Bring Your Own Device and use of personal devices Sample Clauses

Bring Your Own Device and use of personal devices. Staff using either their own or a school device must have a password or device lock so that unauthorised people cannot access the content. Staff are permitted to use mobile phones during the school day within the rules outlined in the Child Protection (Safeguarding) Policy and the Staff Behaviour Policy. The Senior School encourages students to ‘Bring Your Own Device (BYOD)’ and students are encouraged to use their own devices as appropriate in lessons, recognising that BYOD is becoming an increasingly accepted way to access ICT services inside and outside the classroom. The School supports users of BYOD by means of a school-wide Wi-Fi network; information systems including Firefly, the VLE, which is designed to operate on a range of devices; and appropriate filtering and blocking access to content deemed inappropriate to the setting. Pupils bringing their own devices into the Junior School must abide by the terms of the Policy on the use of personal electronic devices [see Appendix]. There are additional rules to those in the ICT Acceptable Use Policy for students using their own devices. When a personal device is used as a work tool to access the school systems and/or its data, the usual responsibilities apply.. The school reserves the right to prevent access to the network by any device that is considered a risk. All staff and students using BYOD are required to conform to expected standards of online behaviour and not download or transmit any material which might be harmful or offensive to any School student or member of staff or bring the School into disrepute. Any breach of this protocol will be treated as a serious disciplinary matter. See Child Protection and Safeguarding Policy, Staff Behaviour Policy, Anti-bullying and Anti-Cyber- bullying Policies for further details on use of Social Media. The School will seek to manage, by filtering the risks to students from BYOD, of:  accessing inappropriate web content;  hosting of inappropriate services on student–owned devices via the school network All BYOD users should refer to the School’s ICT Acceptable Use (Computer Network Agreement) Policy and note the following additional rules and requirements relating to BYOD use:  the user is responsible for the safe keeping, maintenance and insurance of the device at all times;  all BYOD devices brought into the school must only be connected to the wireless network as instructed.  users must keep their device’s software up to date and ensure that no conte...
AutoNDA by SimpleDocs

Related to Bring Your Own Device and use of personal devices

  • Use of Personal Data By executing this Stock Agreement, Participant acknowledges and agrees to the collection, use, processing and transfer of certain personal data, including his or her name, salary, nationality, job title, position and details of all past Awards and current Awards outstanding under the Plan (“Data”), for the purpose of managing and administering the Plan. The Participant is not obliged to consent to such collection, use, processing and transfer of personal data, but a refusal to provide such consent may affect his or her ability to participate in the Plan. The Company, or its Subsidiaries, may transfer Data among themselves or to third parties as necessary for the purpose of implementation, administration and management of the Plan. These various recipients of Data may be located elsewhere throughout the world. The Participant authorizes these various recipients of Data to receive, possess, use, retain and transfer the Data, in electronic or other form, for the purposes of implementing, administering and managing the Plan. The Participant may, at any time, review Data with respect to the Participant and require any necessary amendments to such Data. The Participant may withdraw his or her consent to use Data herein by notifying the Company in writing; however, the Participant understands that by withdrawing his or her consent to use Data, the Participant may affect his or her ability to participate in the Plan.

  • Use of Personal Information 1. Personal Information (Personal Information and Personal Information collating with other information) obtained by DBS by providing the service shall be subject for the privacy policy protecting Member’s Personal Information which will be established separately (hereinafter, “Privacy Policy”) and this “Membership Agreement”. 2. DBS may disclose the Personal Information of the Members to the following third parties. [Personal Information subject to third party disclosure] The Personal Information specified in the “Privacy Policy”, which will be established separately. [Scope of third parties] Insurance companies contracted by DBS to implement the compensation set forth in Article 22, paragraph1, and other companies subject to the scope to specify in the “Privacy Policy” which will be established separately. [Purpose of disclosure to third parties]. The purpose of disclosure in the “Privacy Policy”, which will be established separately. [Party responsible for management of Personal Information] DOCOMO BIKESHARE, INC.

  • Transfer of Personal Information Supplier warrants to DXC that Personal Information provided to Supplier or obtained by Supplier under this Agreement on behalf of DXC (including any SOW) shall not be transferred across national boundaries unless authorized by law or specified within this Agreement or the applicable SOW as authorized for transfer across national boundaries. Supplier agrees that any such transfer will only be made in compliance with applicable Data Privacy Laws. If there is a conflict between this Section ‘Data Protection and Privacy’ and the other provisions of this Agreement, the requirements of this Section shall take precedence.

  • Type of Personal Data Data Subjects may provide the following Shared Personal Data in connection with the purchase of a domain name from a Registrar:

  • Processing of Personal Data 1.1. With regard to the Processing of Personal Data, You are the controller and determine the purposes and means of Processing of Personal Data You provide to Us (“Controller”) and You appoint Us as a processor (“Processor”) to process such Personal Data (hereinafter, “Data”) on Your behalf (hereinafter, “Processing”). 1.2. The details of the type and purpose of Processing are defined in the Exhibits attached hereto. Except where the DPA stipulates obligations beyond the Term of the Agreement, the duration of this DPA shall be the same as the Agreement Term. 1.3. You shall be solely responsible for compliance with Your obligations under the applicable Data Protection Laws, including, but not limited to, the lawful disclosure and transfer of Personal Data to Us by upload of source data into the Cloud Service or otherwise. 1.4. Processing shall include all activities detailed in this Agreement and the instructions issued by You. You may, in writing, modify, amend, or replace such instructions by issuing such further instructions to the point of contact designated by Us. Instructions not foreseen in or covered by the Agreement shall be treated as requests for changes. You shall, without undue delay, confirm in writing any instruction issued orally. Where We believe that an instruction would be in breach of applicable law, We shall notify You of such belief without undue delay. We shall be entitled to suspend performance on such instruction until You confirm or modify such instruction. 1.5. We shall ensure that all personnel involved in Processing of Customer Data and other such persons as may be involved in Processing shall only do so within the scope of the instructions. We shall ensure that any person Processing Customer Data is subject to confidentiality obligations similar to the confidentiality terms of the Agreement. All such confidentiality obligations shall survive the termination or expiration of such Processing.

  • Alcohol and Drug-Free Workplace City reserves the right to deny access to, or require Contractor to remove from, City facilities personnel of any Contractor or subcontractor who City has reasonable grounds to believe has engaged in alcohol abuse or illegal drug activity which in any way impairs City's ability to maintain safe work facilities or to protect the health and well-being of City employees and the general public. City shall have the right of final approval for the entry or re-entry of any such person previously denied access to, or removed from, City facilities. Illegal drug activity means possessing, furnishing, selling, offering, purchasing, using or being under the influence of illegal drugs or other controlled substances for which the individual lacks a valid prescription. Alcohol abuse means possessing, furnishing, selling, offering, or using alcoholic beverages, or being under the influence of alcohol.

  • Use of Personal Vehicles When employees are authorized to use their personal vehicles to transport clients or residents in the care of the State, the State agrees to provide, subject to the rules and regulations of the Comptroller, a supplemental mileage allowance rate of seven cents ($.07) per mile for the use of such personal vehicle.

  • Notification of personal data breach 1. In case of any personal data breach, the data processor shall, without undue delay after having become aware of it, notify the data controller of the personal data breach. 2. The data processor’s notification to the data controller shall, if possible, take place within 24 hours after the data processor has become aware of the personal data breach to enable the data controller to comply with the data controller’s obligation to notify the personal data breach to the competent supervisory authority, cf. Article 33

  • Protection of Personal Information Party agrees to comply with all applicable state and federal statutes to assure protection and security of personal information, or of any personally identifiable information (PII), including the Security Breach Notice Act, 9 V.S.A. § 2435, the Social Security Number Protection Act, 9 V.S.A. § 2440, the Document Safe Destruction Act, 9 V.S.A. § 2445 and 45 CFR 155.260. As used here, PII shall include any information, in any medium, including electronic, which can be used to distinguish or trace an individual’s identity, such as his/her name, social security number, biometric records, etc., either alone or when combined with any other personal or identifiable information that is linked or linkable to a specific person, such as date and place or birth, mother’s maiden name, etc.

  • Use of Personal Vehicle Employees will not be required to use their personal vehicle for Company business.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!