V. “PA Technology,” as used in this Policy, means any Technology owned, controlled, or provided by PA. .
VI. Responsibilities of the User: Users of PA Technology must take full responsibility for what they publish, transmit, or possess. Users of PA Technology must connect equipment and install software in a manner that meets the technical and security standards set by Pillow Academy. Users are also responsible for keeping their account information confidential at all times. ……………………………… A certain measure of caution and awareness is required by Users to ensure the efficient and trouble-free use of PA Technology. While PA has systems in place to combat viruses, spy ware, spam, and other computer “bugs,” PA will not be responsible for damage to a User’s Technology that results from viruses, spy ware, spam, or any other use of PA Technology. Users are responsible for adequately protecting and maintaining their own Technology. . Users are responsible for keeping their personally identifiable information, which may include, but is not limited to, a User’s telephone number, address, age, gender, date of birth, credit card data, Social Security, and Driver’s License numbers etc., strictly confidential. VII. Unacceptable Uses: Technology – No User may use any Technology to do the following: A. Steal, forge, lie, cheat, plagiarize or masquerade B. Bully or threaten C. Violate the confidentiality of another D. Tamper with, misuse, damage, interfere with or destroy the technology of another E. Upload, post, or transmit content that is obscene, threatening, harassing, defamatory, libelous, invasive of another’s privacy, hateful or racially/ethnically motivated, incite violence, and/or the imminent threat of violence. . VIII. PA Technology - PA Technology exists to advance the mission of PA. PA will manage these resources accordingly. Users may not do any of the following with PA Technology: A. Steal, forge, lie, cheat, plagiarize or masquerade B. Bully or threaten C. Access the account of another D. Generate activities which consume more than a User’s fair share of either system E. Time or network bandwidth [ex: sending chain letters] F. Fraudulently log into any computer G. Forge e-mail headers or manipulate other identifiers in order to disguise the origin of any system or network activity 49
Made with FlippingBook - professional solution for displaying marketing and sales documents online