SlideShare uma empresa Scribd logo
1 de 15
General behavior
• Use MIS’ IT resources (1. ???, software, network etc.) in a
responsible manner and with respect to non-renewable 2. ???.
• Maintain the 3. ??? of your access codes.
• Respect third party rights, in particular copyrights for 4. ???, photos, 5.
???, 6. ??? and literature. This includes the MIS Logo, the MIS name
and MIS images.
• Do not 7. ??? or publish illegal content.
• Do not disclose or publish personal data or images of 8. ???, students
or other MIS personnel or community without asking them first.
• Backup your 9. ??? regularly.
• Immediately inform the MIS Help Desk of any dysfunction or damage.
Educational purpose
The MIS IT equipment and the MIS network are to be used for school
purposes, i.e. during classes, for preparation and follow-up of classes,
for vocational counseling and for studies on politics, contemporary
history, technology, languages or the like. Students are expected to
be on task during lessons and not 10. ??? by activities such as
emailing, chatting or playing 11. ???.
Limitations
There are technological and legal limitations to the MIS network.
Networks are made up of physical machines that have finite 12. ???
space and software capabilities. The network functions best when
these limitations are kept in mind. The MIS network is a service for
you to obtain, use and produce a variety of information and access to
it is a privilege. Mindfulness of other users and respect for 13. c???
and sustainable practices is expected of all users. For that reason,
there is a list of specific uses for which the MIS network cannot or
may not be used (see section 3). For example, installation of any
14. ??? that is illegal and/or interferes with the optimal 15. ??? of your
computer is not permitted.
Use of personal equipment
- Students are not permitted to bring their own 16. ??? onto campus
without obtaining prior permission from the school administration.
- 17. ??? may only be used during lessons if explicit permission is
given by the teacher and their use enhances the learning activity.
- Use of mobile devices on campus must conform to the school’s
general 18. ??? expectations as set out in the student-parent
handbooks.
Sustainability
- You are given a limited 19. ??? budget at the beginning of the year.
Once this has been exceeded, you will have to 20. ??? for additional
printing. You are encouraged to always print responsibly and
consider the 21. ??? before printing, whether at school or at home.
- MIS provides network file storage for all users. You have limited
server quota and shall routinely clean out and organize your files in
order to prevent excess of the server quota. Personal pictures, music,
movies, etc. are not to be 22. ??? on the MIS servers. You are asked
to consider the space required for all the files you have accumulated.
General behavior
− Use MIS’ IT resources (hardware, software, network etc.) in a
responsible manner and with respect to non-renewable resources.
− Maintain the confidentiality of your access 23. ???.
− Respect third party rights, in particular 24. ??? for music, photos,
videos, computer games and literature. This includes the MIS Logo, the
MIS name and MIS images.
− Do not download or 25. ??? illegal content.
- Do not disclose or publish personal data or images of teachers,
students or other MIS personnel or community without 26. ??? them
first.
− 27. ??? your data regularly.
− Immediately inform the MIS Help Desk of any dysfunction or
damage.
Access codes
- You will receive a user account and a 28. ???. It is very important to
choose a secure password (according to the MIS’ instructions) and to
keep the password secret. The password has to be kept in a safe
place and not be told to anybody. In particular, don’t 29. ??? your
password with others. You will be responsible for any actions made
under your account.
- Don’t leave your system unattended and log off or secure the
system if you no longer use it. You have to inform the MIS Help Desk
immediately if anybody has used your 30. ??? or if you know another
student’s 30. ???.
- Only use your account login and password with your own notebook
or other equipment authorized by MIS. MIS can disable your user
account if MIS has reason to believe that your password is 31. ???.
Illegal content, protected material
- Do not access or download illegal, violent, racist or other offensive
content such as pornography. If accidentally accessed or
downloaded, you shall immediately close the application and notify a
teacher or the MIS Help Desk of the incident. It is strictly forbidden to
pass this type of information on to other 32. ???.
- Texts, pictures, music, books, videos, computer games or other
material published in printed or in electronic form can be subject to
copyrights. The use of such content regularly requires the author’s 33.
???. In case of doubt, please consult a teacher or the MIS Help Desk.
Do not 34. ???, distribute or collect copyright protected material or
circumvent copy protection mechanisms. In case of any infringement
you will be held accountable as outlined in the guidelines for 35. ???
in the student-parent handbooks.
- Do not 36. ??? or make available any personal data and
photographs without the prior consent of the persons concerned and,
if the person is a minor, of his/her parents.
Behavior on social-networking sites (web 2.0)
You have to ensure that your behavior within social-networking sites
(web 2.0) such as Moodle, Facebook, Twitter, Myspace, etc. confirms
to the guidelines and expectations identified in the student-parent
handbooks. Do not post anything that could damage or deteriorate
MIS’ or other third party’s 37. ???.
Parameters 1
- MIS reserves the rights to 38. ??? the user rights on the computer
systems provided by MIS. MIS will implement technical measures to
survey the system configuration and the installed software. MIS can
partly or entirely block network communication and apply 39. ???
software in order to prevent unlawful or undesired behavior. MIS may
change the computer configuration at any time as it sees fit. It is at
MIS discretion to 40. ??? the notebook at any times and search its
content.
- MIS will control access to internet sites using filtering software and
monitor and record any user activity. These measures can, however,
not replace your responsible and careful use of the internet. MIS
reserves the right to block access to the internet if MIS believes that
you lack the necessary sense of responsibility and the capacity to
understand the consequences of your actions.
Parameters 2
- MIS will 41. ??? any data transmission over the MIS network as well
as any local computer activity. During classes, your teacher reserves
the right to access your 42. ??? at any time.
Compliance, disciplinary sanctions
You have to comply with all instructions herein as well as given by MIS
or its representatives, also in those guidelines concerning the MIS
network access controls and the MIS notebook surveillance. You shall
not circumvent or disable any measures implemented by MIS to
secure the Services or to enforce the Technology Usage Guidelines.
Consequences of non-compliance will occur in line with the
consequences for other disruptive/destructive behavior. Please refer
to the behavior expectation sections of the student-parent handbooks.
You will be liable for any 43. ??? caused. In addition, MIS can
permanently or temporarily disable your account and collect your MIS
notebook.
Personal data
MIS may 44. ??? personal data, including local computer activity such
as used applications and used files if and to the extent necessary for
operation, resource planning, error tracking and for the prevention of
misuse. MIS shall access personal data only in case of a (suspected)
misuse of the IT Services or for the purpose of drawing samples. MIS
may 44. ??? any User data if required for the maintenance of the
network (network administration, central backup, troubleshooting) or
for the prevention of misuse or unlawful activities.
Collected personal data shall normally be erased after one month,
however, at the beginning of the new school term at the latest. This
does not apply, if MIS has reason to suspect a misuse of the IT
Services.
Secrecy
MIS respects the secrecy of telecommunications granted in section 88 of
the German Telecommunications Act (TKG).
The personnel responsible for the IT infrastructure at MIS shall keep
secret any personal 45. ???, unless disclosure is required for the
operation of hardware and services, for billing purposes, to report an
offense or for the implementation of disciplinary sanctions.
I consent to the collection, processing and use of my 46. ??? data such as network
communication, files stored locally and on my assigned network share and local
computer activity to the extent and for the purposes described in section 5 of this 1:1
Program Consent Agreement.
MIS may access my MacBook, my assigned network share and any stored personal
47. ??? in case of a suspected misuse of the MacBook or the MIS network and for the
purpose of controlling the compliance with the Technology Usage Guidelines.
Furthermore, MIS may access such personal 47. ??? if required for the maintenance of
the MIS network (network administration, central backup, troubleshooting) or for the
prevention of misuse or unlawful activities. MIS will keep secret any personal 47. ???,
unless disclosure is required for the operation of hardware and services, to report an
offense or for the implementation of disciplinary sanctions.
My 48. ??? is voluntary and I may withdraw it at any time. However, I understand that
upon withdrawal of my consent given herein I have to return my MacBook and stop using
the MIS IT services, including but not limited to the MIS network.

Mais conteúdo relacionado

Mais procurados

GUL Network Infrastructure
GUL Network InfrastructureGUL Network Infrastructure
GUL Network InfrastructureMuhammad Zeeshan
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalAtlantic Training, LLC.
 
Electronic Signatures - Technical Foundations
Electronic Signatures - Technical FoundationsElectronic Signatures - Technical Foundations
Electronic Signatures - Technical FoundationsTorsten Eymann
 
Safety Presentation
Safety PresentationSafety Presentation
Safety PresentationSarah Sutter
 
Inappropriate use of the network ppt
Inappropriate use of the network pptInappropriate use of the network ppt
Inappropriate use of the network pptKristi DeRoche
 
Security Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterSecurity Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterAtlantic Training, LLC.
 
E saftey policy done
E saftey policy   doneE saftey policy   done
E saftey policy donekgrosvenor
 

Mais procurados (10)

GUL Network Infrastructure
GUL Network InfrastructureGUL Network Infrastructure
GUL Network Infrastructure
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
 
Electronic Signatures - Technical Foundations
Electronic Signatures - Technical FoundationsElectronic Signatures - Technical Foundations
Electronic Signatures - Technical Foundations
 
Safety Presentation
Safety PresentationSafety Presentation
Safety Presentation
 
Inappropriate use of the network ppt
Inappropriate use of the network pptInappropriate use of the network ppt
Inappropriate use of the network ppt
 
Security Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterSecurity Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana Chapter
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Uc13.chapter.09
Uc13.chapter.09Uc13.chapter.09
Uc13.chapter.09
 
document
documentdocument
document
 
E saftey policy done
E saftey policy   doneE saftey policy   done
E saftey policy done
 

Destaque

Photography For Everybody - Lesson 3: Shutter Speed
Photography For Everybody - Lesson 3: Shutter SpeedPhotography For Everybody - Lesson 3: Shutter Speed
Photography For Everybody - Lesson 3: Shutter SpeedMister Norris
 
Apresentação 7 maravilhas
Apresentação 7 maravilhasApresentação 7 maravilhas
Apresentação 7 maravilhasKelvin Oliveira
 
A Curated Collection Of A Google A Day Questions
A Curated Collection Of A Google A Day QuestionsA Curated Collection Of A Google A Day Questions
A Curated Collection Of A Google A Day QuestionsMister Norris
 
Bits & Bytes For Parents Session 3: Social Networks
Bits & Bytes For Parents Session 3: Social NetworksBits & Bytes For Parents Session 3: Social Networks
Bits & Bytes For Parents Session 3: Social NetworksMister Norris
 
ROI Presentation_قياس العائد على الاستثمار
ROI Presentation_قياس العائد على الاستثمارROI Presentation_قياس العائد على الاستثمار
ROI Presentation_قياس العائد على الاستثمارKamal Al-Shihaby
 
Edublogs For Educators
Edublogs For EducatorsEdublogs For Educators
Edublogs For EducatorsMister Norris
 
Photography For Everybody - Lesson 6: Flash / Portraits
Photography For Everybody - Lesson 6: Flash / PortraitsPhotography For Everybody - Lesson 6: Flash / Portraits
Photography For Everybody - Lesson 6: Flash / PortraitsMister Norris
 

Destaque (10)

Photography For Everybody - Lesson 3: Shutter Speed
Photography For Everybody - Lesson 3: Shutter SpeedPhotography For Everybody - Lesson 3: Shutter Speed
Photography For Everybody - Lesson 3: Shutter Speed
 
Apresentação 7 maravilhas
Apresentação 7 maravilhasApresentação 7 maravilhas
Apresentação 7 maravilhas
 
A Curated Collection Of A Google A Day Questions
A Curated Collection Of A Google A Day QuestionsA Curated Collection Of A Google A Day Questions
A Curated Collection Of A Google A Day Questions
 
Nosotras
NosotrasNosotras
Nosotras
 
Ict logo
Ict logoIct logo
Ict logo
 
Bits & Bytes For Parents Session 3: Social Networks
Bits & Bytes For Parents Session 3: Social NetworksBits & Bytes For Parents Session 3: Social Networks
Bits & Bytes For Parents Session 3: Social Networks
 
Qg revista a03n13_us
Qg revista a03n13_usQg revista a03n13_us
Qg revista a03n13_us
 
ROI Presentation_قياس العائد على الاستثمار
ROI Presentation_قياس العائد على الاستثمارROI Presentation_قياس العائد على الاستثمار
ROI Presentation_قياس العائد على الاستثمار
 
Edublogs For Educators
Edublogs For EducatorsEdublogs For Educators
Edublogs For Educators
 
Photography For Everybody - Lesson 6: Flash / Portraits
Photography For Everybody - Lesson 6: Flash / PortraitsPhotography For Everybody - Lesson 6: Flash / Portraits
Photography For Everybody - Lesson 6: Flash / Portraits
 

Semelhante a Digital Life Class 1 - 1:1 Agreement

Internet policy[1]
Internet policy[1]Internet policy[1]
Internet policy[1]leslieannpt
 
Peel school district board school policy
Peel school district board school policyPeel school district board school policy
Peel school district board school policyiamprosperous
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computeribrahimtbl3147
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computerFatin Izzaty
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber Security Infotech
 
Employee Technology Handbook.pdf
Employee Technology Handbook.pdfEmployee Technology Handbook.pdf
Employee Technology Handbook.pdfHemprasad Badgujar
 
Computer Acceptable Use Policy
Computer Acceptable Use PolicyComputer Acceptable Use Policy
Computer Acceptable Use PolicyBarb Jansen
 
computer ethics for educators
computer ethics for educatorscomputer ethics for educators
computer ethics for educatorsjessa_delingon
 
Text me the answer fetc 2013
Text me the answer  fetc 2013Text me the answer  fetc 2013
Text me the answer fetc 2013Carlos Fernandez
 
Security
SecuritySecurity
SecurityNabatah
 
Safety Issues on the Use of ICT including e-Safety Rules.pptx
Safety Issues on the Use of ICT including e-Safety Rules.pptxSafety Issues on the Use of ICT including e-Safety Rules.pptx
Safety Issues on the Use of ICT including e-Safety Rules.pptxZaideMangondato1
 
Communities online policy 190813
Communities online policy 190813Communities online policy 190813
Communities online policy 190813jennifer_lawrence
 
Bringing your-own-device usage policy for abc university collage employees
Bringing your-own-device usage policy for abc university collage employeesBringing your-own-device usage policy for abc university collage employees
Bringing your-own-device usage policy for abc university collage employeesKushmi Anuththara
 
Arlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use PolicyArlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use PolicyKoolteechatechnology
 
StudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEditStudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEditTamir Harper
 
Policy and procedure of hospitals
Policy and procedure of hospitalsPolicy and procedure of hospitals
Policy and procedure of hospitalsMohammed Alabdali
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power pointbodo-con
 

Semelhante a Digital Life Class 1 - 1:1 Agreement (20)

Internet policy[1]
Internet policy[1]Internet policy[1]
Internet policy[1]
 
Peel school district board school policy
Peel school district board school policyPeel school district board school policy
Peel school district board school policy
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
 
Employee Technology Handbook.pdf
Employee Technology Handbook.pdfEmployee Technology Handbook.pdf
Employee Technology Handbook.pdf
 
Computer Acceptable Use Policy
Computer Acceptable Use PolicyComputer Acceptable Use Policy
Computer Acceptable Use Policy
 
SAFETY ISSUES NOTES.docx
SAFETY ISSUES NOTES.docxSAFETY ISSUES NOTES.docx
SAFETY ISSUES NOTES.docx
 
computer ethics for educators
computer ethics for educatorscomputer ethics for educators
computer ethics for educators
 
Text me the answer fetc 2013
Text me the answer  fetc 2013Text me the answer  fetc 2013
Text me the answer fetc 2013
 
Security
SecuritySecurity
Security
 
AUP.ppt
AUP.pptAUP.ppt
AUP.ppt
 
Safety Issues on the Use of ICT including e-Safety Rules.pptx
Safety Issues on the Use of ICT including e-Safety Rules.pptxSafety Issues on the Use of ICT including e-Safety Rules.pptx
Safety Issues on the Use of ICT including e-Safety Rules.pptx
 
Communities online policy 190813
Communities online policy 190813Communities online policy 190813
Communities online policy 190813
 
Bringing your-own-device usage policy for abc university collage employees
Bringing your-own-device usage policy for abc university collage employeesBringing your-own-device usage policy for abc university collage employees
Bringing your-own-device usage policy for abc university collage employees
 
Arlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use PolicyArlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use Policy
 
StudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEditStudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEdit
 
Policy and procedure of hospitals
Policy and procedure of hospitalsPolicy and procedure of hospitals
Policy and procedure of hospitals
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
 
educ 103
educ 103educ 103
educ 103
 

Mais de Mister Norris

Photography For Everybody - Lesson 7: Landscape Photography
Photography For Everybody - Lesson 7: Landscape PhotographyPhotography For Everybody - Lesson 7: Landscape Photography
Photography For Everybody - Lesson 7: Landscape PhotographyMister Norris
 
Photography For Everybody - Lesson 5: Exposure
Photography For Everybody - Lesson 5: ExposurePhotography For Everybody - Lesson 5: Exposure
Photography For Everybody - Lesson 5: ExposureMister Norris
 
Photography For Everybody - Lesson 4: Aperture
Photography For Everybody - Lesson 4: AperturePhotography For Everybody - Lesson 4: Aperture
Photography For Everybody - Lesson 4: ApertureMister Norris
 
Photography For Everybody - Lesson 2: Composition
Photography For Everybody - Lesson 2: CompositionPhotography For Everybody - Lesson 2: Composition
Photography For Everybody - Lesson 2: CompositionMister Norris
 
G7 Digital Citizenship - Organization
G7 Digital Citizenship - OrganizationG7 Digital Citizenship - Organization
G7 Digital Citizenship - OrganizationMister Norris
 
Digital Citizenship: Educating 21st Century Learners
Digital Citizenship: Educating 21st Century LearnersDigital Citizenship: Educating 21st Century Learners
Digital Citizenship: Educating 21st Century LearnersMister Norris
 

Mais de Mister Norris (7)

Photography For Everybody - Lesson 7: Landscape Photography
Photography For Everybody - Lesson 7: Landscape PhotographyPhotography For Everybody - Lesson 7: Landscape Photography
Photography For Everybody - Lesson 7: Landscape Photography
 
Photography For Everybody - Lesson 5: Exposure
Photography For Everybody - Lesson 5: ExposurePhotography For Everybody - Lesson 5: Exposure
Photography For Everybody - Lesson 5: Exposure
 
Photography For Everybody - Lesson 4: Aperture
Photography For Everybody - Lesson 4: AperturePhotography For Everybody - Lesson 4: Aperture
Photography For Everybody - Lesson 4: Aperture
 
Photography For Everybody - Lesson 2: Composition
Photography For Everybody - Lesson 2: CompositionPhotography For Everybody - Lesson 2: Composition
Photography For Everybody - Lesson 2: Composition
 
G7 Digital Citizenship - Organization
G7 Digital Citizenship - OrganizationG7 Digital Citizenship - Organization
G7 Digital Citizenship - Organization
 
Digital Citizenship: Educating 21st Century Learners
Digital Citizenship: Educating 21st Century LearnersDigital Citizenship: Educating 21st Century Learners
Digital Citizenship: Educating 21st Century Learners
 
Passwords
PasswordsPasswords
Passwords
 

Último

Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxMichelleTuguinay1
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17Celine George
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Developmentchesterberbo7
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsPooky Knightsmith
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 

Último (20)

Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Development
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young minds
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 

Digital Life Class 1 - 1:1 Agreement

  • 1. General behavior • Use MIS’ IT resources (1. ???, software, network etc.) in a responsible manner and with respect to non-renewable 2. ???. • Maintain the 3. ??? of your access codes. • Respect third party rights, in particular copyrights for 4. ???, photos, 5. ???, 6. ??? and literature. This includes the MIS Logo, the MIS name and MIS images. • Do not 7. ??? or publish illegal content. • Do not disclose or publish personal data or images of 8. ???, students or other MIS personnel or community without asking them first. • Backup your 9. ??? regularly. • Immediately inform the MIS Help Desk of any dysfunction or damage.
  • 2. Educational purpose The MIS IT equipment and the MIS network are to be used for school purposes, i.e. during classes, for preparation and follow-up of classes, for vocational counseling and for studies on politics, contemporary history, technology, languages or the like. Students are expected to be on task during lessons and not 10. ??? by activities such as emailing, chatting or playing 11. ???.
  • 3. Limitations There are technological and legal limitations to the MIS network. Networks are made up of physical machines that have finite 12. ??? space and software capabilities. The network functions best when these limitations are kept in mind. The MIS network is a service for you to obtain, use and produce a variety of information and access to it is a privilege. Mindfulness of other users and respect for 13. c??? and sustainable practices is expected of all users. For that reason, there is a list of specific uses for which the MIS network cannot or may not be used (see section 3). For example, installation of any 14. ??? that is illegal and/or interferes with the optimal 15. ??? of your computer is not permitted.
  • 4. Use of personal equipment - Students are not permitted to bring their own 16. ??? onto campus without obtaining prior permission from the school administration. - 17. ??? may only be used during lessons if explicit permission is given by the teacher and their use enhances the learning activity. - Use of mobile devices on campus must conform to the school’s general 18. ??? expectations as set out in the student-parent handbooks.
  • 5. Sustainability - You are given a limited 19. ??? budget at the beginning of the year. Once this has been exceeded, you will have to 20. ??? for additional printing. You are encouraged to always print responsibly and consider the 21. ??? before printing, whether at school or at home. - MIS provides network file storage for all users. You have limited server quota and shall routinely clean out and organize your files in order to prevent excess of the server quota. Personal pictures, music, movies, etc. are not to be 22. ??? on the MIS servers. You are asked to consider the space required for all the files you have accumulated.
  • 6. General behavior − Use MIS’ IT resources (hardware, software, network etc.) in a responsible manner and with respect to non-renewable resources. − Maintain the confidentiality of your access 23. ???. − Respect third party rights, in particular 24. ??? for music, photos, videos, computer games and literature. This includes the MIS Logo, the MIS name and MIS images. − Do not download or 25. ??? illegal content. - Do not disclose or publish personal data or images of teachers, students or other MIS personnel or community without 26. ??? them first. − 27. ??? your data regularly. − Immediately inform the MIS Help Desk of any dysfunction or damage.
  • 7. Access codes - You will receive a user account and a 28. ???. It is very important to choose a secure password (according to the MIS’ instructions) and to keep the password secret. The password has to be kept in a safe place and not be told to anybody. In particular, don’t 29. ??? your password with others. You will be responsible for any actions made under your account. - Don’t leave your system unattended and log off or secure the system if you no longer use it. You have to inform the MIS Help Desk immediately if anybody has used your 30. ??? or if you know another student’s 30. ???. - Only use your account login and password with your own notebook or other equipment authorized by MIS. MIS can disable your user account if MIS has reason to believe that your password is 31. ???.
  • 8. Illegal content, protected material - Do not access or download illegal, violent, racist or other offensive content such as pornography. If accidentally accessed or downloaded, you shall immediately close the application and notify a teacher or the MIS Help Desk of the incident. It is strictly forbidden to pass this type of information on to other 32. ???. - Texts, pictures, music, books, videos, computer games or other material published in printed or in electronic form can be subject to copyrights. The use of such content regularly requires the author’s 33. ???. In case of doubt, please consult a teacher or the MIS Help Desk. Do not 34. ???, distribute or collect copyright protected material or circumvent copy protection mechanisms. In case of any infringement you will be held accountable as outlined in the guidelines for 35. ??? in the student-parent handbooks. - Do not 36. ??? or make available any personal data and photographs without the prior consent of the persons concerned and, if the person is a minor, of his/her parents.
  • 9. Behavior on social-networking sites (web 2.0) You have to ensure that your behavior within social-networking sites (web 2.0) such as Moodle, Facebook, Twitter, Myspace, etc. confirms to the guidelines and expectations identified in the student-parent handbooks. Do not post anything that could damage or deteriorate MIS’ or other third party’s 37. ???.
  • 10. Parameters 1 - MIS reserves the rights to 38. ??? the user rights on the computer systems provided by MIS. MIS will implement technical measures to survey the system configuration and the installed software. MIS can partly or entirely block network communication and apply 39. ??? software in order to prevent unlawful or undesired behavior. MIS may change the computer configuration at any time as it sees fit. It is at MIS discretion to 40. ??? the notebook at any times and search its content. - MIS will control access to internet sites using filtering software and monitor and record any user activity. These measures can, however, not replace your responsible and careful use of the internet. MIS reserves the right to block access to the internet if MIS believes that you lack the necessary sense of responsibility and the capacity to understand the consequences of your actions.
  • 11. Parameters 2 - MIS will 41. ??? any data transmission over the MIS network as well as any local computer activity. During classes, your teacher reserves the right to access your 42. ??? at any time.
  • 12. Compliance, disciplinary sanctions You have to comply with all instructions herein as well as given by MIS or its representatives, also in those guidelines concerning the MIS network access controls and the MIS notebook surveillance. You shall not circumvent or disable any measures implemented by MIS to secure the Services or to enforce the Technology Usage Guidelines. Consequences of non-compliance will occur in line with the consequences for other disruptive/destructive behavior. Please refer to the behavior expectation sections of the student-parent handbooks. You will be liable for any 43. ??? caused. In addition, MIS can permanently or temporarily disable your account and collect your MIS notebook.
  • 13. Personal data MIS may 44. ??? personal data, including local computer activity such as used applications and used files if and to the extent necessary for operation, resource planning, error tracking and for the prevention of misuse. MIS shall access personal data only in case of a (suspected) misuse of the IT Services or for the purpose of drawing samples. MIS may 44. ??? any User data if required for the maintenance of the network (network administration, central backup, troubleshooting) or for the prevention of misuse or unlawful activities. Collected personal data shall normally be erased after one month, however, at the beginning of the new school term at the latest. This does not apply, if MIS has reason to suspect a misuse of the IT Services.
  • 14. Secrecy MIS respects the secrecy of telecommunications granted in section 88 of the German Telecommunications Act (TKG). The personnel responsible for the IT infrastructure at MIS shall keep secret any personal 45. ???, unless disclosure is required for the operation of hardware and services, for billing purposes, to report an offense or for the implementation of disciplinary sanctions.
  • 15. I consent to the collection, processing and use of my 46. ??? data such as network communication, files stored locally and on my assigned network share and local computer activity to the extent and for the purposes described in section 5 of this 1:1 Program Consent Agreement. MIS may access my MacBook, my assigned network share and any stored personal 47. ??? in case of a suspected misuse of the MacBook or the MIS network and for the purpose of controlling the compliance with the Technology Usage Guidelines. Furthermore, MIS may access such personal 47. ??? if required for the maintenance of the MIS network (network administration, central backup, troubleshooting) or for the prevention of misuse or unlawful activities. MIS will keep secret any personal 47. ???, unless disclosure is required for the operation of hardware and services, to report an offense or for the implementation of disciplinary sanctions. My 48. ??? is voluntary and I may withdraw it at any time. However, I understand that upon withdrawal of my consent given herein I have to return my MacBook and stop using the MIS IT services, including but not limited to the MIS network.