Camera Use Sample Clauses

Camera Use. For security purposes, and in order to protect its students and staff, the Employer utilizes video cameras. The Employer agrees that it will not utilize video cameras for the purpose of monitoring Bargaining Unit Members' protected activities, including union meetings and conversations involving union matters, or to intimidate Bargaining Unit Members. In the event the Employer chooses to install additional video cameras, it will notify Bargaining Unit Members of the location of such cameras.
Camera Use. For security purposes, and in order to protect its students and staff, Namaste utilizes video cameras. Xxxxxxx agrees that it will not utilize video cameras for the purpose of monitoring Bargaining Unit Members' protected activities, including union meetings and conversations involving union matters, or to intimidate Bargaining Unit Members. In the event Namaste chooses to install additional video cameras, it will notify Bargaining Unit Members of the location of such cameras.
Camera Use. Consider using your camera during discussions. Being able to see each other enables a more personal interaction and allows you to react to eye and body language cues. In larger meetings, each participant’s window will automatically display/hide based on their participation in the meeting. Be sure to turn off your camera if it might be distracting to others. Do not walk around with your camera on (mobile device) – It is also distracting.
Camera Use. Students must remember that some students and staff prefer not to have their photograph taken so permission must always be gained first. If photos are taken without permission students should receive a serious sanction.
Camera Use. 3.601 The Company will not initiate the review of electronic media solely for the purpose of looking for employee misconduct. However, the Company and the Union agree that any recording resulting from video imagery may be used as evidence in an investigation. In the event any recording is used as evidence for purposes of disciplinary action, the Union shall be afforded an opportunity to view the evidence, and if in disagreement with the Company’s decision or action, the Union may utilize the grievance procedure. Furthermore, members shall have the right to review footage of themselves prior to the footage being viewed by a parent or student. The Company agrees to provide the Union with a description and purpose for all new technologies before implementation. (1) The District has existing board policy and administrative regulations (BP/AR 3550.1) regarding video surveillance. (2) The proposal would require the District to seek permission from the Union to use the video footage in an investigation, and if the Union disagreed with its application, the Union would be allowed to file a grievance over the matter. (3) In matters of discipline, unit members are afforded due process and will have an opportunity to view all applicable relevant evidence, including video, prior to disciplinary action. (4) The Public Records Act (PRA) and the Family Educational Rights Privacy Act (FERPA) have been considered related to this proposal. ATU’s proposal could result in legal conflicts related to compliance with the PRA generally, and to FERPA related student records responses and other related student privacy issues. (5) Investigations involving or conducted by law enforcement might also create conflicts with the proposed language.

Related to Camera Use

  • Data Use Each party may use Connected Account Data in accordance with this Agreement and the consent (if any) each obtains from each Connected Account. This consent includes, as to Stripe, consent it receives via the Connected Account Agreement.

  • Cameras 3.2 NSP items may only be acquired through the Contractor or their Authorized Dealer and must be reported quarterly with all other sales under the Master Agreement. 3.3 NSP items must be priced at a minimum discount of 15% from MSRP or List Price. 3.4 NSP items may be offered to a Purchasing Entity as a stand-alone option, and the maximum allowable amount of all NSP items in a single Order shall be determined by the Participating State or Entity. 3.5 It shall be at the discretion of the Participating State or Entity to allow Open Market Items in their Participating Addendum.

  • Cell Phones The College follows the State’s Cell Phone Policy. Employees who receive cell phones from the College shall also abide by this Policy. The College shall provide the Policy to any employee who is given a cell phone. Employees are responsible for the cost of all personal calls. While the College anticipates some incidental personal use of cell phones, it is also expected that such use is infrequent.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • License; Use Upon delivery to an Authorized Person or a person reasonably believed by Custodian to be an Authorized Person of the Fund of software enabling the Fund to obtain access to the System (the “Software”), Custodian grants to the Fund a personal, nontransferable and nonexclusive license to use the Software solely for the purpose of transmitting Written Instructions, receiving reports, making inquiries or otherwise communicating with Custodian in connection with the Account(s). The Fund shall use the Software solely for its own internal and proper business purposes and not in the operation of a service bureau. Except as set forth herein, no license or right of any kind is granted to the Fund with respect to the Software. The Fund acknowledges that Custodian and its suppliers retain and have title and exclusive proprietary rights to the Software, including any trade secrets or other ideas, concepts, know-how, methodologies, or information incorporated therein and the exclusive rights to any copyrights, trademarks and patents (including registrations and applications for registration of either), or other statutory or legal protections available in respect thereof. The Fund further acknowledges that all or a part of the Software may be copyrighted or trademarked (or a registration or claim made therefor) by Custodian or its suppliers. The Fund shall not take any action with respect tot the Software inconsistent with the foregoing acknowledgement, nor shall the Fund attempt to decompile, reverse engineer or modify the Software. The Fund may not xxx, sell, lease or provide, directly or indirectly, any of the Software of any portion thereof to any other person or entity without Custodian’s prior written consent. The Fund may not remove any statutory copyright notice or other notice included in the Software or on any media containing the Software. The Fund shall reproduce any such notice on any reproduction of the Software and shall add any statutory copyright notice or other notice to the Software or media upon Custodian’s request.

  • Cloud storage DSHS Confidential Information requires protections equal to or greater than those specified elsewhere within this exhibit. Cloud storage of Data is problematic as neither DSHS nor the Contractor has control of the environment in which the Data is stored. For this reason: (1) DSHS Data will not be stored in any consumer grade Cloud solution, unless all of the following conditions are met: (a) Contractor has written procedures in place governing use of the Cloud storage and Contractor attests in writing that all such procedures will be uniformly followed. (b) The Data will be Encrypted while within the Contractor network. (c) The Data will remain Encrypted during transmission to the Cloud. (d) The Data will remain Encrypted at all times while residing within the Cloud storage solution. (e) The Contractor will possess a decryption key for the Data, and the decryption key will be possessed only by the Contractor and/or DSHS. (f) The Data will not be downloaded to non-authorized systems, meaning systems that are not on either the DSHS or Contractor networks. (g) The Data will not be decrypted until downloaded onto a computer within the control of an Authorized User and within either the DSHS or Contractor’s network. (2) Data will not be stored on an Enterprise Cloud storage solution unless either: (a) The Cloud storage provider is treated as any other Sub-Contractor, and agrees in writing to all of the requirements within this exhibit; or, (b) The Cloud storage solution used is FedRAMP certified. (3) If the Data includes protected health information covered by the Health Insurance Portability and Accountability Act (HIPAA), the Cloud provider must sign a Business Associate Agreement prior to Data being stored in their Cloud solution.

  • Internet Use Customer assumes total responsibility for its and its users’ use of the Internet. Masergy specifically disclaims any warranties, endorsements or representations regarding any merchandise, information, software, products, data, files, or services provided through the Internet.

  • Porcupine Site Highway 11 and the City of Timmins Thunder Bay and District Toronto/York-Peel

  • Master Use The Licensor hereby grants to Licensee a non-exclusive license (this "License) to record vocal synchronization to the Composition partly or in its entirety and substantially in its original form ("Master Recording")

  • Data Mining 4.1. Provider agrees not to use GLO Data for unrelated commercial purposes, advertising or advertising-related services, or for any other purpose not explicitly authorized by the GLO in this Contract or any document related thereto. 4.2. Provider agrees to take all reasonably feasible physical, technical, administrative, and procedural measures to ensure that no unauthorized use of GLO Data occurs.