Bringing Your Own Device Sample Clauses

Bringing Your Own Device. When I use personal devices in work, I understand that the same expectations of behaviour apply as if I were using school equipment.
Bringing Your Own Device. (High School Only)
Bringing Your Own Device. Any student who wishes to use a personally owned electronic device within the bounds of the school site must read the Acceptable Use Policy and sign this agreement as well as gaining a parental signature. Submissions will be dated and scanned as a record of acceptance. The student takes full responsibility for his or her device and keeps it with himself or herself at all times or locked away. Whilst Shrewsbury High School provides lockable lockers, it is not responsible for the security of the device The student is responsible for the proper care of their personal device, including any costs of repair, replacement or any modifications needed to use the device at school. Shrewsbury High School reserves the right to inspect a student’s personal device if there is reason to believe that the student has violated School policies, Acceptable Use Policy, administrative procedures, school rules or has engaged in other misconduct while using their personal device Violations of any school policies, administrative procedures or school rules involving a student’s personally owned device may result in the loss of use of the device in school and/or disciplinary Action The student complies with teachers’ request to shut down the computer or close the screen or put the device away Personal devices shall be charged prior to bringing it to school and shall be capable of running off its own battery while at school. The student may not use the devices to record, transmit or post photos or video of a person or persons on campus unless directed to do so and under supervision from a teacher. Nor can any images or video recorded at school be transmitted or posted at any time without the express permission of a teacher. The student should only use their device to access relevant files, programs and/or applications. The student will use the assigned wireless network. Use of 3G & 4G wireless connections is not allowed. I will ensure that my online activity, use of mobile technology, and my use of social media applications, both in school or outside school, will not cause my school, the staff, students, or others distress, or bring the school into disrepute I understand that whilst in school GDST provided Wi-Fi is filtered and device use is monitored. I also understand that all school-owned devices used outside of school may be subject to filtering and monitoring, and should be used as if I am in school. I will only use my personal devices (mobile phones, Windows 10 laptops etc.) in ...
Bringing Your Own Device. When I use personal devices in work, I understand that the same expectations of behaviour apply as if I were using school equipment. I understand that if I fail to comply with this Acceptable Use Agreement, I may have my ICT access suspended and/or be subject to disciplinary action. A copy of this agreement is available upon request and is available within Ark Net. I understand a copy of this signed document will be placed on my personal file. I have read and understand the above: Staff Name Signed Date Appendix 1: Ways in Which the Academy supports with Acceptable Use of IT • Age-appropriate assemblies and parent workshops for primaries o Online gaming o Social media apps o Who are “friends” o When does grooming begin o What does grooming look like o Bullying o Red flags such as personal questions or threats o Reporting processes • External presentations to community groups such as Cadets / Scouts o Online reputation o Impact of hate and bullying o Mental health o What employers look at o Red flags such as way too many friends / followers • Secondary assemblies by year group o Bullying o Privacy o Reputation o Hate • Parent workshops to support their child o What apps children use o What they get up to o How they bend the rules o The dangers of misuse o How parents and children can help themselves o How to report o Always talk to us for support and advice Appendix 2 Safeguarding with Senso Table of Contents Author 3 Owner 3 Version 3 Change History 3 Revised By 3 Date 3
Bringing Your Own Device. Students, without signed permission from the Site Director, will not activate, utilize or display electronic communication devices while at the afterschool program. The rules governing the use of technology on school buses will be the same as the rules for the Xxxxxx Teen Center. Exceptions to this policy may only be granted in extraordinary situations involving a student’s health and safety.
Bringing Your Own Device. ● Should your child bring their own device, Torrington Public Schools shall not be held liable to any damage, loss or theft that may occur.
Bringing Your Own Device. Any student who wishes to use a personally owned electronic device within the bounds of the school site must read the Acceptable Use Policy and sign this agreement as well as gaining a parental signature. Submissions will be dated and scanned as a record of acceptance.

Related to Bringing Your Own Device

  • Indemnification for Marketing Materials In addition to the foregoing indemnification, the Fund and the Investment Adviser also, jointly and severally, agree to indemnify and hold harmless each Underwriter, affiliates, directors, officers, employees and agents of each Underwriter, and each person, if any, who controls any Underwriter within the meaning of Section 15 of the 1933 Act or Section 20 of the 1934 Act, against any and all loss, liability, claim, damage and expense described in the indemnity contained in Section 6(a), as limited by the proviso set forth therein, with respect to any sales material.

  • Agreement to Provide Shareholder Information 1. Each Intermediary agrees to provide the Fund, upon written request, the following shareholder information with respect to Covered Transactions involving the Funds: a. The taxpayer identification number (“TIN”) or any other government issued identifier, if known, that would provide acceptable assurances of the identity of each shareholder that has purchased, redeemed, transferred or exchanged shares of a Fund through an account directly maintained by the Intermediaries during the period covered by the request; b. The amount and dates of, and the Variable Product(s) associated with, such shareholder purchases, redemptions, transfers and exchanges; and c. Any other data mutually agreed upon in writing. 2. Under this Agreement the term “Covered Transactions” are those transactions which the Intermediaries consider when determining whether trading activity is excessive as described in their Excessive Trading Policy. 3. Requests to provide shareholder information shall set forth the specific period for which transaction information is sought. However, unless otherwise agreed to by the Intermediaries, any such request will not cover a period of more than 90 consecutive calendar days from the date of the request. 4. Each Intermediary agrees to provide the requested shareholder information promptly upon receipt of the request, but in no event later than 15 business days after receipt of such request, provided that such information resides in its books and records. If shareholder information is not on the Intermediary’s books and records, the Intermediary agrees to use reasonable efforts to obtain and transmit or have transmitted the requested information from the holder of the account.

  • Securities Activities A. Neither Company nor any of its Subsidiaries is engaged principally, or as one of its important activities, in the business of extending credit for the purpose of purchasing or carrying any Margin Stock. B. Following application of the proceeds of each Loan, not more than 25% of the value of the assets (either of Company only or of Company and its Subsidiaries on a consolidated basis) subject to the provisions of subsection 7.2 or 7.7 or subject to any restriction contained in any agreement or instrument, between Company and any Lender or any Affiliate of any Lender, relating to Indebtedness and within the scope of subsection 8.2, will be Margin Stock.

  • Handling Sensitive Personal Information and Breach Notification A. As part of its contract with HHSC Contractor may receive or create sensitive personal information, as section 521.002 of the Business and Commerce Code defines that phrase. Contractor must use appropriate safeguards to protect this sensitive personal information. These safeguards must include maintaining the sensitive personal information in a form that is unusable, unreadable, or indecipherable to unauthorized persons. Contractor may consult the “Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals” issued by the U.S. Department of Health and Human Services to determine ways to meet this standard. B. Contractor must notify HHSC of any confirmed or suspected unauthorized acquisition, access, use or disclosure of sensitive personal information related to this Contract, including any breach of system security, as section 521.053 of the Business and Commerce Code defines that phrase. Contractor must submit a written report to HHSC as soon as possible but no later than 10 business days after discovering the unauthorized acquisition, access, use or disclosure. The written report must identify everyone whose sensitive personal information has been or is reasonably believed to have been compromised. C. Contractor must either disclose the unauthorized acquisition, access, use or disclosure to everyone whose sensitive personal information has been or is reasonably believed to have been compromised or pay the expenses associated with HHSC doing the disclosure if: 1. Contractor experiences a breach of system security involving information owned by HHSC for which disclosure or notification is required under section 521.053 of the Business and Commerce Code; or 2. Contractor experiences a breach of unsecured protected health information, as 45 C.F.R. §164.402 defines that phrase, and HHSC becomes responsible for doing the notification required by 45 C.F.R. §164.404. HHSC may, at its discretion, waive Contractor's payment of expenses associated with HHSC doing the disclosure.

  • Confidentiality and Disclosure of Offering Materials by Potential Investor Potential Investor acknowledges on behalf of itself and any and all Related Parties that the Offering Materials are considered confidential and proprietary information of Owner and/or JLL, and Potential Investor will not make (or cause or permit any Related Party to make) any Offering Materials available, or disclose any of the contents thereof, to any person without Owner’s or JLL’s prior written consent; provided, however, that the Offering Materials may be disclosed to the Potential Investor’s Representative (if any), the Potential Investor's partners, employees, legal counsel, advisors, institutional lenders and other capital sources (collectively the "Related Parties") as reasonably required for an evaluation of the Property. Such Related Parties shall be informed by Potential Investor of the confidential nature of the Offering Materials and the terms of this Agreement and shall be directed by Potential Investor to keep the Offering Materials and related information strictly confidential in accordance with this Agreement and to otherwise abide by the terms of this Agreement as if such party was the Potential Investor hereunder. In the event any Related Party shall take or omit to take any action which if taken or omitted to be taken by Potential Investor would constitute a breach of or a default under the terms hereof, the such act or omission by such Related Party shall be deemed to be a breach of the terms hereof by Potential Investor.

  • Confidential Information Breach This shall mean, generally, an instance where an unauthorized person or entity accesses Confidential Information in any manner, including but not limited to the following occurrences: (1) any Confidential Information that is not encrypted or protected is misplaced, lost, stolen or in any way compromised; (2)one or more third parties have had access to or taken control or possession of any Confidential Information that is not encrypted or protected without prior written authorization from the State; (3) the unauthorized acquisition of encrypted or protected Confidential Information together with the confidential process or key that is capable of compromising the integrity of the Confidential Information; or (4) if there is a substantial risk of identity theft or fraud to the Client Agency, the Contractor, DAS or State.

  • INITIAL INFORMATION § 1.1 This Agreement is based on the Initial Information set forth in this Section 1.1. § 1.1.1 The Owner’s program for the Project:

  • Confidential Information Noncompetition and Cooperation The terms of the Employee Non-Competition, Non-Solicitation, Confidentiality and Assignment Agreement (the “Restrictive Covenant Agreement”), between the Company and the Employee, attached hereto as Exhibit A, shall continue to be in full force and effect and are incorporated by reference in this Agreement. The Employee hereby reaffirms the terms of the Restrictive Covenant Agreement as material terms of this Agreement.

  • Shareholder Information Within five days after receipt of a request from the Company, the Subscriber hereby agrees to provide such information with respect to its status as a shareholder (or potential shareholder) and to execute and deliver such documents as may reasonably be necessary to comply with any and all laws and regulations to which the Company is or may become subject. Subscriber further agrees that in the event it transfers any Securities, it will require the transferee of such Securities to agree to provide such information to the Company as a condition of such transfer.

  • Shareholder Information Services (i) Make information available to shareholder servicing unit and other remote access units regarding trade date, share price, current holdings, yields, and dividend information. (ii) Produce detailed history of transactions through duplicate or special order statements upon request. (iii) Provide mailing labels for distribution of financial reports, prospectuses, proxy statements or marketing material to current shareholders. (iv) Respond as appropriate to all inquiries and communications from shareholders relating to shareholder accounts.