Company Computers; Mobile Phone; Privacy Sample Clauses

Company Computers; Mobile Phone; Privacy. 6.1. For the performance of the Employee’s duties, the Company may allow the Employee to use the Company’s computer equipment and systems, including any desktop computer, laptop, software, hardware, Internet server and professional e-mail account (the “Computers”). The Employee acknowledges and agrees that the Company may allow others to use the Computers. 6.2. Subject to the Company’s policies as may be in effect from time to time, the Employee: (i) shall not store personal files on the Computers (except on folders clearly labeled by the Employee as “Personal”); and (ii) the Employee may not store the Company’s files on personal or external storage space. 6.3. The e-mail account assigned to the Employee is strictly a professional one and shall be strictly used for professional matters. For personal matters the Employee may use external email services (such as Gmail). 6.4. The Employee acknowledges and agrees that in order to maintain the security of the Computers and to protect the Company’s legitimate interests, the Company shall have the right to monitor, inspect and review the Employee’s activity on the Computers, including usage habits and content transmission, and to collect, copy, transfer and review content stored on the Computers, including, emails, electronic communications, documents and other files, all findings of which shall be admissible as evidence in any legal proceedings. In light of the Employee’s understanding of the above, the Employee shall have no right to privacy in any content of the Computers, except with respect to folders which contain private information and which are clearly labeled by the Employee as “Personal”.
AutoNDA by SimpleDocs
Company Computers; Mobile Phone; Privacy. 5.1. For the performance of the Executive’s duties, the Company may allow the Executive to use the Company’s computer equipment and systems, including any desktop computer, laptop, software, hardware, Internet server and professional e-mail account (the “Computers”). 5.2. Subject to the Company’s policies as may be in effect from time to time, the Executive: (i) shall not store personal files on the Computers (except on folders clearly labeled by the Executive as “Personal”); and (ii) the Executive may not store the Company’s files on personal or external storage space. 5.3. The e-mail account assigned to the Executive is strictly a professional one and shall be strictly used for professional matters. For personal matters the Executive may use external email services (such as Gmail). 5.4. The Executive acknowledges and agrees that in order to maintain the security of the Computers and to protect the Company’s legitimate interests, the Company shall have the right to monitor, inspect and review the Executive’s activity on the Computers, including usage habits and content transmission, and to collect, copy, transfer and review content stored on the Computers, including, emails, electronic communications, documents and other files, all findings of which shall be admissible as evidence in any legal proceedings, all subject to applicable law. In light of the Executive’s understanding of the above, the Executive shall have no right to privacy in any content of the Computers, except with respect to folders which contain private information and which are clearly labeled by the Executive as “Personal”. 5.5. Sections 5.2-5.4 above shall apply also with respect to mobile phone provided to the Executive by the Company (if provided) and the Executive’s personal mobile phone when used for the purpose of fulfilling the Executive’s work, with respect to unique professional apps, professional WhatsApp groups or other professional media or messaging groups and the Executive’s professional e-mail account. 5.6. The Executive acknowledges and agrees that during the course of the Executive’s employment by the Company, the Company shall collect, receive and make use of certain personal information related to the Executive (such as Executive’s contact details, family status, salary, bank account-related information, etc.) (the “Information”).
Company Computers; Mobile Phone; Privacy. For the performance of Executive’s duties, the Company may provide Executive with a PC, laptop, software, hardware, email address and/or mobile phone, as applicable (the “Company’s Computers”), which will be the sole property of the Company. Subject to the Company’s applicable policies and without derogating from Executive’s undertakings or performance of his duties according to this Agreement, the Executive may be entitled to make reasonable personal use of the Company’s Computers. It is clarified that the professional email account is intended to be used for professional matters, whereas for personal matters the Executive may use external email services (such as Gmail).

Related to Company Computers; Mobile Phone; Privacy

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • Internet Use Customer assumes total responsibility for its and its users’ use of the Internet. Masergy specifically disclaims any warranties, endorsements or representations regarding any merchandise, information, software, products, data, files, or services provided through the Internet.

  • COMPUTER GRAPHICS FILES The Engineer agrees to comply with Attachment G, Computer Graphics Files for Document and Information Exchange, if determined by the State to be applicable to this contract.

  • Computers All computers, hardware, software, computer upgrades and maintenance in connection therewith shall be at Owner's expense.

  • Computer Software The Grantee certifies that it has appropriate systems and controls in place to ensure that state funds will not be used in the performance of this Grant Agreement for the acquisition, operation, or maintenance of computer software in violation of copyright laws.

  • Device Data We may share certain personal information and device-identifying technical data about you and your devices with third party service providers, who will compare and add device data and fraud data from and about you to a database of similar device and fraud information in order to provide fraud management and prevention services, which include but are not limited to identifying and blocking access to the applicable service or Web site by devices associated with fraudulent or abusive activity. Such information may be used by us and our third party service providers to provide similar fraud management and prevention services for services or Web sites not provided by us. We will not share with service providers any information that personally identifies the user of the applicable device.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • COMMERCIAL COMPUTER SOFTWARE If performance involves acquisition of existing computer software, the following Company Exhibit is incorporated by reference: CCS Commercial Computer Software License (Company – July 2010).

  • Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!