Additional access measures Outreach Sample Clauses

Additional access measures Outreach. The College is committed to widening participation and significant time and resources are invested in the development of outreach activities to fulfill the College’s widening participation aspirations. Key aspects of this work includes: Developing a portfolio of courses that provides progression routes at the College for all subjects from level 2 through to level 6 (including some to level 7). This wide portfolio improves opportunities for local access to higher education and enhances access to subject specific higher education for students from the College outreach centres in East Lancashire, Croxteth (Liverpool) and Wythenshawe (Manchester). Developing progression agreements with all the major further education Colleges in Lancashire through the Lancashire Lifelong Learning Network to enhance entry and transition to higher education, particularly in areas of traditionally low participation in higher education such as East Lancashire Delivery of vocational further education courses at outreach centres in East Lancashire, Wythenshawe (Manchester) and Croxteth (Liverpool) to enhance opportunities for progression in areas with a high proportion of low income households and traditionally low participation in higher education. Developing activities to raise the profile of higher education in schools and colleges in the North West of England including schools with a high proportion of students from under- represented socio-economic groups The success of the College’s outreach activities is reflected in the proportion of students from a xxxx uplift area. Xxxx uplift is based on students from a deprived area postcode on LSC's file, similar to the POLAR 2 method and is a valid HESA student record entry. The proportion of students from xxxx uplift areas for 2010-11 was 15%. This is above the equivalent HESA widening participation benchmark of 12% students from low participation neighbourhoods. Student Retention and Success Student retention has been a significant area of focus for the College in recent years. For many of the priority groups the transition into higher education can be a daunting experience. The central student support services unit, ‘The Core’ has been developed to provide extensive additional academic and pastoral support for students, including the provision of a student finance advisor to provide additional IAG on financial help available for students from low income households. Key additional initiatives that will be introduced or improved for 2...
AutoNDA by SimpleDocs
Additional access measures Outreach. The University’s existing commitments to outreach and fair access have been, and continue to be, considerable. Bath’s programme of outreach activity includes expert information and advice to schools, colleges, parents and advisors on student finance issues and support for potential students in making an informed choice and a successful application, including adults taking Access courses and those following vocational courses at Level 3. Bath has also developed innovative approaches to curriculum enrichment supporting schools and colleges in raising attainment, to enable local students from state schools to reach their full academic potential. Under the framework of our 2016-17 Access Agreement we will build on and develop this work. We will extend our outreach activities to post-16 students in selected schools and colleges outside the local area, developing a programme of activity accessible for prospective students further afield such as residential summer schools, outreach visits and online interventions. While our targets are based on the HESA Performance Indicators of Socio-Economic Class, Low Participation Neighbourhood and State Schools we recognise the complexity of the intersections between class, ethnicity, gender, age and disability. All our outreach work aims to be inclusive and we also work with targeted groups where that is more effective, for example: mature students; those with vocational qualifications; care leavers; those from certain black and minority ethnic groups; students with disabilities; males or females under- represented in certain subject areas. There are five strands to Bath’s outreach and access strategy: • targeting of under-represented groups as part of admissions; • an extended core institutional outreach programme; • re-focused Information Advice and Guidance provision; • new collaborative outreach projects; • an increased focus on successful transition to provide a firm foundation for student success.
Additional access measures Outreach. The University’s existing commitments to outreach and fair access have been, and continue to be, considerable. Bath’s programme of outreach activity includes expert information and advice to schools, colleges, parents and advisors on student finance issues and support for potential students in making an informed choice and a successful application, including adults taking Access courses and those following vocational courses at Level 3. Bath has also developed innovative approaches to curriculum enrichment supporting schools and colleges in raising attainment, to enable local students from state schools to reach their full academic potential. Under the framework of our 2014-15 Access Agreement we will build on and significantly enhance this work. While our targets are based on the HESA Performance Indicators of Socio-Economic Class, Low Participation Neighbourhood and State Schools we recognise the complexity of the intersections between class, ethnicity, gender, age and disability. All our outreach work aims to be inclusive and we also work with targeted groups where that is more effective, for example: mature students; those with vocational qualifications; care leavers; those from certain black and minority ethnic groups; students with disabilities; males or females under- represented in certain subject areas. There are four strands to Bath’s outreach and access strategy: • targeting of under-represented groups as part of admissions; • an extended core institutional outreach programme; • re-focused Information Advice and Guidance provision; • new collaborative outreach projects.

Related to Additional access measures Outreach

  • Additional Acceptable Uses of Student Data Contractor is prohibited from using Student Data for any secondary use not described in this agreement except:

  • Additional Access Rights For the avoidance of doubt any grant of Access Rights not covered by the Grant Agreement or this Consortium Agreement shall be at the absolute discretion of the owning Party and subject to such terms and conditions as may be agreed between the owning and receiving Parties.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage. Measures: • As part of the SAP Security Policy, Personal Data requires at least the same protection level as “confidential” information according to the SAP Information Classification standard. • Access to Personal Data is granted on a need-to-know basis. Personnel have access to the information that they require in order to fulfill their duty. SAP uses authorization concepts that document grant processes and assigned roles per account (user ID). All Customer Data is protected in accordance with the SAP Security Policy. • All production servers are operated in the Data Centers or in secure server rooms. Security measures that protect applications processing Personal Data are regularly checked. To this end, SAP conducts internal and external security checks and penetration tests on its IT systems. • SAP does not allow the installation of software that has not been approved by SAP. • An SAP security standard governs how data and data carriers are deleted or destroyed once they are no longer required.

  • Benchmarks for Measuring Accessibility For the purposes of this Agreement, the accessibility of online content and functionality will be measured according to the W3C’s Web Content Accessibility Guidelines (WCAG) 2.0 Level AA and the Web Accessibility Initiative Accessible Rich Internet Applications Suite (WAI-ARIA) 1.0 for web content, which are incorporated by reference. Adherence to these accessible technology standards is one way to ensure compliance with the College’s underlying legal obligations to ensure that people with disabilities are able to acquire the same information, engage in the same interactions, and enjoy the same benefits and services within the same timeframe as their nondisabled peers, with substantially equivalent ease of use; that they are not excluded from participation in, denied the benefits of, or otherwise subjected to discrimination in any College programs, services, and activities delivered online, as required by Section 504 and the ADA and their implementing regulations; and that they receive effective communication of the College’s programs, services, and activities delivered online.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • Data Access Access to Contract and State Data The Contractor shall provide to the Client Agency access to any data, as defined in Conn. Gen Stat. Sec. 4e-1, concerning the Contract and the Client Agency that are in the possession or control of the Contractor upon demand and shall provide the data to the Client Agency in a format prescribed by the Client Agency and the State Auditors of Public Accounts at no additional cost.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

  • Global Access Transport Charges (U S. Bridged): Per-minute per-bridge port usage charges, based on availability of service, zone and origination access type. Bridging charges are additional and are priced at Customer's applicable Toll Meet Meet-Me Access rate per minute. Freephone (IFN) Transport Zone A – G. Discounts:

  • Network Access TENANT may find it necessary to purchase a network interface card, wireless PC card or other hardware in order to connect to the internet service. LANDLORD is not responsible for the purchase of these items and LANDLORD cannot guarantee compatibility with any device TENANT may have. The computer and network card must have software installed that supports the Internet Protocol commonly referred to as TCP/IP. Any conflicts between the software compatibility of the network and the TENANT’S computer operating system or any other feature will be the responsibility of the TENANT to resolve. LANDLORD will not be responsible for software issues related to the user’s personal computer.

  • Exceptional Access to Thick Registration Data In case of a registrar failure, deaccreditation, court order, etc. that prompts the temporary or definitive transfer of its domain names to another registrar, at the request of ICANN, Registry Operator will provide ICANN with up-­‐to-­‐date data for the domain names of the losing registrar. The data will be provided in the format specified in Specification 2 for Data Escrow. The file will only contain data related to the domain names of the losing registrar. Registry Operator will provide the data as soon as commercially practicable, but in no event later than five (5) calendar days following ICANN’s request. Unless otherwise agreed by Registry Operator and ICANN, the file will be made available for download by ICANN in the same manner as the data specified in Section 3.1 of this Specification.

Time is Money Join Law Insider Premium to draft better contracts faster.