trouble-free use of PA Technology. While PA has systems in place to combat viruses, spy ware, spam, and other computer “bugs,” PA will not be responsible for damage to a User’s Technology that results from viruses, spy ware, spam, or any other use of PA Technology. Users are responsible for adequately protecting and maintaining their own Technology. . Users are responsible for keeping their personally identifiable information, which may include, but is not limited to, a User’s telephone number, address, age, gender, date of birth, credit card data, Social Security, and Driver’s License numbers etc., strictly confidential. VII. Unacceptable Uses: Technology – No User may use any Technology to do the following: A. Steal, forge, lie, cheat, plagiarize or masquerade B. Bully or threaten C. Violate the confidentiality of another D. Tamper with, misuse, damage, interfere with or destroy the technology of another E. Upload, post, or transmit content that is obscene, threatening, harassing, defamatory, libelous, invasive of another’s privacy, hateful or racially/ethnically motivated, incite violence, and/or the imminent threat of violence. . VIII. PA Technology - PA Technology exists to advance the mission of PA. PA will manage these resources accordingly. Users may not do any of the following with PA Technology: A. Steal, forge, lie, cheat, plagiarize or masquerade B. Bully or threaten C. Access the account of another D. Generate activities which consume more than a User’s fair share of either system E. Time or network bandwidth [ex: sending chain letters] F. Fraudulently log into any computer G. Forge e-mail headers or manipulate other identifiers in order to disguise the origin of any system or network activity H. Attempt to determine the passwords of others or obtain privileges on any computer to which a User in not entitled I. Possess, willingly receive or distribute obscene material J. Copy, install, or use any data in violation of applicable copyrights or license agreements [Downloading and distributing movies, songs and software without authorization from the owner of the copyright is a violation of copyright law. The Recording Industry of America and Motion Picture Association of America can and do aggressively sue to enforce their copyrights.]
45
Made with FlippingBook - professional solution for displaying marketing and sales documents online