Prevent.Zone - Software Acceptable Use

Terms of Service

This Terms of Service Agreement between AliveTek Inc. courseware and your institution, constitutes acceptable use of intellectual property, defines acceptable use and user responsibilities, general privacy policy, as well as unauthorized use, related to the courses and institutions under contract with AliveTek Inc. These terms remain in force for the entire duration of the contract. All other rights are reserved.

Acceptable Use Clause

1. Prevent.Zone and AliveTek Inc. intellectual property, courseware and computers attached to our network, and any associated computational resource or service, are for the use of persons affiliated with your institution including faculty, staff, contractors and students. Access to Prevent.Zone materials are provided to your institution to further your school's mission of creating a respectful and collegial environment. The use of these resources should be consistent with this policy, the institution's desired use, security policies, and other applicable regulations including the Children's Online Privacy Protection Rule (COPPA, 2012). By using this course and associated electronic resources, all individuals, including, but not limited to, employees, students, customers, and affiliated student organizations such as Greek organizations, unconditionally accept the terms of this policy. For more information on COPPA, please visit:

2. Acceptable use of Prevent.Zone and AliveTek Inc. courseware are based on common sense, decency, ethical use, civility, and data use security applied to the computing environment provided by your institution. All students and authorized users may expect reasonable privacy with regard to all computer files and e-mail. Notwithstanding, AliveTek Inc. at the request of the host institution may access university-owned or networked computers for maintenance and upgrades and to monitor or troubleshoot networks for course-related security, network audits, investigations, and/or legal requirements. Computers or systems may also be accessed through established procedures for reasonably suspected abuse of this policy and/or other institutionally acceptable use policies. If illicit activity or data security breach of any kind is suspected as a result of routine monitoring, an internal or external investigation may result, specific to your institutional IT policies and procedures. Users may be entitled to notification of such access, and, whenever possible, notification should precede access. Any actions that compromise the integrity of AliveTek data networks, linked institutional networks, services, or resources is strictly prohibited. Examples of unacceptable uses include, but are not limited to, the following:

3. Certain violations of this acceptable use policy, which involve the potential for illegal conduct (including accessing certain course files, or any activity which may constitute fraud or the misappropriation of AliveTek's courseware), may be reported to external agencies or law enforcement for investigation. Contact your institution's IT Dept. or Dean of Students for more information on your institution's policy on acceptable use.