List of active policies
|User Agreement||Site policy||All users|
All user must agree to follow the code of conduct as described in the user agreement while accessing this LMS.
All inactive accounts will be automatically deactivated after 6 months.
Code of Conduct
On this open community site participants are expected to act responsibly and to show respect and consideration to other users.
Only post meaningful and relevant content to the discussion forums and elsewhere.
Do not post unsolicited advertisements or spam.
Do not harass other users.
Do not upload or post materials that are of obscene nature.
Do not abuse the limits of this free service by uploading personal videos/files.
Do not upload anything that you don't have copyright for.
Do not misuse teaching materials and lesson videos such as downloading/recording for commercial purpose.
We will endeavor to remove any content that is deemed inappropriate. Spammers or anyone else who persists in violating our code of conduct will have their account blocked. To report spam or any other site policy issue, please contact email@example.com .
Personally Identifiable Information (PII)
As a general rule, we, ACY, collect PII about you to create and manage user accounts to grant access to the system. Submitting PII for access to this LMS is voluntary. By doing so, you are giving us your permission to use the information for the stated purpose. However, not providing certain information may result in the ACY’s inability to provide you with the service you desire.
If you choose to provide us with PII for access to this LMS, through such methods as completing a web form or sending us an email, we will use that information to help us provide you the information or service you have requested or to respond to your message.
We take the security of all PII seriously and take precautions to maintain the security, confidentiality, and integrity of the information we collect. Such measures include access controls designed to limit access to the information to the extent necessary to accomplish our mission. We also employ various security technologies to protect the information stored on our systems.
We take the following steps to secure the information we collect:
- Employ internal access controls to ensure that only personnel who have access to your information are those with a need to do so to perform their official duties.
- Train appropriate personnel on our information management policies.
- Secure the areas where we retain paper copies of the information we collect online.
- Perform regular backups of the information we collect online to ensure against loss.