Pakistan Education & Research Network (PERN)
|
|
|
- Adrian Kelly
- 10 years ago
- Views:
Transcription
1 Pakistan Education & Research Network (PERN) Access Usage Policy (AUP) Version 1.1 Released 1st April Definitions 1.1 PERN is the acronym of the Pakistan Education & Research Network. The revolutionary Pakistan Education and Research Network (PERN) Program is a nationwide educational intranet connecting premier education and research institutes and providing high-speed internet bandwidth across a national network. 1.2 NRENs are (National Research and Education Networks)of of Albania, Bosnia & Herzegovina, Bulgaria, FYR of Macedonia, Serbia & Montenegro or any other parts of the world 1.3 The Purpose of PERN is to support interworking, teaching, learning and research within the PERN communities and to serve the user communities of the PERN NREN in their activities related to research and education, as well as to their management, administrative, and information oriented tasks. 1.4 PERN services are all those network services available on the basis of the PERN infrastructure. 1.5 PERN resources are all those tangible and intangible assets, hardware equipment and software tools, as well as human workforce, involved in operating the PERN infrastructure and PERN services. 1.6 International traffic is the traffic between the PERN and any other international Public network. 1.7 International traffic of the NRENs is the traffic between the PERN and any other NRENs in Europe or any other parts of the world. 1.8 In view of this document, the following PERN traffic categories are taken into consideration PERN AUP V1.1 Created on 3/31/ :59:00 AM Page 1 of 5
2 2. Purpose a) Research and Education (R&E) traffic is any Internet traffic directly related to research and/or education, and flowing between research and education organizations. b) Commodity Traffic is any Internet traffic directly related to research and/or education, and flowing between a research and/or education organization and a non-research and/or education organization. c) Commercial Traffic is any Internet traffic not belonging to the categories of R&E traffic or commodity traffic. Any traffic is practically considered commercial traffic if it is flowing between organizations that are neither research nor education in nature. d) High Performance Research and Education (HP-R&E) traffic is R&E traffic between/among a small subset of research and education organizations requiring high performance network services. 1.8 Users of the PERN resources are, on one hand, those organizations belonging to the PERN and being connected to the mentioned network, and, on the other hand, those individual users accessing the network services provided by the NRENs on the basis of their infrastructure and their resources. 1.9 User communities of the PERN are the communities consisting of users belonging to the research, education, and public collection sectors, and possibly some further non-profit organizations being in relation with these sectors (in the followings: research and education user communities), within the PERN In view of this document, the following PERN user categories are taken into consideration as those ones being eligible to belong to a PERN NREN: a) University networks, b) Networks of public sector research and education organizations, c) Networks of ministries and public organizations directly related to the above-mentioned institutions, e.g. the Ministries of Education, Ministries of Science, etc. d) Public collections, libraries, as well as research and development departments of other not-for-profit organizations. The present AUP (Acceptable Use Policy) document determines what are considered acceptable and unacceptable use of the national and international academic and research network of the PERN. This AUP is to be applied and taken into consideration by all Users of the PERN resources. It is the responsibility of the Users of the PERN resources and User communities of the PERN to PERN resources in an acceptable manner and in accordance with this AUP. It is the responsibility of NRENs to ensure that members of their own User communities use PERN resources in an acceptable manner and in accordance with this AUP As far as the coverage of the involved rules and regulations are concerned, this AUP is to be applied in case of both national and international traffic. Concerning the extent of the PERN AUP V1.1 Created on 3/31/ :59:00 AM Page 2 of 5
3 AUP, the PERN may add further rules and regulations to those contained by the present AUP. 3. Acceptable USE 3.1 Using the national network of the PERN and generating traffic so that that usage and traffic are serving the purpose of the academic and research networks of the PERN is fully accepted by this AUP. 3.2 Any user of the PERN resources may use the PERN infrastructure and PERN services for the purpose of generating R&E traffic and HP-R&E traffic with other users within the PERN user community, and with organizations attached to networks that are reachable via networking agreements operated by PERN. 3.3 The use of the PERN infrastructure for generating commodity traffic is also acceptable, provided that: a. such traffic is approved by the managing bodies of the PERN, b. provisions for such commodity traffic are duly made by the PERN and the related NRENs, c. such traffic is agreed by the related user communities outside the PERN 3.4 The usage of the national networks of the PERN and generation of international Traffic and International Traffic of NRENs are accepted for any applications but for those prohibited by Section 3 "Unacceptable use" of this document. 3.5 Those users accessing any other network through the PERN infrastructure by exploiting the services of such other service provider, should also take into consideration the AUP of those accessed networks. 3.6 PERN resources may be used for any legally acceptable and correct activity that is in furtherance of the purpose of PERN and of the aims and policies of the PERN user communities. 4. Unacceptable USE 4.1 It is not permitted to practice business over the PERN infrastructure. This applies to all PERN Users and includes selling products, services or bandwidth and advertising 4.2 It is not permitted to use the PERN infrastructure for commercial traffic, ie. to transfer data whose both the originator and the receiver are commercial institutions or non-eligible networks or their foreign counterparts. The PERN infrastructure must not be used for any of the following: a) Activities being in contradiction with the law of the country of the related NREN b) Activities: hurting the personal rights of anybody else; activities aiming at collecting forbidden income; hurting intellectual rights; consciously illegal distribution of software. c) Transit traffic between users not belonging to the PERN user community d) Activities contradicting the rules and regulations of any national, foreign or international networks being connected to the PERN infrastructure, provided that these activities do affect these networks e) Forwarding services of the PERN infrastructure towards users outside the PERN user community; PERN AUP V1.1 Created on 3/31/ :59:00 AM Page 3 of 5
4 f) Direct commercial activities for profit making, including any kinds of advertising material either to other users, or to organizations connected to PERN infrastructure or any NRENs; g) Any activity hurting or disturbing anybody else, e.g. hurting the religious, ethnic, political or any other kinds of beliefs, characteristics, opinions, feelings, etc. of any other users of the PERN infrastructure; h) Disturbing or obstructing, without any established reason, and in more than a minor extent, the work of any other users (e.g. spamming); i) Extensive utilization of PERN resources for private purposes; j) The creation or transmission (other than for properly supervised and lawful research purposes) of any offensive, obscene or indecent images, data or other material, or any data capable of being resolved into obscene or indecent images or material; k) The creation or transmission of material that is designed or likely to cause annoyance, inconvenience or needless anxiety; l) The creation or transmission of defamatory material; m) The transmission of material such that this infringes the copyright of another person; 4.3 It is not permitted to use the PERN infrastructure for commercial traffic, ie. to Deliberate unauthorised access to facilities or services accessible via the PERN infrastructure. 4.4 Deliberate activities with any of the following characteristics are also prohibited: a) Activities disturbing or threatening normal operation of the PERN infrastructure; b) Wasting staff effort or networked resources, including time on end systems accessible via the PERN infrastructure and the effort of staff involved in the support of those systems; c) Illegal accessing and/or illegal exploitation of PERN resources or any information accessible through the network; d) Dissemination of any information or software being dangerous to the safety and security of the PERN infrastructure; e) Any activity towards illegal alteration, damage or destroying PERN resources or any information accessible through the PERN infrastructure f) Corrupting or destroying other users' data; g) Violating the privacy of other users; h) Disrupting the work of other users; i) Any activity utilizing the network so that it causes extensive traffic burden to the infrastructure, without any well established reason to such an extensive traffic level; j) Using the PERN infrastructure in a way that denies service to other users (for example, deliberate or reckless overloading of access links or of switching equipment); k) Continuing to use an item of networking software or hardware after the managing bodies of the PERN have requested that use cease because it is causing disruption to the correct functioning of the PERN infrastructure; PERN AUP V1.1 Created on 3/31/ :59:00 AM Page 4 of 5
5 l) Other misuse of the PERN infrastructure or networked resources, such as the introduction of "viruses" 5. Compliance and Non-Conformity Clauses 5.1 It is the responsibility of Users of the PERN resources, User communities of the PERN and NRENs to ensure that their members use PERN resources in an acceptable manner and in accordance with this AUP take all reasonable steps to ensure compliance with the conditions set out in this AUP, and to ensure that unacceptable use of the PERN infrastructure and resources does not occur. 5.2 The managing bodies of the PERN intend to avoid any such activities that may cause harm or damage to the PERN infrastructure and/or the PERN users, and to minimize the consequences of such harmful actions. Moreover, the managing bodies off the PERN intend to prevent accessing by non-authenticated users those information that are communicated or accessible through the network. However, the management bodies of the PERN can't take liability with respect to any eventual such harm or damage due to the lack of satisfactory technical means. Thus the PERN users should store and/or transmit information through the network by taking into consideration the limited security available. 5.3 In case of violation of the AUP, the managing bodies of the PERN have the right, after proper formal warning, to suspend the connection of the offending network, until the latter conforms to the rules. 5.4 Conscious, intentional and/or major violation of the AUP regulations shall be sanctioned by temporary or final disqualification of the related user(s) that means exclusion from the PERN infrastructure. 5.5 In case of minor violation or in case of unconsciousness, the related user is to be warned and informed about the AUP rules and regulations. If after such a warning a repeated violation follows, this should be considered an intentional or malicious violation. 5.6 In case of any suspicion of violations to the AUP regulations, if necessary, the managing bodies of the PERN should turn, through the PERN AND NRENs, to the involved user organization, by asking them to investigate the issue and to take any necessary action. In investigating the eventual problems, the managing bodies of the PERN and the management organizations of the related NRENs shall co-operate. 5.7 Where violation of these conditions is illegal, or results in loss or damage to the PERN resources or the resources of a PERN or any other users outside the PERN user communities, the matter may be referred for legal action. If necessary, the managing bodies of the PERN may initiate such legal actions. This AUP is to be regularly reviewed and to be updated in accordance with any eventual changes in the PERN infrastructure and PERN resources and its future amended texts are to be approved by the management bodies of the PERN and its current form has been agreed by the management bodies of the PERN and PERN principal. PERN AUP V1.1 Created on 3/31/ :59:00 AM Page 5 of 5
STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS
Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level
Sample Employee Network and Internet Usage and Monitoring Policy
CovenantEyes Internet Accountability and Filtering Sample Employee Network and Internet Usage and Monitoring Policy Covenant Eyes is committed to helping your organization protect your employees and members
Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety
Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Student Policy--SP004 Ventura Charter School of Arts and Global Education ("School") recognizes the
COMPUTER USE IN INSTRUCTION
COMPUTER USE IN INSTRUCTION 4526 The Board of Education is committed to optimizing student learning and teaching. The Board considers student access to a computer network, including the Internet, to be
Acceptable Use Policy
Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance
Virgin Media Business Acceptable Use Policy (Internet)
Virgin Media Business Acceptable Use Policy (Internet) 1 Introduction 1.1 This Acceptable Use Policy ( AUP ) specifies actions prohibited by Virgin Media Business to users of the Internet Services (in
Internet Use Policy and Code of Conduct
Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT
Students KS2-3 Acceptable Use Policy
Students KS2-3 Acceptable Use Policy Page 1 of 5 LITTLEGREEN SCHOOL Student Acceptable Use Policy Pupil access to the school network and Moodle is a privilege, not a right. All pupils must follow the conditions
Acceptable Use (Anti-Abuse) Policy
Acceptable Use (Anti-Abuse) Policy This document describes the Acceptable Use Policy for the Rightside registry. Copyright 2014 Rightside Registry Copyright 2014 Rightside Domains Europe Ltd. Rightside
2. Prohibit and prevent unauthorized online disclosure, use, or dissemination of personally identifiable information of students.
POLICY TITLE: Acceptable Use of Internet, Computer and Network Resources for Employees POLICY NO: 491 PAGE 1 of 5 Wendell School District No. 232 recognizes the importance of providing positive, productive
COMPUTER NETWORK FOR EDUCATION
4526 COMPUTER NETWORK FOR EDUCATION The Southern Westchester Board of Cooperative Educational Services (BOCES) considers student access to a computer network, including the Internet, to be a powerful and
Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer
1 Terms & Conditions In this section you can find: - Website usage terms and conditions 1, 2, 3 - Website disclaimer -Acceptable internet use policy 1,2,3,4 - Acceptable email use policy 1, 2 - Copyright
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers
Commercial in confidence TELSTRA WHOLESALE ACCEPTABLE USE POLICY. Commercial-in-Confidence. Issue Number 1.5, 20 November 2012
Commercial in confidence TELSTRA WHOLESALE ACCEPTABLE USE POLICY Commercial-in-Confidence Issue Number 1.5, 20 November 2012 ACCEPTABLE USE POLICY The following is the Telstra Wholesale Acceptable Use
Online Communication Services - TAFE NSW Code of Expected User Behaviour
Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection
Acceptable Use Policy (AUP) School Computing
Acceptable Use Policy (AUP) School Computing Approved by the Governing Body on Spring 2015 Review Date Spring 2018 Headteacher: Mr Ian Holmes BSc. (Hons) NPQH HOLBROOK PRIMARY SCHOOL Holbrook School Lane,
region16.net Acceptable Use Policy ( AUP )
region16.net Acceptable Use Policy ( AUP ) Introduction By using service(s) provided by region16.net (including, but not necessarily limited to, Internet Services and videoconferencing), you agree to comply
The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT.
Website - Terms and Conditions Welcome to our website. If you continue to browse and use this website you are agreeing to comply with and be bound by the following terms and conditions of use, which together
Cass Cable TV, Inc. and Greene County Partners, Inc. CASSCOMM ACCEPTABLE USE POLICY
Cass Cable TV, Inc. and Greene County Partners, Inc. CASSCOMM ACCEPTABLE USE POLICY CONTENTS I. Introduction II. Violation of this Acceptable Use Policy III. Prohibited Uses and Activities IV. Customer
R3321 ACCEPTABLE USE OF COMPUTER NETWORK(S)/COMPUTERS AND RESOURCES BY TEACHING STAFF MEMBERS
R 3321/Page 1 of 7 R3321 AND RESOURCES BY TEACHING STAFF MEMBERS The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes
School Policy Regarding Computer Use, Technology and Internet Access
School Policy Regarding Computer Use, Technology and Internet Access Please read the following carefully, as it provides information about the responsibilities and expectations regarding use of school
Email Policy For Staff and Students
Email Policy For Staff and Students Document Version Date Policy Owner Approval Email Policy V1.2 Dec 2011 ITS Reviewed - KPMG auditor V1.3 Feb 2012 Approved - elit committee March 2012 Approved Management
Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY
T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...
Terms and Conditions. Acceptable Use Policy Introduction. Compliance with UK Law. Compliance with foreign law
Terms and Conditions Acceptable Use Policy Introduction (hereafter called Hosted Developments) has created this Acceptable Use Policy (AUP) for hosting customers to protect our resources, and the resources
LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET
LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET The Board of Directors of the Louisa Muscatine Community School District is
Rules for the use of the IT facilities. Effective August 2015 Present
Rules for the use of the IT facilities Effective August 2015 Present INFORMATION MANAGEMENT GUIDE RULES FOR THE USE OF THE UNIVERSITY S IT FACILITIES ( The Rules ) 1. Introduction 2. Interpretation 3.
If you have any questions about any of our policies, please contact the Customer Services Team.
Acceptable Use Policy (AUP) 1. Introduction Blue Monkee has created this Acceptable Use Policy (AUP) for hosting customers to protect our resources and the resources of our other customers and hosting
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers
Acceptable Use Policy ("AUP")
Acceptable Use Policy ("AUP") Pacificnet Hosting (PacHosting)'s Acceptable Use Policy ("AUP") is provided to give our customers and users a clear understanding of what PacHosting expects of them while
Revelstoke Board of Education Policy Manual
Revelstoke Board of Education Policy Manual 3.8 Computer, Internet and BCeSIS Usage and Access This policy shall govern the use of computer equipment, software, the network, e-mail, Internet and BCeSIS
UTC Cambridge ICT Policy
UTC Cambridge ICT Policy Lead member of SLT: Designated Governor: Staff Member: Principal TBC Lead IT & Telecommunication Technician Contents Introduction Scope Purpose Monitoring of college systems Prohibitions
Johnson Creek School District Parent/Student Information Packet
Johnson Creek School District Parent/Student Information Packet This packet includes Johnson Creek School Board policies as referenced on the Parent/Student Signature Page, as well as, the Johnson Creek
Revised: 6-04, 8-09, 1-12 REGULATION #5420
Adopted: 9-03 PORTAGE PUBLIC SCHOOLS Revised: 6-04, 8-09, 1-12 REGULATION #5420 SUBJECT: Electronic Communications, Internet Safety & Acceptable Use Agreement All PPS electronic information resources are
POLICY 4526. Adopted by Board of Education: 4/20/05
POLICY 4526 COMPUTER NETWORK FOR EDUCATION The Board of Education is committed to optimizing student learning and teaching. The Board considers student access to a computer network, including the Internet,
GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY
GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY Telecommunications is radically changing the way the world accesses information. A computer network, linked to the Internet, an international computer network
GENOA, a QOL HEALTHCARE COMPANY WEBSITE TERMS OF USE
GENOA, a QOL HEALTHCARE COMPANY WEBSITE TERMS OF USE IF YOU HAVE A MEDICAL EMERGENCY, YOU ARE INSTRUCTED IMMEDIATELY TO CALL EMERGENCY PERSONNEL (911). DO NOT RELY ON THIS WEBSITE OR THE INFORMATION PROVIDED
SOUTH DOWNS INTRODUCTIONS LTD ACCEPTABLE USE POLICY INCORPORATING WEBSITE TERMS AND CONDITIONS
These terms of use govern your use of our site. Please read the whole of these terms in full before you use this Website. If you do not accept these terms, please do not use this Website. Your continued
TERMS & CONDITIONS FOR INTERNET ACCESS. Service Provided by Fast Telecommunication Company W.L.L. (hereinafter referred to as FAST Telco )
TERMS & CONDITIONS FOR INTERNET ACCESS Service Provided by Fast Telecommunication Company W.L.L. (hereinafter referred to as FAST Telco ) These are the Terms & Conditions upon which Fast Telco will provide
Acceptable Use Policy - NBN Services
OASIS TELECOM ABN: 31 155 359 541 P: 1300 734 399 F: 03 9011 9644 [email protected] www.oasistelecom.com.au PO Box 6153, Point Cook, VIC - 3030 Acceptable Use Policy - NBN Services Important Note:
Hyde School Student Computer Systems Acceptable Use Policy
Hyde School Student Computer Systems Acceptable Use Policy A. Hyde School Computer Systems and Internet Access Please read the following carefully before signing this document. This is a legally binding
Descriptor Code: EFE-P
ADMINISTRATIVE PROCEDURE Descriptor Term: ACCEPTABLE USE OF ELECTRONIC TRANSMISSION CAPABILITIES Descriptor Code: EFE-P Date Issued: October 30, 2003 Date Changed June 26, 2008 September 30, 2009 1. Network
LINCOLNSHIRE COUNTY COUNCIL. Information Security Policy Framework. Document No. 8. Email Policy V1.3
LINCOLNSHIRE COUNTY COUNCIL Information Security Policy Framework Document No. 8 Email Policy V1.3 Document Control Reference V1.3 Email Policy Date 17 July 2015 Author Approved by Version History David
MAINE COMMUNITY COLLEGE SYSTEM. SUBJECT: COMPUTER AND NETWORK USE PURPOSE: To promote the responsible use of college and System computers and networks
MAINE COMMUNITY COLLEGE SYSTEM GENERAL ADMINISTRATION Section 203 SUBJECT: COMPUTER AND NETWORK USE PURPOSE: To promote the responsible use of college and System computers and networks As with any college
BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12. Employee Computer Use Agreement. Terms and Conditions
BOARD OF EDUCATION POLICY ADMINISTRATIVE GUIDELINE 6.6.1A(3) BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12 Employee Computer Use Agreement The district is pleased to
Acceptable Use and Publishing Policy
1. Purpose This Policy outlines the principles, guidelines and requirements of acceptable use of and publishing to ecreators Pty Ltd (ecreators) hosting products and services. The purpose of this Policy
REGULATION ALLENDALE BOARD OF EDUCATION. PROGRAM R 2361/Page 1 of 7 USE OF COMPUTER NETWORK/COMPUTERS R 2361 USE OF COMPUTER NETWORK/COMPUTERS
R 2361/Page 1 of 7 R 2361 The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes only. The purpose of providing technology
IMPORTANT IT IS DEAMED THAT YOU HAVE READ AND AGREE TO ALL TERMS & CONDITIONS BEFORE USING THIS WEBSITE.
Terms & conditions for the use of this Website IMPORTANT IT IS DEAMED THAT YOU HAVE READ AND AGREE TO ALL TERMS & CONDITIONS BEFORE USING THIS WEBSITE. By using this website you are deemed to have full
APPROPRIATE USE OF DIGITAL COMMUNICATIONS AND TECHNOLOGIES POLICY
REGISTER OF POLICIES, PROCEDURES AND BY-LAWS APPROPRIATE USE OF DIGITAL COMMUNICATIONS AND TECHNOLOGIES POLICY Code: Policy 2.11 Date of Coming into Force: June 27, 2011 Number of Pages: 6 Origin: Education/
Agreeing to Shortcut Solutions,llc.. Acceptable Use Policy and Terms of Service is mandatory for Hosting signing up or using our services.
WEB HOSTING AGREEMENT AND TERMS OF SERVICE Shortcut Solutions, llc. --June 2007-- Acceptable Use Policy and Web Hosting Terms of Service Agreeing to Shortcut Solutions,llc.. Acceptable Use Policy and Terms
2.1 It is an offence under UK law to transmit, receive or store certain types of files.
Website Hosting Acceptable Use Policy 1. Introduction 1.1 Jarrett & Lam Consulting s Acceptable Use Policy for hosting customers to protect our resources, the resources of our customers and to ensure that
Terms of Use Table of Contents 1. General Information 2. Your Agreement to the Terms 3. Changes to the Terms 4. Provision of the Website
Terms of Use Table of Contents 1. General Information. 2. Your Agreement to the Terms. 3. Changes to the Terms. 4. Provision of the Website. 5. Location of the Website. 6. User Conduct. 7. Terms Relating
Tomball Independent School District. Technology Resources Acceptable Use and Internet Safety Policy
Tomball Independent School District Technology Resources Acceptable Use and Internet Safety Policy 2015-2016 TISD Technology Resources Acceptable Use and Internet Safety Policy Tomball ISD provides users
ACCEPTABLE USE POLICY OF BROADVOX, INC; BROADVOX, LLC; WWW.BROADVOX.COM; WWW.BROADVOX.NET (COLLECTIVELY BROADVOX )
ACCEPTABLE USE POLICY OF BROADVOX, INC; BROADVOX, LLC; WWW.BROADVOX.COM; WWW.BROADVOX.NET (COLLECTIVELY BROADVOX ) 1. ACCEPTANCE OF TERMS THROUGH USE This website (the Site ) provides you (the Customer
GENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE
GENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE By using the Genoa Online system (the System ), you acknowledge and accept the following terms of use: This document details the terms of
MEDWAY PUBLIC SCHOOLS Medway, MA. Acceptable Use Policy for School Network, Internet, and Equipment Grades 7-12
MEDWAY PUBLIC SCHOOLS Medway, MA Policy #21-A Acceptable Use Policy for School Network, Internet, and Equipment Grades 7-12 The District s goal in providing computer network technology and Internet access
Acceptable Use Policy
Acceptable Use Policy PLEASE READ THIS AGREEMENT CAREFULLY BEFORE ACCESSING THE SERVICE. BY ACCESSING THE SERVICE YOU AGREE TO BE BOUND BY THE TERMS AND CONDITIONS BELOW. IF YOU DO NOT WISH TO BE BOUND
PROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES
R 2361/Page 1 of 12 R 2361 ACCEPTABLE USE OF COMPUTER NETWORKS/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for
WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014
WORTHING COLLEGE STUDENT IT SECURITY POLICY October 2014 Policy name Student Information Technology Security Policy Author: Lesley May/Michael Perry Approved by SLT October 2014 Approved by Corporation
Acceptable Usage Policy
Version 2.1 20141230 Acceptable Usage Policy Acceptable Usage Policy Contents 1. PURPOSE OF THIS POLICY... 2 2. GENERAL... 2 3. APPLICATION... 2 4. UNREASONABLE USE... 2 5. UNACCEPTABLE USE... 3 6. SPAM...
Sibford School Student Computer Acceptable Use Policy
Introduction Sibford School Student Computer Acceptable Use Policy The use of the latest technology is actively encouraged at Sibford School but with this comes a responsibility to protect both students
Bates Technical College. Information Technology Acceptable Use Policy
Bates Technical College Information Technology Acceptable Use Policy Consistent with policy adopted by the Board of Trustees, Bates Technical College, hereinafter referred to as the College, has a commitment
