Access to Inappropriate Material Sample Clauses

Access to Inappropriate Material. To the extent practical, technology protection measures (or “Internet filters”) shall be used to block or filter Internet, or other forms of electronic communications, and access to inappropriate information. Specifically, as required by the Children’s Internet Protection Act, blocking shall be applied to visual depictions of materials deemed obscene or child pornography, or to any material deemed harmful to minors. Subject to administrative approval, technology protection measures may be disabled for adults or, in the case of minors, minimized for bona fide research or other lawful purposes.
AutoNDA by SimpleDocs
Access to Inappropriate Material. To the extent practicable, technology protection measures are in place to block Internet, or other forms of electronic communications, access to inappropriate information.
Access to Inappropriate Material. To the extent practical, technology protection measures {or Internet Filters} shall used to block or filter Internet, or other forms of electronic communications, to inappropriate information. Specially, as required by the Children’s Internet Protection Act, blocking shall be applied to visual depiction of material deemed obscene or child pronography, or to any material deemed harmful to minors. Subject to staff supervision, technology protection measures may be disabled for adults or, in the case of minors, minimized only for bona fide research or other lawful purposes. Inappropriate Network Usage To the extent practical, steps shall be taken to promote the safety and security of when disclosures, defamatory, ability DCSD with users of the Xxxxxx Community School District online computer/iPad network using electronic mail, chat rooms, instant messaging and other forms of direct electronic communications. Specifically, as required by the Children’s Internet Protection Act, prevention of inappropriate network usage includes: (a) unauthorized access, including so-called ‘hacking’ and other unlawful activities; and (b) unauthorized use, and dissemination of personal identification information regarding minors. Though DCSD has a filtering policy in place according to CIPA (Child Internet Protection Act) it does not have control of the information on the Internet. Therefore, sites accessible via the Internet may contain material that is inaccurate, abusive, obscene, profane, sexually oriented, threatening, racially offensive, illegal or otherwise inconsistent with the mission of the Xxxxxx Community School District. While DCSD’s intent is to make Internet access available for educational goals and objectives, account holders will have the to access other materials as well. At DCSD, we expect students to obey the iPad Use Agreement when using the Internet. Students found in violation of the policy will be disciplined. In addition, DCSD account holders take full responsibility for their access to network resources and the Internet. Specifically, DCSD makes no warranties respect to school network resources nor does it take responsibility for:
Access to Inappropriate Material. To the extent practical, technology protection measures (or “Internet filters”) shall be used to block or filter access to inappropriate information received through the Internet or other forms of electronic communication. As described in the district’s technology plan, the district currently uses blocking and filtering software and hardware to ensure the safety and protection of the users. Specifically, as required by the Children’s Internet Protection Act, blocking shall be applied to visual depictions of material deemed obscene or child pornography, or to any material deemed harmful to minors. Subject to staff supervision, technology protection measures may be disabled; or, in the case of minors, minimized only for bona fide research or other lawful purposes.
Access to Inappropriate Material. To the extent practical, technology protection measures {or Internet Filters} shall be used to block or filter Internet, or other forms of electronic communications, access to inappropriate information. Specially, as required by the Children’s Internet Protection Act, blocking shall be applied to visual depiction of material deemed obscene or child pornography, or to any material deemed harmful to minors. Subject to staff supervision, technology protection measures may be disabled for adults or, in the case of minors, minimized only for bona fide research or other lawful purposes. Inappropriate Network Usage To the extent practical, steps shall be taken to promote the safety and security of users of the Xxxxxx Community School District online computer/iPad network when using electronic mail, chat rooms, instant messaging and other forms of direct electronic communication. Specifically, as required by the Children’s Internet Protection Act, prevention of inappropriate network usage includes: (a) unauthorized access, including so-called ‘hacking’ and other unlawful activities; and
Access to Inappropriate Material. Attempts to access inappropriate material using the school’s ICT is monitored and logged by the school or the Catholic Education Office. Some inappropriate material may be filtered or blocked by CEDR, however we acknowledge that full protection from inappropriate content can never be guaranteed. You should NOT: • Use ICT to access material that: o is profane or obscene (e.g. pornography); o advocates illegal acts; o advocates violence or discrimination towards other people; • Participate in internet social networks, online chats, discussion groups or mailing lists that are not relevant to your education. • Access material which is not relevant to your education. • Use the school ICT to purchase, order or sell any goods.
Access to Inappropriate Material. To the extent practical, technology protection measures (or “Internet filters”) will be used to block or filter access to inappropriate information on the Internet and World Wide Web. Specifically, blocking will be applied to audio and visual depictions deemed obscene or to be child pornography or harmful to minors. Student access to other materials that are inappropriate to minors will also be restricted. The board has determined that audio or visual materials that depict violence, nudity, or graphic language that does not serve a legitimate pedagogical purpose are inappropriate for minors. The superintendent, in conjunction with a school technology and media advisory committee (see policy 3200, Selection of Instructional Materials), shall make a determination regarding what other matter or materials are inappropriate for minors. School system personnel may not restrict Internet access to ideas, perspectives, or viewpoints if the restriction is motivated solely by disapproval of the viewpoints involved. A student or employee must immediately notify the appropriate school official if the student or employee believes that a website or web content that is available to students through the school system’s Internet access is obscene, constitutes child pornography, is “harmful to minors” as defined by CIPA, or is otherwise inappropriate for students. Students must notify a teacher or the school principal; employees must notify the superintendent or designee. Due to the dynamic nature of the Internet, sometimes Internet websites and web material that should not be restricted are blocked by the Internet filter. A student or employee who believes that a website or web content has been improperly blocked by the school system’s filter should bring the website to the attention of the principal. The principal shall confer with the technology director to determine whether the site or content should be unblocked. The principal shall notify the student or teacher promptly of the decision. The decision may be appealed through the school system’s grievance procedure. (See policies 1740/4010, Student and Parent Grievance Procedure, and 1750/7220, Grievance Procedure for Employees.) Subject to staff supervision, technology protection measures may be disabled during use by an adult for bona fide research or other lawful purposes.
AutoNDA by SimpleDocs
Access to Inappropriate Material. It shall be a violation of this Policy for any User to use any Digital Resource to upload, post, mail, display, store, access, or transmit, any Inappropriate Material. Inappropriate Material is defined as any content, communication, or information that conflicts with the fundamentals policies, Core Values, and Mission of the District. Whether materials or content is considered inappropriate shall be determined without regard to whether such materials or content has been blocked by any filtering software used by the District. Examples of Inappropriate Material include, but are not limited to, material that: • Is hateful, harassing, threatening, libelous, or defamatory; • Is deemed offensive or discriminatory based on race, religion, gender, age, national origin, citizenship, sexual orientation, mental or physical disability, marital status, or other characteristic protected by state, federal, or local law; • Constitutes use for, or in support of, any obscene or pornographic purpose including the transmission, review, retrieval, or access to any profane, obscene, or sexually explicit material; • Constitutes use for the solicitation or distribution of information intended or likely to incite violence or to harass, threaten, or stalk another individual; • Solicits or distributes information with the intent to cause personal harm or bodily injury; • Promotes or participates in any way in religious or political activities

Related to Access to Inappropriate Material

  • Access to Information Such Purchaser acknowledges that it has had the opportunity to review the Transaction Documents (including all exhibits and schedules thereto) and the SEC Reports and has been afforded, (i) the opportunity to ask such questions as it has deemed necessary of, and to receive answers from, representatives of the Company concerning the terms and conditions of the offering of the Securities and the merits and risks of investing in the Securities; (ii) access to information about the Company and its financial condition, results of operations, business, properties, management and prospects sufficient to enable it to evaluate its investment; and (iii) the opportunity to obtain such additional information that the Company possesses or can acquire without unreasonable effort or expense that is necessary to make an informed investment decision with respect to the investment. Such Purchaser acknowledges and agrees that neither the Placement Agent nor any Affiliate of the Placement Agent has provided such Purchaser with any information or advice with respect to the Securities nor is such information or advice necessary or desired. Neither the Placement Agent nor any Affiliate has made or makes any representation as to the Company or the quality of the Securities and the Placement Agent and any Affiliate may have acquired non-public information with respect to the Company which such Purchaser agrees need not be provided to it. In connection with the issuance of the Securities to such Purchaser, neither the Placement Agent nor any of its Affiliates has acted as a financial advisor or fiduciary to such Purchaser.

  • Access to Information; Independent Investigation Prior to the execution of this Agreement, the Subscriber has had the opportunity to ask questions of and receive answers from representatives of the Company concerning an investment in the Company, as well as the finances, operations, business and prospects of the Company, and the opportunity to obtain additional information to verify the accuracy of all information so obtained. In determining whether to make this investment, Subscriber has relied solely on Subscriber’s own knowledge and understanding of the Company and its business based upon Subscriber’s own due diligence investigation and the information furnished pursuant to this paragraph. Subscriber understands that no person has been authorized to give any information or to make any representations which were not furnished pursuant to this Section 2 and Subscriber has not relied on any other representations or information in making its investment decision, whether written or oral, relating to the Company, its operations and/or its prospects.

  • Maintaining Records; Access to Properties and Inspections Maintain financial records in accordance with GAAP and, upon reasonable notice, permit any representatives designated by the Administrative Agent or any Lender to visit and inspect the financial records and the properties of the Borrower or any Significant Subsidiary during normal business hours and to discuss the affairs, finances and condition of the Borrower or any Significant Subsidiary with the officers thereof and independent accountants therefor.

  • Access to Protected Information If BA maintains a designated record set on behalf of CE, BA shall make Protected Information maintained by BA or its agents or subcontractors in Designated Record Sets available to CE for inspection and copying within five (5) days of a request by CE to enable CE to fulfill its obligations under state law [Health and Safety Code Section 123110] and the Privacy Rule, including, but not limited to, 45 C.F.R. Section 164.524 [45 C.F.R. Section 164.504(e)(2)(ii)(E)]. If BA maintains Protected Information in electronic format, BA shall provide such information in electronic format as necessary to enable CE to fulfill its obligations under the HITECH Act and HIPAA Regulations, including, but not limited to, 42 U.S.C. Section 17935(e) and 45 C.F.R. Section 164.524.

  • Access to Information and Records During the period commencing thirty (30) days prior to the Closing Date, the Seller shall give Buyer, its counsel, accountants and other representatives (i) access during normal business hours to all of the properties, books, records, contracts and documents of the Seller for the purpose of such inspection, investigation and testing as Buyer deems appropriate (and the Seller shall furnish or cause to be furnished to Buyer and its representatives all information with respect to the business and affairs of the Seller as Buyer may request); (ii) access to employees, agents and representatives for the purposes of such meetings and communications as Buyer reasonably desires; and (iii) access to vendors, customers, manufacturers of its machinery and equipment, and others having business dealings with the Seller. Through the Closing Date, the Buyer and its Affiliates shall not disclose any Proprietary Information obtained pursuant to this paragraph to any third parties and until the Closing Date will not use any such Proprietary Information in the Buyer's business or any affiliated business without the prior written consent of the Seller and then only to the extent specified in that consent. Consent may be granted or withheld at the sole discretion of the Seller. The Buyer shall not contact any suppliers, customers, employees, affiliates or associates to circumvent the purposes of this provision. The Buyer shall take all steps reasonably necessary or appropriate to maintain the strict confidentiality of the Proprietary Information through the Closing Date.

  • Access to Company Information (a) During the period from the date of this Agreement to the Effective Time, the Company shall permit representatives of the Parent to have reasonable access (at all reasonable times, and in a manner so as not to interfere with the normal business operations of the Company) to all premises, properties, financial and accounting records, contracts, other records and documents, and personnel, of or pertaining to the Company. (b) The Parent and each of its Subsidiaries (i) shall treat and hold as confidential any Company Confidential Information (as defined below), (ii) shall not use any of the Company Confidential Information except in connection with this Agreement, and (iii) if this Agreement is terminated for any reason whatsoever, shall return to the Company all tangible embodiments (and all copies) thereof which are in its possession. For purposes of this Agreement, “Company Confidential Information” means any information of the Company that is furnished to the Parent or any of its Subsidiaries by the Company in connection with this Agreement; provided, however, that it shall not include any information (A) which, at the time of disclosure, is available publicly other than as a result of non-permitted disclosure by the Parent, any of its Subsidiaries or their respective directors, officers, or employees, (B) which, after disclosure, becomes available publicly through no fault of the Parent, any of its Subsidiaries or their respective directors, officers, or employees, (C) which the Parent or any of its Subsidiaries knew or to which the Parent or any of its Subsidiaries had access prior to disclosure, as demonstrated by competent evidence, provided that the source of such information is not known by the Parent or any of its Subsidiaries to be bound by a confidentiality obligation to the Company, or (D) which the Parent or any of its Subsidiaries rightfully obtains from a source other than the Company, provided that the source of such information is not known by the Parent or any of its Subsidiaries to be bound by a confidentiality obligation to the Company.

  • Confidentiality; Access to Information (a) Each Preferred Member (other than the FRBNY which is bound by that certain Nondisclosure Agreement by and among AIG and the FRBNY and dated as of September 25, 2008 (the “Nondisclosure Agreement”) or any Permitted Transferee of the FRBNY and any Observers who executed a joinder to the Nondisclosure Agreement or who are otherwise bound thereto), and any Observer not otherwise bound by the Nondisclosure Agreement, agrees to keep confidential, and not to disclose to any Person, any matter relating to the Company or any of its Affiliates, or their respective affairs (other than disclosure to such Preferred Member’s advisors responsible for matters relating to the Company and who reasonably need to know such information in order to perform such responsibilities (each such Person being hereinafter referred to as an “Authorized Representative”)); provided, however, that such Preferred Member or any of its Authorized Representatives may make such disclosure, subject to applicable Law, to the extent that (i) the information being disclosed is in connection with such Preferred Member’s tax returns or concerns the tax structure or tax treatment of the Company or its transactions, (ii) such disclosure is to any officer, director, shareholder or partner of such Preferred Member, (iii) the information being disclosed is otherwise generally available to the public, (iv) such disclosure is requested by any governmental body, agency, official or authority having jurisdiction over such Preferred Member, (v) such disclosure, based upon the advice of legal counsel of such Preferred Member or Authorized Representative, is otherwise required by applicable Law or statute or (vi) such disclosure is made to any Permitted Transferee or Third Party in connection with any proposed Transfer of Securities, which Permitted Transferee or Third Party is subject to a confidentiality agreement for the benefit of the Company with terms no less protective than this Section 7.05(a). Prior to making any disclosure described in clause (iv) or (v) of this Section 7.05(a), a Preferred Member (other than the FRBNY or any Permitted Transferee thereof) shall notify the Board of Managers of such disclosure and of such advice of counsel. Each Preferred Member (other than the FRBNY or any Permitted Transferee thereof) shall use all reasonable efforts to cause each of its Authorized Representatives to comply with the obligations of such Preferred Member under this Section 7.05(a). In connection with any disclosure described in clause (iv) or (v) above, the disclosing Preferred Member shall cooperate with the Company in seeking any protective order or other appropriate arrangement as the Board of Managers may request. (b) Each of the AIG Member and the Company hereby agrees to provide, or cause to be provided, to the Comptroller General of the United States (the “Comptroller General”), upon request, access to information, data, schedules, books, accounts, financial records, reports, files, electronic communications, or other papers, things or property that relate to assistance provided by the FRBNY pursuant to any action taken by the Board of Governors of the Federal Reserve System (the “Board of Governors”) under section 13(3) of the Federal Reserve Act (12 U.S.C. § 343), to the extent required by, and in accordance with the provisions of, 31 U.S.C. § 714(d)(3) (as added by section 801 of the Helping Families Save Their Homes Act of 2009, Pub. L. No. 111-22 (the “Helping Families Act”)). The parties hereby acknowledge that the Helping Families Act provides that, subject to certain exceptions enumerated in 31 U.S.C. § 714(c)(4) (as amended), an officer or an employee of the U.S. Government Accountability Office (the “GAO”) (including the Comptroller General) may not disclose to any person outside the GAO information obtained in audits or examinations conducted under 31 U.S.C. § 714(e) (as amended) and maintained as confidential by the Board of Governors or a Federal Reserve bank (including the FRBNY).

  • Access to Records after Closing (a) For a period of ------------------------------- six years after the Closing Date, Parent and its representatives shall have reasonable access to all of the books and records of the Companies to the extent that such access may reasonably be required by Parent in connection with matters relating to or affected by the operations of the Companies prior to the Closing Date. Such access shall be afforded by Buyer upon receipt of reasonable advance notice and during normal business hours. Parent shall be solely responsible for any costs or expenses incurred by it pursuant to this Section 13.6(a). If Buyer --------------- or the Companies shall desire to dispose of any of such books and records prior to the expiration of such six-year period, Buyer shall, prior to such disposition, give Parent a reasonable opportunity, at Parent's expense, to segregate and remove such books and records as Parent may select. (b) For a period of six years after the Closing Date, Buyer and its representatives shall have reasonable access to all of the books and records relating to the Companies which Parent or any of its Affiliates may retain after the Closing Date. Such access shall be afforded by Parent and its Affiliates upon receipt of reasonable advance notice and during normal business hours. Buyer shall be solely responsible for any costs and expenses incurred by it pursuant to this Section 13.6(b). If Parent or any of its Affiliates shall --------------- desire to dispose of any of such books and records prior to the expiration of such six-year period, Parent shall, prior to such disposition, give Buyer a reasonable opportunity, at Buyer's expense, to segregate and remove such books and records as Buyer may select.

  • Access to Data Operator shall make Data in the possession of the Operator available to the LEA within five (5) business days of a request by the LEA.

  • Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!