![]() We encourage you to provide notice to us by the methods described in Section 6 of the General Terms above of any violations of the General Terms or the Agreement generally.Īcceptable Use Policy Buyer Protection Policy In addition, you are prohibited from using the Service for communications or activities that: (a) violate any law, statute, ordinance or regulation (b) promote hate, violence, racial intolerance, or the financial exploitation of a crime (c) defame, abuse, harass or threaten others (d) include any language or images that are bigoted, hateful, racially offensive, vulgar, obscene, indecent or discourteous (e) infringe or violate any copyright, trademark, right of publicity or privacy or any other proprietary right under the laws of any jurisdiction (f) impose an unreasonable or disproportionately large load on our infrastructure (g) facilitate any viruses, trojan horses, worms or other computer programming routines that may damage, detrimentally interfere with, surreptitiously intercept or expropriate any system, data or information (h) constitute use of any robot, spider, other automatic device, or manual process to monitor or copy the Service or the portion of the Site through which the Service is offered without our prior written permission (i) constitute use of any device, software or routine to bypass technology protecting the Site or Service, or interfere or attempt to interfere, with the Site or the Service or (j) may cause us or our Service Providers to lose any of the services from our internet service providers, payment processors, or other vendors. We and our Service Providers have the right but not the obligation to monitor and remove communications content that we find in our sole discretion to be objectionable in any way. Examples of Items/Conditions Not CoveredĪcceptable Use You agree that you are independently responsible for complying with all applicable laws in all of your activities related to your use of the Service, regardless of the purpose of the use, and for all communications you send through the Service.Elements Unsatisfactory Needs Improvement Proficient Exemplary.Agreement Exceptions/Deviations Explanation. ![]() Additional Acceptable Uses of Student Data.For example, sending an “ item for sale” message to the ‘Everyone’ mail group. Sending electronic messages to mail groups for a purpose not sponsored by the University.Transmission of material that encourages conduct that could constitute a criminal offense or otherwise violate any applicable local, state, national or international law or regulation and,.Transmission of unlawful, harassing, libelous, abusive, threatening, harmful, vulgar, obscene or otherwise objectionable language or material of any type.Sending chain letters, junk mail or any type of spam.Accessing another users mail account for sending messages.Disguising or attempting to disguise personal identify when sending mail. ![]() ![]() Disrupting system operation by sending viruses, spam or mail bombs or any other electronic or non-electronic message or action which disrupts service.Conducting a personal business or an activity not sponsored by the University.Engaging in activities that violate Federal, State or local laws and statutes, or University policies. ![]() Unacceptable Use - Examples of unacceptable use of the Lake Superior State University electronic mail system include, but are not limited to, the following: ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |