SlideShare una empresa de Scribd logo
1 de 15
General behavior
• Use MIS’ IT resources (1. ???, software, network etc.) in a
responsible manner and with respect to non-renewable 2. ???.
• Maintain the 3. ??? of your access codes.
• Respect third party rights, in particular copyrights for 4. ???, photos, 5.
???, 6. ??? and literature. This includes the MIS Logo, the MIS name
and MIS images.
• Do not 7. ??? or publish illegal content.
• Do not disclose or publish personal data or images of 8. ???, students
or other MIS personnel or community without asking them first.
• Backup your 9. ??? regularly.
• Immediately inform the MIS Help Desk of any dysfunction or damage.
Educational purpose
The MIS IT equipment and the MIS network are to be used for school
purposes, i.e. during classes, for preparation and follow-up of classes,
for vocational counseling and for studies on politics, contemporary
history, technology, languages or the like. Students are expected to
be on task during lessons and not 10. ??? by activities such as
emailing, chatting or playing 11. ???.
Limitations
There are technological and legal limitations to the MIS network.
Networks are made up of physical machines that have finite 12. ???
space and software capabilities. The network functions best when
these limitations are kept in mind. The MIS network is a service for
you to obtain, use and produce a variety of information and access to
it is a privilege. Mindfulness of other users and respect for 13. c???
and sustainable practices is expected of all users. For that reason,
there is a list of specific uses for which the MIS network cannot or
may not be used (see section 3). For example, installation of any
14. ??? that is illegal and/or interferes with the optimal 15. ??? of your
computer is not permitted.
Use of personal equipment
- Students are not permitted to bring their own 16. ??? onto campus
without obtaining prior permission from the school administration.
- 17. ??? may only be used during lessons if explicit permission is
given by the teacher and their use enhances the learning activity.
- Use of mobile devices on campus must conform to the school’s
general 18. ??? expectations as set out in the student-parent
handbooks.
Sustainability
- You are given a limited 19. ??? budget at the beginning of the year.
Once this has been exceeded, you will have to 20. ??? for additional
printing. You are encouraged to always print responsibly and
consider the 21. ??? before printing, whether at school or at home.
- MIS provides network file storage for all users. You have limited
server quota and shall routinely clean out and organize your files in
order to prevent excess of the server quota. Personal pictures, music,
movies, etc. are not to be 22. ??? on the MIS servers. You are asked
to consider the space required for all the files you have accumulated.
General behavior
− Use MIS’ IT resources (hardware, software, network etc.) in a
responsible manner and with respect to non-renewable resources.
− Maintain the confidentiality of your access 23. ???.
− Respect third party rights, in particular 24. ??? for music, photos,
videos, computer games and literature. This includes the MIS Logo, the
MIS name and MIS images.
− Do not download or 25. ??? illegal content.
- Do not disclose or publish personal data or images of teachers,
students or other MIS personnel or community without 26. ??? them
first.
− 27. ??? your data regularly.
− Immediately inform the MIS Help Desk of any dysfunction or
damage.
Access codes
- You will receive a user account and a 28. ???. It is very important to
choose a secure password (according to the MIS’ instructions) and to
keep the password secret. The password has to be kept in a safe
place and not be told to anybody. In particular, don’t 29. ??? your
password with others. You will be responsible for any actions made
under your account.
- Don’t leave your system unattended and log off or secure the
system if you no longer use it. You have to inform the MIS Help Desk
immediately if anybody has used your 30. ??? or if you know another
student’s 30. ???.
- Only use your account login and password with your own notebook
or other equipment authorized by MIS. MIS can disable your user
account if MIS has reason to believe that your password is 31. ???.
Illegal content, protected material
- Do not access or download illegal, violent, racist or other offensive
content such as pornography. If accidentally accessed or
downloaded, you shall immediately close the application and notify a
teacher or the MIS Help Desk of the incident. It is strictly forbidden to
pass this type of information on to other 32. ???.
- Texts, pictures, music, books, videos, computer games or other
material published in printed or in electronic form can be subject to
copyrights. The use of such content regularly requires the author’s 33.
???. In case of doubt, please consult a teacher or the MIS Help Desk.
Do not 34. ???, distribute or collect copyright protected material or
circumvent copy protection mechanisms. In case of any infringement
you will be held accountable as outlined in the guidelines for 35. ???
in the student-parent handbooks.
- Do not 36. ??? or make available any personal data and
photographs without the prior consent of the persons concerned and,
if the person is a minor, of his/her parents.
Behavior on social-networking sites (web 2.0)
You have to ensure that your behavior within social-networking sites
(web 2.0) such as Moodle, Facebook, Twitter, Myspace, etc. confirms
to the guidelines and expectations identified in the student-parent
handbooks. Do not post anything that could damage or deteriorate
MIS’ or other third party’s 37. ???.
Parameters 1
- MIS reserves the rights to 38. ??? the user rights on the computer
systems provided by MIS. MIS will implement technical measures to
survey the system configuration and the installed software. MIS can
partly or entirely block network communication and apply 39. ???
software in order to prevent unlawful or undesired behavior. MIS may
change the computer configuration at any time as it sees fit. It is at
MIS discretion to 40. ??? the notebook at any times and search its
content.
- MIS will control access to internet sites using filtering software and
monitor and record any user activity. These measures can, however,
not replace your responsible and careful use of the internet. MIS
reserves the right to block access to the internet if MIS believes that
you lack the necessary sense of responsibility and the capacity to
understand the consequences of your actions.
Parameters 2
- MIS will 41. ??? any data transmission over the MIS network as well
as any local computer activity. During classes, your teacher reserves
the right to access your 42. ??? at any time.
Compliance, disciplinary sanctions
You have to comply with all instructions herein as well as given by MIS
or its representatives, also in those guidelines concerning the MIS
network access controls and the MIS notebook surveillance. You shall
not circumvent or disable any measures implemented by MIS to
secure the Services or to enforce the Technology Usage Guidelines.
Consequences of non-compliance will occur in line with the
consequences for other disruptive/destructive behavior. Please refer
to the behavior expectation sections of the student-parent handbooks.
You will be liable for any 43. ??? caused. In addition, MIS can
permanently or temporarily disable your account and collect your MIS
notebook.
Personal data
MIS may 44. ??? personal data, including local computer activity such
as used applications and used files if and to the extent necessary for
operation, resource planning, error tracking and for the prevention of
misuse. MIS shall access personal data only in case of a (suspected)
misuse of the IT Services or for the purpose of drawing samples. MIS
may 44. ??? any User data if required for the maintenance of the
network (network administration, central backup, troubleshooting) or
for the prevention of misuse or unlawful activities.
Collected personal data shall normally be erased after one month,
however, at the beginning of the new school term at the latest. This
does not apply, if MIS has reason to suspect a misuse of the IT
Services.
Secrecy
MIS respects the secrecy of telecommunications granted in section 88 of
the German Telecommunications Act (TKG).
The personnel responsible for the IT infrastructure at MIS shall keep
secret any personal 45. ???, unless disclosure is required for the
operation of hardware and services, for billing purposes, to report an
offense or for the implementation of disciplinary sanctions.
I consent to the collection, processing and use of my 46. ??? data such as network
communication, files stored locally and on my assigned network share and local
computer activity to the extent and for the purposes described in section 5 of this 1:1
Program Consent Agreement.
MIS may access my MacBook, my assigned network share and any stored personal
47. ??? in case of a suspected misuse of the MacBook or the MIS network and for the
purpose of controlling the compliance with the Technology Usage Guidelines.
Furthermore, MIS may access such personal 47. ??? if required for the maintenance of
the MIS network (network administration, central backup, troubleshooting) or for the
prevention of misuse or unlawful activities. MIS will keep secret any personal 47. ???,
unless disclosure is required for the operation of hardware and services, to report an
offense or for the implementation of disciplinary sanctions.
My 48. ??? is voluntary and I may withdraw it at any time. However, I understand that
upon withdrawal of my consent given herein I have to return my MacBook and stop using
the MIS IT services, including but not limited to the MIS network.

Más contenido relacionado

La actualidad más candente (10)

GUL Network Infrastructure
GUL Network InfrastructureGUL Network Infrastructure
GUL Network Infrastructure
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
 
Electronic Signatures - Technical Foundations
Electronic Signatures - Technical FoundationsElectronic Signatures - Technical Foundations
Electronic Signatures - Technical Foundations
 
Safety Presentation
Safety PresentationSafety Presentation
Safety Presentation
 
Inappropriate use of the network ppt
Inappropriate use of the network pptInappropriate use of the network ppt
Inappropriate use of the network ppt
 
Security Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterSecurity Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana Chapter
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Uc13.chapter.09
Uc13.chapter.09Uc13.chapter.09
Uc13.chapter.09
 
document
documentdocument
document
 
E saftey policy done
E saftey policy   doneE saftey policy   done
E saftey policy done
 

Destacado

Apresentação 7 maravilhas
Apresentação 7 maravilhasApresentação 7 maravilhas
Apresentação 7 maravilhas
Kelvin Oliveira
 

Destacado (10)

Photography For Everybody - Lesson 3: Shutter Speed
Photography For Everybody - Lesson 3: Shutter SpeedPhotography For Everybody - Lesson 3: Shutter Speed
Photography For Everybody - Lesson 3: Shutter Speed
 
Apresentação 7 maravilhas
Apresentação 7 maravilhasApresentação 7 maravilhas
Apresentação 7 maravilhas
 
A Curated Collection Of A Google A Day Questions
A Curated Collection Of A Google A Day QuestionsA Curated Collection Of A Google A Day Questions
A Curated Collection Of A Google A Day Questions
 
Nosotras
NosotrasNosotras
Nosotras
 
Ict logo
Ict logoIct logo
Ict logo
 
Bits & Bytes For Parents Session 3: Social Networks
Bits & Bytes For Parents Session 3: Social NetworksBits & Bytes For Parents Session 3: Social Networks
Bits & Bytes For Parents Session 3: Social Networks
 
Qg revista a03n13_us
Qg revista a03n13_usQg revista a03n13_us
Qg revista a03n13_us
 
ROI Presentation_قياس العائد على الاستثمار
ROI Presentation_قياس العائد على الاستثمارROI Presentation_قياس العائد على الاستثمار
ROI Presentation_قياس العائد على الاستثمار
 
Edublogs For Educators
Edublogs For EducatorsEdublogs For Educators
Edublogs For Educators
 
Photography For Everybody - Lesson 6: Flash / Portraits
Photography For Everybody - Lesson 6: Flash / PortraitsPhotography For Everybody - Lesson 6: Flash / Portraits
Photography For Everybody - Lesson 6: Flash / Portraits
 

Similar a Digital Life Class 1 - 1:1 Agreement

Internet policy[1]
Internet policy[1]Internet policy[1]
Internet policy[1]
leslieannpt
 
Computer Acceptable Use Policy
Computer Acceptable Use PolicyComputer Acceptable Use Policy
Computer Acceptable Use Policy
Barb Jansen
 
computer ethics for educators
computer ethics for educatorscomputer ethics for educators
computer ethics for educators
jessa_delingon
 
Text me the answer fetc 2013
Text me the answer  fetc 2013Text me the answer  fetc 2013
Text me the answer fetc 2013
Carlos Fernandez
 
Communities online policy 190813
Communities online policy 190813Communities online policy 190813
Communities online policy 190813
jennifer_lawrence
 
Arlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use PolicyArlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use Policy
Koolteechatechnology
 
StudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEditStudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEdit
Tamir Harper
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
bodo-con
 

Similar a Digital Life Class 1 - 1:1 Agreement (20)

Internet policy[1]
Internet policy[1]Internet policy[1]
Internet policy[1]
 
Peel school district board school policy
Peel school district board school policyPeel school district board school policy
Peel school district board school policy
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
 
Employee Technology Handbook.pdf
Employee Technology Handbook.pdfEmployee Technology Handbook.pdf
Employee Technology Handbook.pdf
 
Computer Acceptable Use Policy
Computer Acceptable Use PolicyComputer Acceptable Use Policy
Computer Acceptable Use Policy
 
SAFETY ISSUES NOTES.docx
SAFETY ISSUES NOTES.docxSAFETY ISSUES NOTES.docx
SAFETY ISSUES NOTES.docx
 
computer ethics for educators
computer ethics for educatorscomputer ethics for educators
computer ethics for educators
 
Text me the answer fetc 2013
Text me the answer  fetc 2013Text me the answer  fetc 2013
Text me the answer fetc 2013
 
Security
SecuritySecurity
Security
 
AUP.ppt
AUP.pptAUP.ppt
AUP.ppt
 
Safety Issues on the Use of ICT including e-Safety Rules.pptx
Safety Issues on the Use of ICT including e-Safety Rules.pptxSafety Issues on the Use of ICT including e-Safety Rules.pptx
Safety Issues on the Use of ICT including e-Safety Rules.pptx
 
Communities online policy 190813
Communities online policy 190813Communities online policy 190813
Communities online policy 190813
 
Bringing your-own-device usage policy for abc university collage employees
Bringing your-own-device usage policy for abc university collage employeesBringing your-own-device usage policy for abc university collage employees
Bringing your-own-device usage policy for abc university collage employees
 
Arlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use PolicyArlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use Policy
 
StudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEditStudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEdit
 
Policy and procedure of hospitals
Policy and procedure of hospitalsPolicy and procedure of hospitals
Policy and procedure of hospitals
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
 
educ 103
educ 103educ 103
educ 103
 

Más de Mister Norris (7)

Photography For Everybody - Lesson 7: Landscape Photography
Photography For Everybody - Lesson 7: Landscape PhotographyPhotography For Everybody - Lesson 7: Landscape Photography
Photography For Everybody - Lesson 7: Landscape Photography
 
Photography For Everybody - Lesson 5: Exposure
Photography For Everybody - Lesson 5: ExposurePhotography For Everybody - Lesson 5: Exposure
Photography For Everybody - Lesson 5: Exposure
 
Photography For Everybody - Lesson 4: Aperture
Photography For Everybody - Lesson 4: AperturePhotography For Everybody - Lesson 4: Aperture
Photography For Everybody - Lesson 4: Aperture
 
Photography For Everybody - Lesson 2: Composition
Photography For Everybody - Lesson 2: CompositionPhotography For Everybody - Lesson 2: Composition
Photography For Everybody - Lesson 2: Composition
 
G7 Digital Citizenship - Organization
G7 Digital Citizenship - OrganizationG7 Digital Citizenship - Organization
G7 Digital Citizenship - Organization
 
Digital Citizenship: Educating 21st Century Learners
Digital Citizenship: Educating 21st Century LearnersDigital Citizenship: Educating 21st Century Learners
Digital Citizenship: Educating 21st Century Learners
 
Passwords
PasswordsPasswords
Passwords
 

Último

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Último (20)

Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 

Digital Life Class 1 - 1:1 Agreement

  • 1. General behavior • Use MIS’ IT resources (1. ???, software, network etc.) in a responsible manner and with respect to non-renewable 2. ???. • Maintain the 3. ??? of your access codes. • Respect third party rights, in particular copyrights for 4. ???, photos, 5. ???, 6. ??? and literature. This includes the MIS Logo, the MIS name and MIS images. • Do not 7. ??? or publish illegal content. • Do not disclose or publish personal data or images of 8. ???, students or other MIS personnel or community without asking them first. • Backup your 9. ??? regularly. • Immediately inform the MIS Help Desk of any dysfunction or damage.
  • 2. Educational purpose The MIS IT equipment and the MIS network are to be used for school purposes, i.e. during classes, for preparation and follow-up of classes, for vocational counseling and for studies on politics, contemporary history, technology, languages or the like. Students are expected to be on task during lessons and not 10. ??? by activities such as emailing, chatting or playing 11. ???.
  • 3. Limitations There are technological and legal limitations to the MIS network. Networks are made up of physical machines that have finite 12. ??? space and software capabilities. The network functions best when these limitations are kept in mind. The MIS network is a service for you to obtain, use and produce a variety of information and access to it is a privilege. Mindfulness of other users and respect for 13. c??? and sustainable practices is expected of all users. For that reason, there is a list of specific uses for which the MIS network cannot or may not be used (see section 3). For example, installation of any 14. ??? that is illegal and/or interferes with the optimal 15. ??? of your computer is not permitted.
  • 4. Use of personal equipment - Students are not permitted to bring their own 16. ??? onto campus without obtaining prior permission from the school administration. - 17. ??? may only be used during lessons if explicit permission is given by the teacher and their use enhances the learning activity. - Use of mobile devices on campus must conform to the school’s general 18. ??? expectations as set out in the student-parent handbooks.
  • 5. Sustainability - You are given a limited 19. ??? budget at the beginning of the year. Once this has been exceeded, you will have to 20. ??? for additional printing. You are encouraged to always print responsibly and consider the 21. ??? before printing, whether at school or at home. - MIS provides network file storage for all users. You have limited server quota and shall routinely clean out and organize your files in order to prevent excess of the server quota. Personal pictures, music, movies, etc. are not to be 22. ??? on the MIS servers. You are asked to consider the space required for all the files you have accumulated.
  • 6. General behavior − Use MIS’ IT resources (hardware, software, network etc.) in a responsible manner and with respect to non-renewable resources. − Maintain the confidentiality of your access 23. ???. − Respect third party rights, in particular 24. ??? for music, photos, videos, computer games and literature. This includes the MIS Logo, the MIS name and MIS images. − Do not download or 25. ??? illegal content. - Do not disclose or publish personal data or images of teachers, students or other MIS personnel or community without 26. ??? them first. − 27. ??? your data regularly. − Immediately inform the MIS Help Desk of any dysfunction or damage.
  • 7. Access codes - You will receive a user account and a 28. ???. It is very important to choose a secure password (according to the MIS’ instructions) and to keep the password secret. The password has to be kept in a safe place and not be told to anybody. In particular, don’t 29. ??? your password with others. You will be responsible for any actions made under your account. - Don’t leave your system unattended and log off or secure the system if you no longer use it. You have to inform the MIS Help Desk immediately if anybody has used your 30. ??? or if you know another student’s 30. ???. - Only use your account login and password with your own notebook or other equipment authorized by MIS. MIS can disable your user account if MIS has reason to believe that your password is 31. ???.
  • 8. Illegal content, protected material - Do not access or download illegal, violent, racist or other offensive content such as pornography. If accidentally accessed or downloaded, you shall immediately close the application and notify a teacher or the MIS Help Desk of the incident. It is strictly forbidden to pass this type of information on to other 32. ???. - Texts, pictures, music, books, videos, computer games or other material published in printed or in electronic form can be subject to copyrights. The use of such content regularly requires the author’s 33. ???. In case of doubt, please consult a teacher or the MIS Help Desk. Do not 34. ???, distribute or collect copyright protected material or circumvent copy protection mechanisms. In case of any infringement you will be held accountable as outlined in the guidelines for 35. ??? in the student-parent handbooks. - Do not 36. ??? or make available any personal data and photographs without the prior consent of the persons concerned and, if the person is a minor, of his/her parents.
  • 9. Behavior on social-networking sites (web 2.0) You have to ensure that your behavior within social-networking sites (web 2.0) such as Moodle, Facebook, Twitter, Myspace, etc. confirms to the guidelines and expectations identified in the student-parent handbooks. Do not post anything that could damage or deteriorate MIS’ or other third party’s 37. ???.
  • 10. Parameters 1 - MIS reserves the rights to 38. ??? the user rights on the computer systems provided by MIS. MIS will implement technical measures to survey the system configuration and the installed software. MIS can partly or entirely block network communication and apply 39. ??? software in order to prevent unlawful or undesired behavior. MIS may change the computer configuration at any time as it sees fit. It is at MIS discretion to 40. ??? the notebook at any times and search its content. - MIS will control access to internet sites using filtering software and monitor and record any user activity. These measures can, however, not replace your responsible and careful use of the internet. MIS reserves the right to block access to the internet if MIS believes that you lack the necessary sense of responsibility and the capacity to understand the consequences of your actions.
  • 11. Parameters 2 - MIS will 41. ??? any data transmission over the MIS network as well as any local computer activity. During classes, your teacher reserves the right to access your 42. ??? at any time.
  • 12. Compliance, disciplinary sanctions You have to comply with all instructions herein as well as given by MIS or its representatives, also in those guidelines concerning the MIS network access controls and the MIS notebook surveillance. You shall not circumvent or disable any measures implemented by MIS to secure the Services or to enforce the Technology Usage Guidelines. Consequences of non-compliance will occur in line with the consequences for other disruptive/destructive behavior. Please refer to the behavior expectation sections of the student-parent handbooks. You will be liable for any 43. ??? caused. In addition, MIS can permanently or temporarily disable your account and collect your MIS notebook.
  • 13. Personal data MIS may 44. ??? personal data, including local computer activity such as used applications and used files if and to the extent necessary for operation, resource planning, error tracking and for the prevention of misuse. MIS shall access personal data only in case of a (suspected) misuse of the IT Services or for the purpose of drawing samples. MIS may 44. ??? any User data if required for the maintenance of the network (network administration, central backup, troubleshooting) or for the prevention of misuse or unlawful activities. Collected personal data shall normally be erased after one month, however, at the beginning of the new school term at the latest. This does not apply, if MIS has reason to suspect a misuse of the IT Services.
  • 14. Secrecy MIS respects the secrecy of telecommunications granted in section 88 of the German Telecommunications Act (TKG). The personnel responsible for the IT infrastructure at MIS shall keep secret any personal 45. ???, unless disclosure is required for the operation of hardware and services, for billing purposes, to report an offense or for the implementation of disciplinary sanctions.
  • 15. I consent to the collection, processing and use of my 46. ??? data such as network communication, files stored locally and on my assigned network share and local computer activity to the extent and for the purposes described in section 5 of this 1:1 Program Consent Agreement. MIS may access my MacBook, my assigned network share and any stored personal 47. ??? in case of a suspected misuse of the MacBook or the MIS network and for the purpose of controlling the compliance with the Technology Usage Guidelines. Furthermore, MIS may access such personal 47. ??? if required for the maintenance of the MIS network (network administration, central backup, troubleshooting) or for the prevention of misuse or unlawful activities. MIS will keep secret any personal 47. ???, unless disclosure is required for the operation of hardware and services, to report an offense or for the implementation of disciplinary sanctions. My 48. ??? is voluntary and I may withdraw it at any time. However, I understand that upon withdrawal of my consent given herein I have to return my MacBook and stop using the MIS IT services, including but not limited to the MIS network.