ACCEPTABLE USE OF COMPUTERS/LAPTOPS/SMARTPHONES Sample Clauses

ACCEPTABLE USE OF COMPUTERS/LAPTOPS/SMARTPHONES. PDAS The Trust encourages Employees to use the Trust’s internet and email messaging services for communicating with consultants, Employees, contractors, and customers regarding matters within an Employee’s assigned duties. The Trust also encourages the use of internet and email services for the acquisition of information relating to, or that assists with, the performance of Trust duties. Certain types of internet access or messaging are inappropriate in a business setting. The following are examples or internet and email messaging use that are NOT permitted by the Trust: • Dissemination, copying, or printing of copyrighted materials in violation of copyright laws. Copyrighted materials include written word, audio/video content, and software. • Sending, printing, or otherwise disseminating proprietary data, trade secrets or other confidential information of the Trust (or its consultants) in violation of corporate policy or proprietary agreements. • Offensive, harassing, or threatening statements or language, including disparagement of others based on their race, national origin, gender, sexual orientation, age, disability, religious, or political beliefs. • Downloading, sending or soliciting sexually-oriented messages or images. • Soliciting money or business opportunities for personal gain. • Sending or forwarding chain letters, gambling, or engaging in any activity in violation of Trust policies, laws, regulations, government guidelines or internal controls. • Downloading or installing software of any kind except as authorized by the Manager of Office Administration. • Downloading, sending or soliciting executable programs, movies, or images (including cartoons), that are unrelated to the Employee’s duties and responsibilities. Employees should note: • If an Employee receives an email or other document that contains unacceptable content he or she should delete the record immediately and not distribute it. If necessary, the Manager of Office Administration should be informed. • All software and hardware is to be installed by a member of the IT contractor retained by the Trust to provide such services. • Information Technology persons authorized by the Trust may log on to and access and review the Trust’s systems for the purpose of system security, system maintenance and legal and policy compliance. This includes local file access, email access and internet use. Employees are responsible for all activity conducted under their account and should not expect p...
AutoNDA by SimpleDocs

Related to ACCEPTABLE USE OF COMPUTERS/LAPTOPS/SMARTPHONES

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Computers All computers, hardware, software, computer upgrades and maintenance in connection therewith shall be at Owner's expense.

  • MOBILE DATA COMPUTERS 20 1. As part of the law enforcement services to be provided to CITY, COUNTY 21 has provided, or will provide, mobile data computers (hereinafter called 22 “MDCs”) that are or will be mounted in patrol vehicles and motorcycles, 23 designated by COUNTY for use within CITY limits.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • Software Use Case Red Hat Enterprise Virtualization Supported on physical hardware solely to support virtual quests. Red Hat Enterprise Virtualization is designed to run and manage virtual instances and does not support user-space applications. Red Hat Enterprise Virtualization may be used as a virtual desktop infrastructure solution, however, the Subscription does not come with any software or support for the desktop operating system. You must purchase the operating system for each instance of a desktop or server separately.

  • Servers Marco backs up the following servers only: Windows Servers, SQL servers, Exchange server, and Virtual Machines images running VMWare or Hyper V.

  • Mobile Phones The Company’s expectations in relation to the use of Company provided mobile phones are outlined in Company policy HR-P13. If an Employee is provided with a mobile phone by the Company, the Employee shall be liable for the cost of excessive private telephone calls. Employees agree to make themselves contactable via their personal mobile phone to receive instructions from their supervisors, with the Company reimbursing Employees the cost of any such telephone calls. It is not a condition of employment to own a mobile phone. No Employee shall be engaged in private telephone conversations whilst at work with the exception of designated breaks and in emergency situations. The Company will not be liable for the repair or replacement of personal mobile phones.

  • Cell Phones The College follows the State’s Cell Phone Policy. Employees who receive cell phones from the College shall also abide by this Policy. The College shall provide the Policy to any employee who is given a cell phone. Employees are responsible for the cost of all personal calls. While the College anticipates some incidental personal use of cell phones, it is also expected that such use is infrequent.

  • Evaluation Software If the Software is an evaluation version or is provided to You for evaluation purposes, then, unless otherwise approved in writing by an authorized representative of Licensor, Your license to use the Software is limited solely for internal evaluation purposes in non-production use and in accordance with the terms of the evaluation offering under which You received the Software, and expires 90 days from installation (or such other period as may be indicated within the Software). Upon expiration of the evaluation period, You must discontinue use of the Software, return to an original state any actions performed by the Software, and delete the Software entirely from Your system and You may not download the Software again unless approved in writing by an authorized representative of Licensor. The Software may contain an automatic disabling mechanism that prevents its use after a certain period of time. RESTRICTIONS

  • Server Software Subject to the terms and conditions of this XXXX, Vocera grants you the non-exclusive right to (i) install and run (“Use”) the Server Software on computer systems (each, a “Server Computer”) located at End User’s Facilities in the geographic territory designated above (“Territory”); (ii) to Use the Client Software in conjunction with Authorized Client Devices and such Server Computers; and (iii) for pilot licenses for certain Software provided on a trial basis, use such Software for the limited term specified by Vocera in writing. You may Use the standard Server Software on one primary Server Computer (or a primary cluster of computers suitably configured for productive use of the Server Software). You may install backup copies of the Server Software on backup Server Computers to provide redundancy in the event of failure of the primary Server Computer(s) but, unless you have acquired additional licenses or a failover license from Vocera, you may not run such backup or additional copies concurrently with the primary copies. Vocera grants you the right to use the applicable License Key issued by Vocera only to enable Use of the Server Software in conjunction with the licensed Server Computers. Server Software may be licensed for a Subscription Term as specified in the Quote.

Time is Money Join Law Insider Premium to draft better contracts faster.