Access to Inappropriate Material Sample Clauses

Access to Inappropriate Material. To the extent practical, technology protection measures (or “Internet filters”) shall be used to block or filter Internet, or other forms of electronic communications, and access to inappropriate information. Specifically, as required by the Children’s Internet Protection Act, blocking shall be applied to visual depictions of materials deemed obscene or child pornography, or to any material deemed harmful to minors. Subject to administrative approval, technology protection measures may be disabled for adults or, in the case of minors, minimized for bona fide research or other lawful purposes.
AutoNDA by SimpleDocs
Access to Inappropriate Material. To the extent practical, technology protection measures {or Internet Filters} shall used to block or filter Internet, or other forms of electronic communications, to inappropriate information. Specially, as required by the Children’s Internet Protection Act, blocking shall be applied to visual depiction of material deemed obscene or child pronography, or to any material deemed harmful to minors. Subject to staff supervision, technology protection measures may be disabled for adults or, in the case of minors, minimized only for bona fide research or other lawful purposes. Inappropriate Network Usage To the extent practical, steps shall be taken to promote the safety and security of when disclosures, defamatory, ability DCSD with users of the Xxxxxx Community School District online computer/iPad network using electronic mail, chat rooms, instant messaging and other forms of direct electronic communications. Specifically, as required by the Children’s Internet Protection Act, prevention of inappropriate network usage includes: (a) unauthorized access, including so-called ‘hacking’ and other unlawful activities; and (b) unauthorized use, and dissemination of personal identification information regarding minors. Though DCSD has a filtering policy in place according to CIPA (Child Internet Protection Act) it does not have control of the information on the Internet. Therefore, sites accessible via the Internet may contain material that is inaccurate, abusive, obscene, profane, sexually oriented, threatening, racially offensive, illegal or otherwise inconsistent with the mission of the Xxxxxx Community School District. While DCSD’s intent is to make Internet access available for educational goals and objectives, account holders will have the to access other materials as well. At DCSD, we expect students to obey the iPad Use Agreement when using the Internet. Students found in violation of the policy will be disciplined. In addition, DCSD account holders take full responsibility for their access to network resources and the Internet. Specifically, DCSD makes no warranties respect to school network resources nor does it take responsibility for:
Access to Inappropriate Material. Attempts to access inappropriate material using the school’s ICT is monitored and logged by the school or the Catholic Education Office. Some inappropriate material may be filtered or blocked by CEDR, however we acknowledge that full protection from inappropriate content can never be guaranteed. You should NOT: • Use ICT to access material that: o is profane or obscene (e.g. pornography); o advocates illegal acts; o advocates violence or discrimination towards other people; • Participate in internet social networks, online chats, discussion groups or mailing lists that are not relevant to your education. • Access material which is not relevant to your education. • Use the school ICT to purchase, order or sell any goods.
Access to Inappropriate Material. It shall be a violation of this Policy for any User to use any Digital Resource to upload, post, mail, display, store, access, or transmit, any Inappropriate Material. Inappropriate Material is defined as any content, communication, or information that conflicts with the fundamentals policies, Core Values, and Mission of the District. Whether materials or content is considered inappropriate shall be determined without regard to whether such materials or content has been blocked by any filtering software used by the District. Examples of Inappropriate Material include, but are not limited to, material that: • Is hateful, harassing, threatening, libelous, or defamatory; • Is deemed offensive or discriminatory based on race, religion, gender, age, national origin, citizenship, sexual orientation, mental or physical disability, marital status, or other characteristic protected by state, federal, or local law; • Constitutes use for, or in support of, any obscene or pornographic purpose including the transmission, review, retrieval, or access to any profane, obscene, or sexually explicit material; • Constitutes use for the solicitation or distribution of information intended or likely to incite violence or to harass, threaten, or stalk another individual; • Solicits or distributes information with the intent to cause personal harm or bodily injury; • Promotes or participates in any way in religious or political activities
Access to Inappropriate Material. To the extent practical, technology protection measures (or “Internet filters”) shall be used to block or filter access to inappropriate information received through the Internet or other forms of electronic communication. As described in the district’s technology plan, the district currently uses blocking and filtering software and hardware to ensure the safety and protection of the users. Specifically, as required by the Children’s Internet Protection Act, blocking shall be applied to visual depictions of material deemed obscene or child pornography, or to any material deemed harmful to minors. Subject to staff supervision, technology protection measures may be disabled; or, in the case of minors, minimized only for bona fide research or other lawful purposes.
Access to Inappropriate Material. To the extent practical, technology protection measures (or “Internet filters”) will be used to block or filter access to inappropriate information on the Internet and World Wide Web. Specifically, blocking will be applied to audio and visual depictions deemed obscene or to be child pornography or harmful to minors. Student access to other materials that are inappropriate to minors will also be restricted. The board has determined that audio or visual materials that depict violence, nudity, or graphic language that does not serve a legitimate pedagogical purpose are inappropriate for minors. The superintendent, in conjunction with a school technology and media advisory committee (see policy 3200, Selection of Instructional Materials), shall make a determination regarding what other matter or materials are inappropriate for minors. School system personnel may not restrict Internet access to ideas, perspectives, or viewpoints if the restriction is motivated solely by disapproval of the viewpoints involved. A student or employee must immediately notify the appropriate school official if the student or employee believes that a website or web content that is available to students through the school system’s Internet access is obscene, constitutes child pornography, is “harmful to minors” as defined by CIPA, or is otherwise inappropriate for students. Students must notify a teacher or the school principal; employees must notify the superintendent or designee. Due to the dynamic nature of the Internet, sometimes Internet websites and web material that should not be restricted are blocked by the Internet filter. A student or employee who believes that a website or web content has been improperly blocked by the school system’s filter should bring the website to the attention of the principal. The principal shall confer with the technology director to determine whether the site or content should be unblocked. The principal shall notify the student or teacher promptly of the decision. The decision may be appealed through the school system’s grievance procedure. (See policies 1740/4010, Student and Parent Grievance Procedure, and 1750/7220, Grievance Procedure for Employees.) Subject to staff supervision, technology protection measures may be disabled during use by an adult for bona fide research or other lawful purposes.
Access to Inappropriate Material. To the extent practical, technology protection measures {or Internet Filters} shall be used to block or filter Internet, or other forms of electronic communications, access to inappropriate information. Specially, as required by the Children’s Internet Protection Act, blocking shall be applied to visual depiction of material deemed obscene or child pornography, or to any material deemed harmful to minors. Subject to staff supervision, technology protection measures may be disabled for adults or, in the case of minors, minimized only for bona fide research or other lawful purposes. Inappropriate Network Usage To the extent practical, steps shall be taken to promote the safety and security of users of the Xxxxxx Community School District online computer/iPad network when using electronic mail, chat rooms, instant messaging and other forms of direct electronic communication. Specifically, as required by the Children’s Internet Protection Act, prevention of inappropriate network usage includes: (a) unauthorized access, including so-called ‘hacking’ and other unlawful activities; and
AutoNDA by SimpleDocs

Related to Access to Inappropriate Material

  • Access to Information Such Purchaser acknowledges that it has had the opportunity to review the Transaction Documents (including all exhibits and schedules thereto) and the SEC Reports and has been afforded, (i) the opportunity to ask such questions as it has deemed necessary of, and to receive answers from, representatives of the Company concerning the terms and conditions of the offering of the Securities and the merits and risks of investing in the Securities; (ii) access to information about the Company and its financial condition, results of operations, business, properties, management and prospects sufficient to enable it to evaluate its investment; and (iii) the opportunity to obtain such additional information that the Company possesses or can acquire without unreasonable effort or expense that is necessary to make an informed investment decision with respect to the investment. Such Purchaser acknowledges and agrees that neither the Placement Agent nor any Affiliate of the Placement Agent has provided such Purchaser with any information or advice with respect to the Securities nor is such information or advice necessary or desired. Neither the Placement Agent nor any Affiliate has made or makes any representation as to the Company or the quality of the Securities and the Placement Agent and any Affiliate may have acquired non-public information with respect to the Company which such Purchaser agrees need not be provided to it. In connection with the issuance of the Securities to such Purchaser, neither the Placement Agent nor any of its Affiliates has acted as a financial advisor or fiduciary to such Purchaser.

  • Access to Protected Information If BA maintains a designated record set on behalf of CE, BA shall make Protected Information maintained by BA or its agents or subcontractors in Designated Record Sets available to CE for inspection and copying within five (5) days of a request by CE to enable CE to fulfill its obligations under state law [Health and Safety Code Section 123110] and the Privacy Rule, including, but not limited to, 45 C.F.R. Section 164.524 [45 C.F.R. Section 164.504(e)(2)(ii)(E)]. If BA maintains Protected Information in electronic format, BA shall provide such information in electronic format as necessary to enable CE to fulfill its obligations under the HITECH Act and HIPAA Regulations, including, but not limited to, 42 U.S.C. Section 17935(e) and 45 C.F.R. Section 164.524.

  • Access to Data Operator shall make Data in the possession of the Operator available to the LEA within five (5) business days of a request by the LEA.

  • Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.

  • Access to Information; Confidentiality (a) Upon reasonable advance written notice, subject to applicable logistical restrictions or limitations as a result of COVID-19 or any COVID-19 Measures and solely for purposes of furthering the Merger Transactions, the Company shall, and shall cause each of its Subsidiaries to, afford to Parent, Merger Sub and their respective representatives reasonable access during normal business hours during the period from the date of this Agreement until the earlier of the Effective Time or the valid termination of this Agreement pursuant to Article VII, to all their respective properties, assets, books, contracts, commitments, personnel and records and, during such period, the Company shall, and shall cause each of its Subsidiaries to, furnish promptly to Parent: (i) a copy of each report, schedule, registration statement and other document filed or received by it during such period pursuant to the requirements of federal or state securities Laws and (ii) all other information concerning its business, properties and personnel as Parent or Merger Sub may reasonably request (including Tax Returns filed and those in preparation and the workpapers of its auditors). Nothing herein (including, for the avoidance of doubt, this Section 5.2(a) and Section 5.2(b)) shall require the Company or any of its Subsidiaries to provide such access or information to the extent that such action (A) would reasonably be expected to result in a waiver of attorney-client privilege, work product doctrine or similar privilege, (B) specifically relates to the evaluation, deliberation or minutes of the Company Board (or any committee or subcommittee thereof) related to the Merger Transactions, the strategic and financial alternatives process leading thereto, or any information or materials provided to the Company Board (or any committee or subcommittee thereof) in connection therewith or (C) would reasonably be expected to violate any applicable Law or any confidentiality obligation owing to a third party so long as the Company shall promptly notify Parent of any such confidentiality obligations or access restrictions and use commercially reasonable efforts to obtain the consent of such third party to provide such information and otherwise provide such access to Parent, if requested and (b) generally describe the type of information that cannot be disclosed to Parent (to the extent not prohibited by law or the underlying document). No investigation pursuant to this Section 5.2 shall affect any representation or warranty in this Agreement of any party hereto or any condition to the obligations of the parties hereto. All requests for access pursuant to this Section 5.2 must be directed to the Chief Financial Officer of the Company or another person designated in writing by the Company. Notwithstanding anything herein to the contrary, Parent and Merger Sub shall not, and shall cause their respective representatives not to, contact any partner, licensor, licensee, customer or supplier of the Company in connection with the Offer, the Merger or any of the other Merger Transactions without the Company’s prior written consent (such consent not to be unreasonably withheld, conditioned or delayed), and Parent and Merger Sub acknowledge and agree that any such contact shall be arranged by and with a representative of the Company participating.

  • Insurance and Fingerprint Requirements Information Insurance If applicable and your staff will be on TIPS member premises for delivery, training or installation etc. and/or with an automobile, you must carry automobile insurance as required by law. You may be asked to provide proof of insurance. Fingerprint It is possible that a vendor may be subject to Chapter 22 of the Texas Education Code. The Texas Education Code, Chapter 22, Section 22.0834. Statutory language may be found at: xxxx://xxx.xxxxxxxx.xxxxx.xxxxx.xx.xx/ If the vendor has staff that meet both of these criterion: (1) will have continuing duties related to the contracted services; and (2) has or will have direct contact with students Then you have ”covered” employees for purposes of completing the attached form. TIPS recommends all vendors consult their legal counsel for guidance in compliance with this law. If you have questions on how to comply, see below. If you have questions on compliance with this code section, contact the Texas Department of Public Safety Non-Criminal Justice Unit, Access and Dissemination Bureau, FAST-FACT at XXXX@xxxxx.xxxxx.xx.xx and you should send an email identifying you as a contractor to a Texas Independent School District or ESC Region 8 and TIPS. Texas DPS phone number is (000) 000-0000. See form in the next attribute to complete entitled: Texas Education Code Chapter 22 Contractor Certification for Contractor Employees

  • Safety Information Any other bulletins may only be posted by mutual agreement between the Union and designated Management.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!