complete and integrated process for developing and distributing ipad, iphone and ipod touch applications. With
ACSI Advertising Guidelines Advertising Philosophy
ACSI Advertising Guidelines Advertising Philosophy Thank you for helping fund the work of the Association of Christian Schools International (ACSI) by advertising with us. Please be aware that ACSI will
F-Secure Mobile Security. Android
F-Secure Mobile Security Android F-Secure Mobile Security TOC 2 Contents Chapter 1: Installation...4 1.1 Installing...5 1.2 Activating...6 1.3 Configuring the product...7 1.4 Uninstalling the product from
Newark City Schools Computer Network and Internet Acceptable Use Policy and Agreement
Newark City Schools Computer Network and Internet Acceptable Use Policy and Agreement The Newark City Schools is pleased to make available access to interconnected computer systems within the district
The AppNexus audit evaluates creatives against the standards below.
The AppNexus audit evaluates creatives against the standards below. As initial requirements, a single creative must render properly multiple times during the audit process, regardless of any parameter
Newark City Schools Computer Network, Internet And Bring Your Own Device (BYOD) Acceptable Use Policy and Agreement
Newark City Schools Computer Network, Internet And Bring Your Own Device (BYOD) Acceptable Use Policy and Agreement The Newark City Schools is pleased to make available access to the Internet, and a Bring
North Clackamas School District 12
North Clackamas School District 12 Code: IIBGA-AR Revised/Reviewed: 3/06/08; 6/21/12 Orig. Code(s): SP IIBGA Guidelines for the Use of the District s Electronic Communication System Definitions 1. Technology
MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS
MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated
LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET
LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET The Board of Directors of the Louisa Muscatine Community School District is
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access
Mentor Public Schools Board of Education 6.48 Policy Manual page 1 Chapter VI Pupil Personnel STUDENT E-MAIL, INTERNET AND COMPUTER USE
Policy Manual page 1 STUDENT E-MAIL, INTERNET AND COMPUTER USE Access to the Internet is being offered by Mentor Public Schools through the IT Department. The District is also pleased to provide its students
COMPUTER, NETWORK AND INTERNET USE POLICY
4526 COMPUTER, NETWORK AND INTERNET USE POLICY The Westhampton Beach Board of Education affirms the district's commitment to preparing students for the future. Students need to be technologically literate
C H E R O K E E C H R I S TIAN SCHOOLS ( E L E M E N TARY SCHOOL) I N F O R M A TION TECHNOLOGY AND A C C E P TABLE USE POLICY
C H E R O K E E C H R I S TIAN SCHOOLS ( E L E M E N TARY SCHOOL) I N F O R M A TION TECHNOLOGY AND A C C E P TABLE USE POLICY Cherokee Christian Schools (the School ) provides Information Technology (IT)
This agreement applies to all users of Historica Canada websites and other social media tools ( social media tools or social media channels ).
Social Media Terms of Use Social media is an integral part of Historica Canada s communications efforts, offering an additional model to engage with participants, colleagues, other stakeholders and the
ACCEPTABLE USE POLICY
ACCEPTABLE USE POLICY F. Paul Greene Harter Secrest & Emery LLP 1600 Bausch & Lomb Place Rochester, NY 14604 585-231-1435 [email protected] 2016 HARTER SECREST & EMERY LLP THE FOLLOWING TEMPLATE WAS DESIGNED
End User License Agreement for Samsung Software
End User License Agreement for Samsung Software IMPORTANT. READ CAREFULLY: This End User License Agreement ( EULA ) is a legal agreement between you (either an individual or a single entity) and Samsung
PROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES
R 2361/Page 1 of 12 R 2361 ACCEPTABLE USE OF COMPUTER NETWORKS/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for
Acceptable Use and Publishing Policy
1. Purpose This Policy outlines the principles, guidelines and requirements of acceptable use of and publishing to ecreators Pty Ltd (ecreators) hosting products and services. The purpose of this Policy
R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES
R 2361/page 1 of 8 R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for
AXIS12 DRUPAL IN A BOX ON THE CLOUD
SERVICE LEVEL AGREEMENT AXIS12 DRUPAL IN A BOX ON THE CLOUD version 1.0 Page 1 of 6 This Axis12 Drupal in a box on the cloud Service Level Agreement ( SLA ) is a policy governing the use of the Axis12
DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY
DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY Purpose: 1) To establish standards for the acceptable uses of internet and electronic mail (email) services within the computer network maintained
APPROPRIATE USE OF DIGITAL COMMUNICATIONS AND TECHNOLOGIES POLICY
REGISTER OF POLICIES, PROCEDURES AND BY-LAWS APPROPRIATE USE OF DIGITAL COMMUNICATIONS AND TECHNOLOGIES POLICY Code: Policy 2.11 Date of Coming into Force: June 27, 2011 Number of Pages: 6 Origin: Education/
White Paper. How to Effectively Provide Safe and Productive Web. Environment for Today's Businesses
White Paper How to Effectively Provide Safe and Productive Web Environment for Today's Businesses Table of Content The Importance of Safe and Productive Web Environment... 1 The dangers of unrestricted
How To Use The Blog Safely And Responsibly
BLOG PROTOCOL DRI maintains this site (the "Site") for your personal entertainment, information, education, and communication. Please feel free to browse the Site. You may not download material displayed
Iowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests
Iowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests The Iowa-Grant School District has invested significantly in technology that offers vast, diverse, and
Leadbolt Classification Policy
The purpose of the Leadbolt Classification Policy is to clearly define the appropriate classification of your Ads and help you, our advertisers, define which content categories you wish to target and which
Art-list License Agreement
Art-list License Agreement 1. General 1.1. The Agreement herein is made between you and Art list (or by any other name), the owner of the site: www.art list.io, and it settles the terms and conditions
GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY
GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY Telecommunications is radically changing the way the world accesses information. A computer network, linked to the Internet, an international computer network
Sample of Online Questionnaire. Have you viewed the gameplay/graphics of the strongest content/element that is in the game? Yes/No
Sample of Online Questionnaire Title: Romanised Title: Publisher/Developer: Region: Year of Release: Have you played the game? Yes/No Have you viewed the gameplay/graphics of the strongest content/element
Acceptable Use Policy Holy Spirit Catholic School
Acceptable Use Policy Holy Spirit Catholic School For the use of Computers, Mobile Devices, Internet Access, Google Apps for Education Suite, and Internet Applications Definitions User includes anyone,
COMPUTER /ONLINE SERVICES (Acceptable Use and Internet Safety)
COMPUTER /ONLINE SERVICES (Acceptable Use and Internet Safety) The Middletown City School District provides an electronic communications network that allows District-authorized individuals internal access
Acceptable Use Policy
Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance
Acceptable Use Policy - NBN Services
OASIS TELECOM ABN: 31 155 359 541 P: 1300 734 399 F: 03 9011 9644 [email protected] www.oasistelecom.com.au PO Box 6153, Point Cook, VIC - 3030 Acceptable Use Policy - NBN Services Important Note:
Red Cloud Community Schools Acceptable Use and Internet Safety Policy
Red Cloud Community Schools Acceptable Use and Internet Safety Policy The Red Cloud Community School system maintains quality technology systems (hardware, software, and services) for the purposes of enhancing
Can the app be installed on the device? Does the app behave as designed/desired if there is an incoming call?
1) Can the app be installed on the device? Does the app behave as designed/desired if there is an incoming call? Does the app behave as designed/desired if there is an incoming SMS? Does the app behave
BOARD OF EDUCATION Cherry Hill, New Jersey
BOARD OF EDUCATION Cherry Hill, New Jersey POLICY 6142.12 ACCEPTABLE USE OF TECHNOLOGY Introduction The Board of Education encourages the use of technology in the classroom as an educational tool and to
Forrestville Valley School District #221
Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent
719.00 INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15)
719.00 INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15) The Stoughton Area School District is committed to the appropriate use of the Internet and
Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy
Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS BYOD Bring Your Own Device AUP Authorized Use Policy User includes anyone, including employees, students, and guests, using
TERMS OF USE AGREEMENT
TERMS OF USE AGREEMENT Last Updated: October 20, 2010 PLEASE READ THIS TERMS CAREFULLY BEFORE ACCESSING THE WEBSITE I GENERAL 1) The Web Portal MEGA BRAZIL TV is a part of the MEGA LOPES, LLC family of
Technology Department 1350 Main Street Cambria, CA 93428
Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any
Reynoldsburg City Schools Computer and Technology Acceptable Use Policy Staff, Volunteers and Students
Reynoldsburg City Schools Computer and Technology Acceptable Use Policy Staff, Volunteers and Students AUP Sections 1. Acceptable Use 2. Privileges 3. Internet Access 4. Procedures & Caveats 5. Netiquette
Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students
Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students The Board of Education recognizes that the Technology, Assessment and Accountability (TAA) Department's resources (computers,
Sample Employee Network and Internet Usage and Monitoring Policy
CovenantEyes Internet Accountability and Filtering Sample Employee Network and Internet Usage and Monitoring Policy Covenant Eyes is committed to helping your organization protect your employees and members
Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY
T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...
POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014
POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406 SECTION: 400 : Facilities and Equipment Page 1 of 8 APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014 CROSS
Electronic Communications System
Estacada School District #108 Policy Code: IIBGA-AR Adopted: 2/13/02 Revised/Readopted: 8/16/06 Orig. Code(s): IIBGA-AR Electronic Communications System Definitions 1. Technology protection measure, as
Human Resources Policies and Procedures
SUBJECT: Social Media and Internet Policy PURPOSE The AppleOne Group of Companies ( AppleOne ) recognizes the fast-changing landscape of the Internet which has increased the popularity of social media
51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES
Page 1 of 5 Purpose This regulation implements Board policy JS by setting forth specific procedures, requirements and restrictions and conditions governing student use of District Information Technology
Parent / Guardian Consent for Technology Use in Schools
Parent / Guardian Consent for Technology Use in Schools Our school uses computers and other mobile devices in the classroom to help increase student motivation and achievement. We will use laptop sets,
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance
DIOCESE OF DALLAS. Computer Internet Policy
DIOCESE OF DALLAS Computer Internet Policy October 2012 Page 1 ROMAN CATHOLIC DIOCESE OF DALLAS COMPUTER SYSTEMS AND INTERNET USE POLICY Summary Definitions: 1. The term Communication(s) Assets as used
TELECOMMUNICATION PLAN AND ELECTRONIC COMMUNICATION USE 8.60+
TELECOMMUNICATION PLAN AND ELECTRONIC COMMUNICATION USE 8.60+ BYOD (Bring Your Own Device) Technology Acceptable Use Washington District Schools provides all students access to technology, the district
POLICY 4526. Adopted by Board of Education: 4/20/05
POLICY 4526 COMPUTER NETWORK FOR EDUCATION The Board of Education is committed to optimizing student learning and teaching. The Board considers student access to a computer network, including the Internet,
Acceptable Use of Information Technology
Acceptable Use of Information Technology No.: 3501 Category: Information Technology Services Approving Body: Leadership Team Executive Division: Learning and Technology Services Department Responsible:
RIVERVIEW SCHOOL DISTRICT
No. 815 SECTION: OPERATIONS RIVERVIEW SCHOOL DISTRICT TITLE: ADOPTED: June 18, 2012 ACCEPTABLE USE OF INTERNET, COMPUTERS AND NETWORK RESOURCES REVISED: 815. ACCEPTABLE USE OF INTERNET, COMPUTERS AND NETWORK
AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY
AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY The following policy shall apply to all students, faculty, and staff of Avon Old Farms School unless otherwise specified. The computing
The Top Ten Of Public Computers And Their Perpetuation
2.10 PUBLIC COMPUTER USE POLICY The Library offers public computers that patrons may use to access the Internet or perform computer-assisted tasks using basic applications software for word processing,
'Namgis First Nation. 1.0 Overview. 2.0 Purpose. 3.0 Scope. 4.0 Policy
Created: 2/18/2011 Page 1 of 8 'Namgis First Nation is hereinafter referred to as "the government." 1.0 Overview Though there are a number of reasons to provide a user network access, by far the most common
THE SCHOOL DISTRICT OF PHILADELPHIA
No. 815 SECTION: OPERATIONS THE SCHOOL DISTRICT OF PHILADELPHIA TITLE: ACCEPTABLE USE OF INTERNET, COMPUTERS AND NETWORK RESOURCES ADOPTED: March 15, 2012 REVISED: August 21, 2014 815. ACCEPTABLE USE OF
Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee
Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted
Acceptable Use Policy
Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal
~Osgood Public Library ~ Milan Branch Library Computer and Internet Acceptable Use Policy
~Osgood Public Library ~ Milan Branch Library Computer and Internet Acceptable Use Policy The Library is committed to providing technology tools and information in a variety of formats to meet the needs
------------------- COMPUTER NETWORK AGREEMENT FORM
COMPUTER NETWORK AGREEMENT FORM I (we) have read the guidelines for participating in the Wickliffe District Network and Internet Access program and agree to adhere to all ofthe provisions contained therein.
COMPUTER USE IN INSTRUCTION
COMPUTER USE IN INSTRUCTION 4526 The Board of Education is committed to optimizing student learning and teaching. The Board considers student access to a computer network, including the Internet, to be
BRIGHAM AND WOMEN S HOSPITAL
BRIGHAM AND WOMEN S HOSPITAL HUMAN RESOURCES POLICIES AND PROCEDURES SUBJECT: SOCIAL MEDIA, ELECTRONIC COMMUNICATION and ACCEPTABLE USE POLICY #: HR-503 EFFECTIVE DATE: January 1, 2008 POLICY This policy
Acceptable Usage Policy
Version 2.1 20141230 Acceptable Usage Policy Acceptable Usage Policy Contents 1. PURPOSE OF THIS POLICY... 2 2. GENERAL... 2 3. APPLICATION... 2 4. UNREASONABLE USE... 2 5. UNACCEPTABLE USE... 3 6. SPAM...
Human Resources Policy and Procedure Manual
Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use
