Behaviors And Consequences Sample Clauses

Behaviors And Consequences. Appropriate Codes of Conduct and Disciplinary Measures are outlined in the school handbook for students, and in the faculty handbook for faculty and staff. • Tampering with computer security systems and/or applications and/or documents and/or equipment will be considered vandalism, destruction, and defacement of school property. Please be advised, it is a federal offense (Felony) to break into any security systems. Financial and legal consequences of such actions are the responsibility of the user (staff, volunteer, student) and student's parent or guardian. • Any student or employee to attempts to bypass the school security services will face disciplinary consequences. • Vandalism will result in cancellation of privileges, disciplinary action and restitution for costs associated with hardware, software, and system restoration. Vandalism is defined as any malicious attempt to harm or destroy data of another user, the Internet, hardware, software or the network. This includes, but is not limited to, the uploading or creating of computer viruses. • In the event that there is a claim that a student user has violated any of the Acceptable Use Agreement, she/he will be provided with written notice of the suspected violation and given an opportunity to be heard by the school administrator.
AutoNDA by SimpleDocs
Behaviors And Consequences. Appropriate Codes of Conduct and Disciplinary Measures are outlined in the school handbook for students, and in the faculty handbook for faculty and staff. The school administration reserves the right to administer appropriate consequences for inappropriate technology use, access and behavior. • Tampering with computer security systems and/or applications and/or documents and/or equipment will be considered vandalism, destruction, and defacement of school property. Please be advised, it is a federal offense (Felony) to break into any security systems. Financial and legal consequences of such actions are the responsibility of the user (staff, volunteer, student) and student's parent or guardian. • Any student or employee to attempts to bypass the school security services will face disciplinary consequences. • Any student or employee using another person’s credentials to access applications or the network (whether or not the person knows/approves) will face disciplinary action. NEVER USE ANOTHER PERSON’S CREDENTIALS. Ever. Seek supervisor assistance if needed. • Vandalism will result in cancellation of privileges, disciplinary action and restitution for costs associated with hardware, software, and system restoration. Vandalism is defined as any malicious attempt to harm or destroy data of another user, the Internet, hardware, software or the network. This includes, but is not limited to, the uploading or creating of computer viruses. • In the event that there is a claim that a student user has violated any of the Acceptable Use Agreement, she/he will be provided with written notice of the suspected violation and given an opportunity to be heard by the school administrator. • In the event that there is a claim that an employee user has violated any of the Acceptable Use Agreement, she/he will be provided with written notice of the suspected violation and given an opportunity to be heard by the school administrator.
Behaviors And Consequences. Appropriate Codes of Conduct and Disciplinary Measures are outlined in the school handbook for students, and in the faculty handbook for faculty and staff.  Tampering with computer security systems and/or applications and/or documents and/or equipment will be considered vandalism, destruction, and defacement of school property. Please be advised, it is a federal offense (Felony) to break into any security systems. Financial and legal consequences of such actions are the responsibility of the user (staff, volunteer, student) and student's parent or guardian.  Vandalism will result in cancellation of privileges, disciplinary action and restitution for costs associated with hardware, software, and system restoration. Vandalism is defined as any malicious attempt to harm or destroy data of another user, the Internet, hardware, software or the network. This includes, but is not limited to, the uploading or creating of computer viruses.  In the event that there is a claim that a student user has violated any of the Acceptable Use Agreement, she/he will be provided with written notice of the suspected violation and given an opportunity to be heard by the school administrator.

Related to Behaviors And Consequences

  • COMPLIANCE WITH LEGAL OBLIGATIONS Contractor shall procure and maintain for the duration of this Contract any state, county, city or federal license, authorization, waiver, permit, qualification or certification required by statute, ordinance, law, or regulation to be held by Contractor to provide the goods or services required by this Contract. Contractor will be responsible to pay all taxes, assessments, fees, premiums, permits, and licenses required by law. Real property and personal property taxes are the responsibility of Contractor in accordance with NRS 361.157 and 361.159. Contractor agrees to be responsible for payment of any such government obligations not paid by its subcontractors during performance of this Contract.

  • WARRANTY OF CONTRACTOR’S ABILITY TO PERFORM The Contractor warrants that, to the best of its knowledge, there is no pending or threatened action, proceeding, or investigation, or any other legal or financial condition, that would in any way prohibit, restrain, or diminish the Contractor’s ability to satisfy its Contract obligations. The Contractor warrants that neither it nor any affiliate is currently on the Suspended Vendor List, Convicted Vendor List, or the Discriminatory Vendor List, or on any similar list maintained by any other state or the federal government. The Contractor shall immediately notify the Department in writing if its ability to perform is compromised in any manner during the term of the Contract. Information Technology Staff Augmentation Services Contract No. 80101507-21-STC-ITSA Contract Exhibit F Resume Self-Certification Form Contractor’s candidates shall complete this Resume Self-Certification Form. Completed Resume Self-Certification Forms shall be submitted within the Contractor’s response to Customer’s requests for quote. “I the undersigned do hereby certify, under the penalty of perjury, that information in my resume submitted for consideration of the State of Florida contract position is true, correct, complete, and made in good faith to the best of my knowledge and belief. If an omission, falsification, misstatement, or misrepresentation has been made regarding my education, work ability, experience, employment history, and/or fitness for employment as a contractor, I may be disqualified as a contractor, and the matter will be reported to appropriate agency or law enforcement personnel. I understand that there may be civil and/or criminal penalties for misrepresenting pertinent information in connection with contract positions, including, but not limited to, penalties available under sections 287.133 or 817.566, Florida Statutes. I further understand that if I am not a United States citizen, violation cases may be reported to the US Department of Homeland Security for potential deportation.” “In addition, I the undersigned do hereby consent to the release of my information by employers, educational institutions, law enforcement agencies, and other individuals and organizations to investigators and other authorized agents of Florida for verification and investigation purposes. I understand that any documents submitted to procure a contract(s) with the State of Florida, including resumes, are public records.” Print Full Legal Name of Candidate Candidate’s Signature Date Candidate’s Form of Identification Presented Identification number Contractor’s Witness Signature One Date Contractor’s Witness Signature Two Date Print Name Contractor’s Witness One Print Name Contractor’s Witness Two Information Technology Staff Augmentation Services Contract No. 80101507-21-STC-ITSA Contract Exhibit G Contractor Selection Justification Form Customers shall complete this Contractor Selection Justification Form for each candidate selected and attach all completed forms to the purchase order. Date: Contractor’s Name: _ Contractor’s Contact Information: Candidate’s Name: Address: _ Phone: _ Email: _ Date Candidate will be available: _ Hourly rate of candidate: $ Position candidate recommended for: _ Justification for selection of candidate: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ Agency: Division/Section/Unit: _ Printed Name: _ Title: _ Signature _ Date: Information Technology Staff Augmentation Services Contract No. 80101507-21-STC-ITSA Contract Exhibit H Contractor Performance Survey Note: This is an example of the questions contained in the Contractor Performance Survey. The actual survey will be provided in electronic form. Customers shall complete this Contractor Performance Survey for each Contractor on a quarterly basis. Customers will electronically submit the completed Contractor Performance Survey(s) to the Department Contract Manager no later than the due date indicated the Scope of Work. Contractor's Name: Quarter: Purchase Order (PO) Number: PO Total $ Amount: PO Starting Date Ending Date Please review the attached Rating Definitions and provide your opinion by rating the following: Quality of Service

  • Restrictions on Use of the Service You agree to comply with Viasat’s Acceptable Use Policy, Data Allowance Policy, Bandwidth Usage Policy, Unlimited Data Policy and Email End User License Agreement applicable to your service located at xxx.xxxxx.xxx/xxxxx and xxx.xxxxxx.xxx/xxxxx, all of which are incorporated into and made a part of this Agreement. Viasat reserves the right to immediately terminate the Service and this Agreement if you knowingly or otherwise engage in any prohibited activity. You do not own or have any rights (other than those expressly granted to you) to a particular IP address, even if you are utilizing a static IP address.

  • Information and Services Required of the Owner § 3.1.1 The Owner shall provide information with reasonable promptness, regarding requirements for and limitations on the Project, including a written program which shall set forth the Owner’s objectives, constraints, and criteria, including schedule, space requirements and relationships, flexibility and expandability, special equipment, systems, sustainability and site requirements.

  • Safeguarding and Protecting Children and Vulnerable Adults The Supplier will comply with all applicable legislation and codes of practice, including, where applicable, all legislation and statutory guidance relevant to the safeguarding and protection of children and vulnerable adults and with the British Council’s Child Protection Policy, as notified to the Supplier and amended from time to time, which the Supplier acknowledges may include submitting to a check by the UK Disclosure & Barring Service (DBS) or the equivalent local service; in addition, the Supplier will ensure that, where it engages any other party to supply any of the Services under this Agreement, that that party will also comply with the same requirements as if they were a party to this Agreement.

  • Business Associate’s Subcontractors and Agents BA shall ensure that any agents and subcontractors that create, receive, maintain or transmit Protected Information on behalf of BA, agree in writing to the same restrictions and conditions that apply to BA with respect to such Protected Information and implement the safeguards required by paragraph 3.4 above with respect to Electronic PHI [45 C.F.R. Section 164.504(e)(2)(ii)(D); 45 C.F.R. Section 164.308(b)] BA shall implement and maintain sanctions against agents and subcontractors that violate such restrictions and conditions and shall mitigate the effects of any such violation [45 C.F.R. Sections 164.530(f) and 164.530(e)(1)].

  • LIMITATIONS OF COVERED MEDICAL SERVICES In order to be covered, the Member’s Attending Physician must specifically prescribe such services and such services must be consequent to treatment of the cleft lip or cleft palate.

  • COOPERATION ON FRAUD 25.1. The Parties agree that they shall cooperate with one another to investigate, minimize and take corrective action in cases of fraud. The Parties’ fraud minimization procedures are to be cost effective and implemented so as not to unduly burden or harm one party as compared to the other.

  • SAFEGUARDING CHILDREN AND VULNERABLE ADULTS 8.1 The Service Provider will have ultimate responsibility for the management and control of any Regulated Activity provided under this agreement and for the purposes of the Safeguarding Vulnerable Groups Xxx 0000.

  • Certification Regarding Business with Certain Countries and Organizations Pursuant to Subchapter F, Chapter 2252, Texas Government Code, PROVIDER certifies it is not engaged in business with Iran, Sudan, or a foreign terrorist organization. PROVIDER acknowledges this Purchase Order may be terminated if this certification is or becomes inaccurate.

Time is Money Join Law Insider Premium to draft better contracts faster.