3. Fee. You are entitled to use the Equipment without cost so long as you abide by the terms and conditions of this Agreement.
|
|
- Buddy Nicholson
- 3 years ago
- Views:
From this document you will learn the answers to the following questions:
What is the condition that a student is a part of the Macaulay Honors College?
What does the Equipment for the end of the third year of the Macaulay Computer License Agreement cost?
Which college is the student in charge of the equipment that CUNY and Macaulay were involved in?
Transcription
1 Last Name, First Name THE CITY UNIVERSITY OF NEW YORK Notebook Computer License Agreement This document describes the license agreement between The City University of New York ( CUNY ) and the individual Macaulay Honors College student named below ( you or Student ). Student: Address: MHC Campus: Licensed Equipment. The Equipment is owned by CUNY and licensed to you pursuant to the terms of this Agreement. The licensed equipment ( Equipment ) is as follows: Apple MacBook Pro 2.26 GHz Intel Core Duo, 13.3" TFT display CUNY Tag # Serial # 2GB 1066MHz DDR3 SDRAM - 2x1GB 160GB Serial ATA 5400 rpm SuperDrive 8x (DVD±R DL/DVD±RW/CD-RW) Additional Licensed Software: Microsoft Office 2008 Norton Anti-virus iwork 2. Term. The Equipment is licensed to you for as long as you are a participant in good standing in the Macaulay Honors College. You will use the Equipment you receive as a freshman for three years as long as you remain an Honors College student in good standing. At the end of the third year, you may purchase the Equipment (and a license to continue using the Included Software, see Section 8 below) for one dollar ($1.00). 3. Fee. You are entitled to use the Equipment without cost so long as you abide by the terms and conditions of this Agreement. 4. Use of the Equipment. The Equipment is provided to you for your use while a participant in the Macaulay Honors College. By accepting the Equipment and signing this Agreement, you agree that during the term of the Agreement you will abide by the following rules: (c) (d) (e) You will use the Equipment only in connection with your enrollment in the Macaulay Honors College. You will not permit any other person to possess or use the Equipment. You will not sell, lease, license or otherwise grant anyone rights to the Equipment. You will follow the CUNY Computer User Responsibilities, a copy of which is attached as Appendix A. You must comply with the limitations described in the Microsoft Campus Agreement and the CUNY Computer User Responsibilities, in addition to other policies and procedures all posted on the Macaulay website at 1
2 5. Care of the Equipment. (c) (d) You are responsible for the care of the Equipment and must keep it in good working condition. If the Equipment malfunctions or is damaged, you are responsible for arranging repairs. The notebook computer provided by this Agreement is covered for the term of this License by an extended warranty ( AppleCare ) purchased by CUNY from Apple Computer, Inc. This three-year warranty covers defects in materials and workmanship, as determined by Apple Computer, Inc. If you encounter difficulties with your Equipment, you should first consult the Instructional Technology Fellow at your campus Honors College office. If a repair is necessary, you will be instructed to call Apple Education Technical Support at , option 3, or to visit an Apple Store or an Apple Authorized Repair Center. Any incident of Equipment loss or theft must be reported to the Macaulay Honors College as soon as possible, but no later than 48 hours after the incident. All cases of loss or theft will be fully investigated by CUNY Security and by the police. You will be asked to check in the Equipment with the Macaulay Honors College once a year so that CUNY can ensure asset protection. Failure to comply with this requirement may result in a fine or the revocation of your privilege to remove the laptop from your campus or use it when classes are not in session. You are responsible for all data backups. CUNY will not be responsible for data loss due to hardware failure, software failure, or any other issue. 6. Modification of the Equipment. You may not alter or modify the Equipment. You may not add any software or hardware without the permission of the Macaulay Honors College. 7. Change in Status. If you are dismissed or you withdraw from the Honors College program, you must immediately return the Equipment to the Macaulay Honors College. Failure to return the Equipment may result in criminal prosecution or civil liability. 8. Use of Included Software. The notebook computer you receive as part of the Equipment will be loaded with certain computer software programs, and additional software may be added by CUNY during the term of this Agreement (collectively, the "Included Software"). You are provided with the Included Software on the basis of your status as a participant in the Honors College. You must comply with any software licenses applicable to the Included Software. If you choose to purchase the Equipment for one dollar ($1.00) after three years, you will gain title and rights to the Equipment, and license to use the Included Software. 9. Limitation of Liability. CUNY is not responsible or accountable to you for any loss, damage, claim, demand, liability, cost or expense of any nature or kind, including indirect, special or consequential damages, arising directly or indirectly out of your possession, use, control or operation of the Equipment, including those resulting from the inadequacy of the Equipment, or the results obtained from it, or any defect in it, or from mechanical failures of the Equipment, loss of data, or from interruption of information technology use while such failures are being remedied or while other repairs and/or maintenance are being performed. 2
3 10. Default. You will be in default of this Agreement if (i) you fail to care for and maintain the condition of the Equipment; (ii) you loan or make any other transfer of the Equipment; or (iii) you violate any of the other terms or conditions of this Agreement. A default may result in criminal prosecution or civil liability. In addition, upon your default, CUNY has the right to take immediate possession of the Equipment. Student Signature I have read this Agreement and its attachments and agree to abide by its terms and conditions. Student's Name (print) Parent s Name (if student is under age 18) Signature Parent s Signature (if student is under age 18) CUNY Signature The City University of New York By: Title 3
4 APPENDIX A CUNY COMPUTER USER RESPONSIBILITIES NOTE: The City University of New York Computer User Responsibilities is a statement originally prepared by the University's Computer Policy Committee. It underwent review by the University Faculty Senate and the CUNY Office of the Vice Chancellor for Legal Affairs. The computer resources** of The City University of New York must be used in a manner that is consistent with the University's educational purposes and environment. All users of computer resources are expected to act in a spirit of mutual respect and cooperation, and to adhere to the regulations for their use set forth in this document. As a user of CUNY computer resources: You must have a valid authorized account to use computer resources that require one and may use only those computer resources that are specifically authorized. You may use your account only in accordance with its authorized purposes and may not use an unauthorized account for any purpose. You are responsible for the safeguarding of your computer account. For a mainframe computer account, you should change your password frequently and should not disclose it to anyone. You should take all necessary precautions in protecting the account, no matter what type of computer resources you are using. You may not circumvent system protection facilities. You may not knowingly use any system to produce system failure or degraded performance. You may not engage in unauthorized duplication, alteration or destruction of data, programs or software. You may not transmit or disclose data, programs or software belonging to others and may not duplicate copyrighted material. You may not engage in abusive or improper use of computer hardware. This includes, but is not limited to, tampering with equipment, unauthorized attempts at repairing equipment and unauthorized removal of equipment components. You may not use computer resources for private purposes, including, but not limited to, the use of computer resources for profit making or illegal purposes. You may not use computer resources to engage in abuse of computer personnel or other users. Such abuse includes the sending of abusive, anonymous, or unsolicited messages within CUNY or beyond via network facilities. The use of college computer resources may be subject to college regulations, and you are expected to be familiar with those regulations. These regulations and college regulations are subject to revision. You are expected to be familiar with any revisions in regulations. 4
5 The University reserves the right to monitor, under appropriate conditions, all data contained in the system to protect the integrity of the system and to insure compliance with regulations. Any user who is found to be in violation of these rules shall be subject to the following: Suspension and/or termination of computer privileges; Disciplinary action by appropriate college and/or University officials; Referral to law enforcement authorities for criminal prosecution; Other legal action, including action to recover civil damages and penalties. ******* ** "Computer Resources" is an inclusive term referring to any and all computing/information technology: hardware, software and access. Hardware includes, but is not limited to, terminals, personal computers, workstations, printers, mice, monitors, cabling, peripheral devices. Software includes, but is not limited to, mainframe shared software, networked software, and stand-alone software residing on personal computers. Access includes, but is not limited to, accounts on timesharing systems as well as access to stand-alone personal computing systems and other relevant technology. Revised 1/95 If you have any questions about the statement please contact the CUNY Help Desk at or via 5
Administrative Procedure 3720 Computer and Network Use
Reference: 17 U.S.C. Section 101 et seq.; Penal Code Section 502, Cal. Const., Art. 1 Section 1; Government Code Section 3543.1(b); Federal Rules of Civil Procedure, Rules 16, 26, 33, 34, 37, 45 The District
More informationAppendix I. The City University of New York Policy on Acceptable Use of Computer Resources
Appendix I The City University of New York Policy on Acceptable Use of Computer Resources Introduction CUNY s computer resources are dedicated to the support of the university s mission of education, research
More informationINFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security
INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security State Fair Community College shall provide a central administrative system for use in data collection and extraction. Any system user
More informationRiverside Community College District Policy No. 3720 General Institution
Riverside Community College District Policy No. 3720 General Institution BP 3720 COMPUTER AND NETWORK USE References: Education Code Section 72400 Penal Code 502 17 U.S. Code Sections 101, et seq. It shall
More informationTHE CITY UNIVERSITY OF NEW YORK POLICY ON ACCEPTABLE USE OF COMPUTER RESOURCES
THE CITY UNIVERSITY OF NEW YORK POLICY ON ACCEPTABLE USE OF COMPUTER RESOURCES I. INTRODUCTION CUNY s computer resources are dedicated to the support of the University s mission of education, research
More informationRESPONSIBLE COMPUTER USE POLICY (ADOPTED AUGUST 3, 2006)
RESPONSIBLE COMPUTER USE POLICY (ADOPTED AUGUST 3, 2006) on-line at www.ccc.edu I. INTRODUCTION All users shall abide by the following provisions contained herein, or otherwise may be subject to disciplinary
More informationUse of ESF Computing and Network Resources
Use of ESF Computing and Network Resources Introduction: The electronic resources of the State University of New York College of Environmental Science and Forestry (ESF) are powerful tools, shared among
More informationInformation Technology Security Policies
Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral
More informationInformation Resources Security Guidelines
Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive
More informationHIPAA Security Training Manual
HIPAA Security Training Manual The final HIPAA Security Rule for Montrose Memorial Hospital went into effect in February 2005. The Security Rule includes 3 categories of compliance; Administrative Safeguards,
More informationCaldwell Community College and Technical Institute
Caldwell Community College and Technical Institute Employee Computer Usage Policies and Procedures I. PURPOSE: The purpose of this section is to define the policies and procedures for using the administrative
More informationHardware and Software
Hardware and Software Purpose Bellevue School District (BSD) provides and requires faculty, staff and students to use data processing equipment and peripherals. BSD maintains multiple computer systems
More informationBEConnected User Agreement
BEConnected User Agreement Page 1 of 5 INTRODUCTION This is a legal document between you and the owner ( Belmont College ) of the Apple ipad tablet ( ipad ) in connection with the delivery of an ipad to
More informationipad Acceptable Use Regulation
ipad Acceptable Use Regulation The Mamaroneck School District has purchased Apple ipads for selected students of the Mamaroneck School District. These students will be issued ipads with predetermined applications
More informationThe Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3
Table of Contents 1 Acceptable use 1 Violations 1 Administration 1 Director and Supervisor Responsibilities 1 MIS Director Responsibilities 1 The Internet and e-mail 2 Acceptable use 2 Unacceptable use
More informationAcceptable Use Policy
Acceptable Use Policy Department of Information Technology Olivet Nazarene University (815) 939-5302 Published August 2013 Ver. 4.0 Policy Overview 1. Executive Summary This summary is intended to present
More informationNIAGARA COLLEGE OF APPLIED ARTS & TECHNOLOGY 300 Woodlawn Road Welland, ON L3C 7L3 LAPTOP COMPUTER AGREEMENT & SUPPLEMENTARY GUIDELINES
NIAGARA COLLEGE OF APPLIED ARTS & TECHNOLOGY 300 Woodlawn Road Welland, ON L3C 7L3 LAPTOP COMPUTER AGREEMENT & SUPPLEMENTARY GUIDELINES This COMPUTER AGREEMENT (this Agreement ) is made effective as of,
More informationPolicy for the Acceptable Use of Information Technology Resources
Policy for the Acceptable Use of Information Technology Resources Purpose... 1 Scope... 1 Definitions... 1 Compliance... 2 Limitations... 2 User Accounts... 3 Ownership... 3 Privacy... 3 Data Security...
More informationOne-to-One Technology Initiative Table of Contents
One-to-One Technology Initiative Table of Contents 1. Acceptable Use... 2-4 General Staff Responsibilities Parent and Guardian Responsibilities User Responsibilities Consequences 2. ipad Identification
More informationLaptops for Students Program
Laptops for Students Program Technology Use Agreement Handbook Expanding Learning to the 21st Century and Beyond PAGE 1 OF 13 Table of Contents Laptop Policy & Procedures Handbook 3 Objectives 3 Laptop
More informationTEKAMAH-HERMAN COMMUNITY SCHOOLS LEARNING INITIATIVE POLICY AND PROCEDURES 2014-2015
TEKAMAH-HERMAN COMMUNITY SCHOOLS LEARNING INITIATIVE POLICY AND PROCEDURES 2014-2015 Tekamah-Herman Community Schools is proud to offer our High School Students Apple MacBook Air computers for use at school
More informationNew York State Office Of Children And Family Services VPN
CLIENT VPN New York State Office Of Children & Family Services New York State Office of Children & Family Services (OCFS) Client Virtual Private Network (VPN) Access to the Human Services Enterprise Network
More informationWilliam Jewell College Jewellverse Policies
William Jewell College Jewellverse Policies Prior to receiving a William Jewell College network account, all students, faculty and staff are required to read and sign the College s Acceptable Use Policy.
More informationBates Technical College. Information Technology Acceptable Use Policy
Bates Technical College Information Technology Acceptable Use Policy Consistent with policy adopted by the Board of Trustees, Bates Technical College, hereinafter referred to as the College, has a commitment
More informationUniversity of Hartford. Software Management and Compliance Guidelines
University of Hartford Software Management and Compliance Guidelines This policy is issued in an effort to remind the University community of the importance of complying with that policy and to reiterate
More informationResponsible Use of Technology and Information Resources
Responsible Use of Technology and Information Resources Introduction: The policies and guidelines outlined in this document apply to the entire Wagner College community: students, faculty, staff, alumni
More informationWYOMING CENTER FOR LEGAL AID
(Please Print Information Below) WYOMING CENTER FOR LEGAL AID Skype Clinic Laptop and Printer Loan Agreement Site Host Host Organization Mailing Address Contact Phone Number City, State, ZIP Fax Number
More informationEncryption Security Standard
Virginia Commonwealth University Information Security Standard Title: Encryption Security Standard Scope: Approval February 22, 2012 This document provides the encryption requirements for all data generated,
More informationDelaware State University Policy
Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message
More informationDATA ACCESS POLICY. Attached is a policy statement regarding data access at the New Jersey Institute of Technology.
DATA ACCESS POLICY As NJIT has moved to a distributed data access environment, policy has been established to protect the computer-based institutional data from unauthorized (c.q. other improprietary)
More informationTELECOMMUNICATION PLAN AND ELECTRONIC COMMUNICATION USE 8.60+
TELECOMMUNICATION PLAN AND ELECTRONIC COMMUNICATION USE 8.60+ BYOD (Bring Your Own Device) Technology Acceptable Use Washington District Schools provides all students access to technology, the district
More informationOXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY
OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY 1. Purpose Oxford Community Schools (the District ) recognizes that advancements in technology affect the
More informationValdosta State University. Information Resources Acceptable Use Policy
Valdosta State University Information Resources Acceptable Use Policy Date: December 10, 2010 1. OVERVIEW... 3 2. SCOPE... 3 3. DESIGNATION OF REPRESENTATIVES... 3 3.1 UNIVERSITY PRESIDENT... 3 3.2 VICE
More informationCOMPUTER USE POLICY. 1.0 Purpose and Summary
COMPUTER USE POLICY 1.0 Purpose and Summary 1. This document provides guidelines for appropriate use of the wide variety of computing and network resources at Methodist University. It is not an all-inclusive
More informationAll individuals with access to Twin Falls School District technology and computer networks will:
Twin Falls School District #411 Computer and Network Use Policy 201 Main Avenue West Twin Falls, Idaho 83301 Telephone: 208-733-6900 Fax: 208-733-6987 Technology users responsibilities go beyond general
More informationTexas University Law - General Use of Technology Resources
Procedure No. 27.99.99.T1.01 (Effective 5/16/03) Computer Use PROCEDURE: Tarleton State University provides each of its students, faculty and staff with one or more computer accounts (user-ids) that permit
More informationAP 417 Information and Communication Services
AP 417 Information and Communication Services Background Access and use of information and communication services (ICS) are an integral component of the learning and working environment. The ability for
More informationCOLORADO STATE UNIVERSITY SYSTEM
Board Policy: The purpose of this ipad Usage Policy is to establish guidelines and procedures for staff and Board members of the Colorado State University System (CSUS) to implement the efficient use of
More informationIII. RESPONSIBILITIES
Issued by: Calvin O. Butts, III, President Effective Date: September 23, 2013 Page 1 of 5 I. POLICY & SCOPE This is the SUNY College at Old Westbury policy on College-provided access to electronic information
More informationBoston Public Schools. Guidelines for Implementation of Acceptable Use Policy for Digital Information, Communication, and. Technology Resources
Boston Public Schools Guidelines for Implementation of Acceptable Use Policy for Digital Information, Communication, and Scope of Policy Technology Resources ACCEPTABLE USE POLICY AND GUIDELINES Boston
More informationPURPOSE To establish standards for the use of College networks and computer accounts.
IT 01 Classification: Responsible Authority: Executive Sponsor: Approval Authority: Date First Approved: 1998.03.02 Date Last Reviewed: 2011.11.23 Mandatory Review Date: 2016.11.23 Acceptable Use of Computer
More informationSUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE
Page 1 of 8 I. PURPOSE To outline the University's policies for students, faculty, staff and others, concerning the use of the University's computing and communication resources, including those dealing
More informationInnoCaption TM Service Terms of Use
PRIOR TO USING THE INNOCAPTION SERVICE YOU MUST REVIEW AND AGREE TO THE TERMS AND CONDITIONS OF THIS SERVICE AGREEMENT ( AGREEMENT ) BY COMPLETING YOUR REGISTRATION ( SIGN UP ) FOR INNOCAPTION SERVICE.
More informationSTATE UNIVERSITY OF NEW YORK AT BROOKLYN DOWNSTATE MEDICAL CENTER COMPUTER and NETWORK USAGE POLICY I. INTRODUCTION
STATE UNIVERSITY OF NEW YORK AT BROOKLYN DOWNSTATE MEDICAL CENTER COMPUTER and NETWORK USAGE POLICY I. INTRODUCTION Access to modern information technology is essential to the state university mission
More informationNOTRE DAME PREPARATORY AND MARIST ACADEMY
NOTRE DAME PREPARATORY AND MARIST ACADEMY Parent/Student Microsoft Surface Terms and Agreement Contract Notre Dame Preparatory School and Marist Academy is committed to preparing its students for a 21
More informationEthical and Responsible Use of EagleNet 03/26/14 AMW
Campus Technology Services Solutions Center Juniata College 814.641.3619 help@juniata.edu http://services.juniata.edu/cts Ethical and Responsible Use of EagleNet 03/26/14 AMW Preamble The resources of
More information2.5.1 Policy on Responsible Use of University Computing Resources Introduction This policy governs the proper use and management of all University of
2.5.1 Policy on Responsible Use of University Computing Resources Introduction This policy governs the proper use and management of all University of San Diego computing and network resources. This policy
More informationEMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197
(Return this page to the Executive Staff member or Principal) MEMPHIS CITY SCHOOLS EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197 As a condition of using the MCS network, I
More informationAutodesk EMEA Campus License Agreement
IMPORTANT. BY SIGNING THIS LICENSE AGREEMENT, INSTITUTION AGREES TO BE BOUND BY THE TERMS AND CONDITIONS OF THIS EMEA CAMPUS LICENSE AGREEMENT ( LICENSE AGREEMENT ). THESE ARE THE ONLY TERMS UPON WHICH
More informationTECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320
TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320 The Edgecombe County Board of Education (the Board ) provides its students and staff access to a variety of technological resources. These resources
More informationConditions of Use. Communications and IT Facilities
Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other
More informationOCS Student / Parent Laptop Agreement
OCS Student / Parent Laptop Agreement Terms and Conditions of Use By signing this form, the student and the student s parent/guardian certify that they have thoroughly read, understand, and accept the
More informationBring Your Own Device (BYOD) Handbook. Smackover-Norphlet School District
Bring Your Own Device (BYOD) Handbook Smackover-Norphlet School District August, 2014 For the purposes of BYOD, devices means personally owned, wireless portable electronic equipment used for instructional
More informationDracut Public Schools Technology Acceptable Use Policy Revised 2014
1 Dracut Public Schools Technology Acceptable Use Policy Revised 2014 The Dracut Public Schools (DPS) encourages the use of information technology to assist staff and students with academic success, preparation
More informationHow To Use A College Computer System Safely
Claremont Graduate University and The Claremont Colleges Policy Regarding Appropriate Use of Campus Computing and Network Resources An overall guiding mission of The Claremont Colleges is education in
More informationKINGS COUNTY OFFICE OF EDUCATION ACCEPTABLE USE POLICY
KINGS COUNTY OFFICE OF EDUCATION ACCEPTABLE USE POLICY 1. Internet access is provided by Kings County Office of Education (KCOE). In order to utilize this service, users must agree and abide by this acceptable
More informationBOARD OF EDUCATION Cherry Hill, New Jersey
BOARD OF EDUCATION Cherry Hill, New Jersey POLICY 6142.12 ACCEPTABLE USE OF TECHNOLOGY Introduction The Board of Education encourages the use of technology in the classroom as an educational tool and to
More informationAppropriate Use of Campus Computing and Network Resources
The Claremont Colleges Policy Regarding Appropriate Use of Campus Computing and Network Resources Approved by the Council of The Claremont Colleges on 08/20/04 An overall guiding mission of The Claremont
More informationUniversity of Maryland Baltimore Information Technology Acceptable Use Policy
The UMB School of Nursing follows and adheres to the UMB Campus Information Technology Acceptable Use Policy. The UMSON further defines Authorized User to also include any person who receives a password
More informationCode of Virginia, 1950, as amended, Sections 18.2 372, 18.2 374.1:1, 18.2 390, 22.1 70.2, and 22.1 78
Book Section Title Number Status SCS Policy Manual I INSTRUCTION Acceptable Use of Electronic Network Resources and Internet Safety IIBEA * R Active Legal 18 U.S.C. Sections 1460 and 2256 47 U.S.C. Section
More informationEastwood Local Schools Laptop Policies and Handbook
Eastwood Local Schools Laptop Policies and Handbook Table of Contents Program Overview - 3 Acceptable Use Policy - 4 Information Technology Resources Responsibilities & Agreement - 7 District Laptop Service
More informationTOLEDOTEL INTERNET SERVICE AGREEMENT (As of July, 2014)
TOLEDOTEL INTERNET SERVICE AGREEMENT (As of July, 2014) This agreement sets forth the terms and conditions under which ToledoTel will provide Internet service to you at your home or business. 1. The Service
More informationCC. TECHNOLOGY ACCEPTABLE USE POLICY. 1. Purpose
CC. TECHNOLOGY ACCEPTABLE USE POLICY 1. Purpose a. The Children s Internet Protection Act (CIPA), 47 U.S.C. 254(h)(5), and South Dakota Consolidated Statues Section 22-24-55 require public schools to implement
More informationFranciscan University of Steubenville Information Security Policy
Franciscan University of Steubenville Information Security Policy Scope This policy is intended for use by all personnel, contractors, and third parties assisting in the direct implementation, support,
More informationDecatur Public Schools Microsoft Surface Pro 3 Tablet Acceptable Use Policy and Procedures
Decatur Public Schools Microsoft Surface Pro 3 Tablet Acceptable Use Policy and Procedures 2015-2016 DPS Tablet Assigned to: Tablet TAG: Serial Number: Distribution of Devices Surface Pro Tablets and accessories
More informationValmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks
Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks The Valmeyer Community Unit School District #3 Board of Education supports the use of the Internet and other computer
More informationPalacios High School. Creating a Culture of excellence through High Expectations. Student/Parent Laptop Handbook
Palacios High School Creating a Culture of excellence through High Expectations Student/Parent Laptop Handbook 2014-2015 Page 2 of 18 Table of Contents Purpose of the Laptop Checkout Initiative 3 Terms
More informationR345, Information Technology Resource Security 1
R345, Information Technology Resource Security 1 R345-1. Purpose: To provide policy to secure the private sensitive information of faculty, staff, patients, students, and others affiliated with USHE institutions,
More informationThe Design Society. Information Security Policy
The Design Society Policies and Forms That Conform to PCI DSS SAQ A Version 2.0 June 2014 About this Document This document contains The Design Society information security policies. This document is
More informationComputing and Network Use Policy
Computing and Network Use Policy Category: University Area Date Established: Responsible Office: Office of the Chief Information Officer Date Last Revised: - 3/26/2007 Responsible Executive: CIO Date Posted
More informationMcGill-Toolen Catholic High School Technology Acceptable Use Policy
McGill-Toolen Catholic High School Technology Acceptable Use Policy Ben Fancher Director of Instructional Technology June 24, 2015 Ben Fancher email: fancheb@mcgill-toolen.org McGill-Toolen Catholic High
More informationVirginia Commonwealth University Information Security Standard
Virginia Commonwealth University Information Security Standard Title: Scope: Data Classification Standard This document provides the classification requirements for all data generated, processed, stored,
More informationPlease review and make copies of the following documents for each designated staff in need of Valley Express access.
Welcome to Valley Express (VE) Valley Express is Valley Health Plan s (VHP) Authorization and Referral data system. By signing this document, the individual signifies that the County s User Responsibility
More informationNORTHEAST COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE NUMBER: AP-5250.0 FOR POLICY NUMBER: BP 5250 ACCEPTABLE USE PROCEDURES ELECTRONIC RESOURCES
NORTHEAST COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE NUMBER: AP-5250.0 FOR POLICY NUMBER: BP 5250 ACCEPTABLE USE PROCEDURES ELECTRONIC RESOURCES 1. PROCEDURE SUMMARY STATEMENT To establish procedures relating
More informationB. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.
Chicago Public Schools Policy Manual Title: ACCEPTABLE USE OF THE CPS NETWORK AND COMPUTER RESOURCES Section: 604.1 Board Report: 09-0722-PO3 Date Adopted: July 22, 2009 Policy: THE CHIEF EXECUTIVE OFFICER
More informationCovered California. Terms and Conditions of Use
Terms and Conditions of Use Contents: Purpose Of This Agreement Privacy Policy Modification Of This Agreement Permission To Act On Your Behalf How We Identify You Registration Additional Terms For Products
More informationPolicies and Procedures For 1:1 Program Ogallala Public Schools
Policies and Procedures For 1:1 Program Ogallala Public Schools Ogallala Public Schools is proud to offer our Ogallala High School students Apple ipad devices for use at school and at home. The 1:1 ipad
More informationWarren County Public Schools. Electronic Resources Acceptable Use Procedures, Guidelines, and Signature Forms
Warren County Public Schools Electronic Resources Acceptable Use Procedures, Guidelines, and Signature Forms Revised January 2012 Overview and Rational of the Warren County Public Schools Acceptable Use
More informationWestchester Community College Student Technology Use Policy Version 2 / April 2015 Table of Contents
Westchester Community College Student Technology Use Policy Version 2 / April 2015 Table of Contents Introduction... 2 Prohibited Use... 2 Electronic Communication & Computer Usage... 3 Identification
More informationInformation Technology
Information Technology A Handbook for Employees and Students PASSED by FBC BOARD OF DIRECTORS, AUGUST 13, 2006 (Revised 8-10-06) TABLE OF CONTENTS 2 Introduction... 3 Access to Information Technology Resources...
More informationNew Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email,
New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email, Computer, And Networking Technologies Usage 1.0 Purpose
More informationUSE OF INFORMATION TECHNOLOGY FACILITIES
POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised
More informationHamlin School District Student Computer Handbook
Hamlin School District Student Computer Handbook 2014-2015 INTRODUCTION All 9 th -12 th grade students will be issued computers for use as part of their educational curriculum. The purpose of these computers
More informationBossier Parish Community College
Bossier Parish Community College Department of Cyber Information Technology Welcome to the Program! Network Security & Networking Tracks Code of Conduct This marks the beginning of your journey through
More informationComputer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014
I. Introduction Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014 Ohio Wesleyan University (OWU) provides computing resources to support the educational mission and administration
More informationContra Costa Community College District Business Procedure 10.06 ACCEPTABLE TECHNOLOGY USE
Contra Costa Community College District Business Procedure 10.06 ACCEPTABLE TECHNOLOGY USE SECTION 1. PREAMBLE With the advent of powerful hardware and software, the Internet and the World Wide Web, computers
More informationDEPARTMENTAL POLICY. Northwestern Memorial Hospital
Northwestern Memorial Hospital DEPARTMENTAL POLICY Subject: DEPARTMENTAL ADMINISTRATION Title: 1 of 11 Revision of: NEW Effective Date: 01/09/03 I. PURPOSE: This policy defines general behavioral guidelines
More informationHow To Use The Internet At An Eastern School District Computer Network And Internet Access Safely
ADMINISTRATIVE REGULATIONS Definitions Information and Communications Technology (ICT) System refers to computers which are operating as stand-alone units or connected via cabling and/or wireless technology,
More informationComputer, Network, Internet and Web Page Acceptable Use Policy for the Students of the Springfield Public Schools
Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the The computer and information technology resources, which includes World Wide Web access and electronic mail capability,
More informationHealth Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)
Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH) Table of Contents Introduction... 1 1. Administrative Safeguards...
More informationNetwork and Workstation Acceptable Use Policy
CONTENT: Introduction Purpose Policy / Procedure References INTRODUCTION Information Technology services including, staff, workstations, peripherals and network infrastructures are an integral part of
More informationStudent Personal Laptop Computer Agreement
Marsha W.Rybin Principal HighTech Los Angeles A California Charter School 17111 Victory Blvd., Lake Balboa, CA 91406 Telephone: (818) 609-2640 Facsimile: (818) 881-1754 Student Personal Laptop Computer
More informationDepartment of Finance and Administration Telephone and Information Technology Resources Policy and Procedures March 2007
Department of Finance and Administration Telephone and Information Technology Resources Policy and Procedures March 2007 I. Statement of Policy The Department of Finance and Administration (DFA) makes
More informationInformation Security Policy and Handbook Overview. ITSS Information Security June 2015
Information Security Policy and Handbook Overview ITSS Information Security June 2015 Information Security Policy Control Hierarchy System and Campus Information Security Policies UNT System Information
More informationAPPROPRIATE USE OF INFORMATION POLICY 3511 TECHNOLOGY RESOURCES ADOPTED: 06/17/08 PAGE 1 of 5
PAGE 1 of 5 PURPOSE Triton College s computer and information network is a continually growing and changing resource supporting thousands of users and systems. These resources are vital for the fulfillment
More informationLutheran Education Association of Houston Acceptable Use Policy (Students)
Lutheran Education Association of Houston Acceptable Use Policy (Students) With the use of technology, including the Internet, Intranet, hardware and software, the Lutheran Education Association of Houston
More informationPolicy and Procedure for Internet Use Summer Youth Program Johnson County Community College
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access
More informationRedland Christian Migrant Association (RCMA) Internet Security and Safety Policy
Redland Christian Migrant Association (RCMA) Internet Security and Safety Policy I. Overview RCMA supports instruction through the use of educational and administrative computers. The responsible use of
More informationWebsite & Email Hosting Terms & Conditions
Website & Email Hosting Terms & Conditions 1-PARTIES Web Hosting Services are provided by TimeForCake Creative Media, Inc. ("TimeForCake") to Client conditional on the terms and conditions set forth below
More information