Computer Use and Conduct Standards Sample Clauses

Computer Use and Conduct Standards a. ISNP is committed to compliance with safe use of technology such as computers and the internet, in accordance with the Children’s Internet Protection Act (CIPA). Accordingly, ISPN has developed Computer Use and Conduct Standards. The primary goal of ISNP’s available technology is to enrich the learning that takes place in and out of classrooms. In particular, technology offers opportunities for exploration and analysis for academic subjects in ways that traditional instruction cannot replicate. However, certain legal and ethical restrictions apply.
AutoNDA by SimpleDocs
Computer Use and Conduct Standards. 11.1 ISNP is committed to compliance with safe use of technology such as computers and the internet, in accordance with the Children's Internet protection Act (CIPA). Accordingly, ISNP has developed Computer Use and Conduct Standards. The primary goal of ISNP's available technology is to enrich the learning that takes place in and out of classrooms. In particular, technology offers opportunities for exploration and analysis of academic subjects in ways that traditional instruction cannot replicate. However, certain legal and ethical restrictions apply. The limited supply of both hardware and software requires us to set priorities for use. Academic work for courses always takes priority over any other use of the computer equipment. The following is a list of rules and guidelines which govern the use of ISNP computers and network resources.
Computer Use and Conduct Standards a. SSA staff retains the right to collect and/or inspect the Chromebook at any time, including via electronic remote access; and to alter, add or delete any file such as documents, photographs, videos, etc… and any installations such as software, hardware, widgets, etc…
Computer Use and Conduct Standards a. SSA is committed to compliance with safe use of technology such as computers and the internet, in accordance with the Children's Internet Protection Act (CIPA). Accordingly, SSA has developed Computer Use and Conduct Standards. The primary goal of SSA's available technology is to enrich the learning that takes place in and out of classrooms. In particular, technology offers opportunities for exploration and analysis of academic subjects in ways that traditional instruction cannot replicate. However, certain legal and ethical restrictions apply.

Related to Computer Use and Conduct Standards

  • Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: xxxx://xxx.xxxxxx-xxxxx.xxx/508.htm.

  • SUPPLIER STANDARDS OF CONDUCT Accenture is committed to conducting its business free from unlawful, unethical or fraudulent activity. Supplier will act in a manner consistent with the ethical and professional standards of Accenture as described in the Accenture Supplier Standards of Conduct, including prompt reporting of unlawful, fraudulent or unethical conduct. A copy of these standards can be found at xxxxxxxxx.xxx/xx- en/company-ethics-code.

  • Procurement Standards For projects being managed by the Local Government and on the State highway system or that include state funding, the Local Government must obtain approval from the State for its proposed procurement procedure for the selection of a professional services provider, a contractor for a construction or maintenance project, or a materials provider.

  • General Guidelines 1. Conduct yourself in a responsible manner at all times in the laboratory.

  • Enterprise Information Management Standards Grantee shall conform to HHS standards for data management as described by the policies of the HHS Office of Data, Analytics, and Performance. These include, but are not limited to, standards for documentation and communication of data models, metadata, and other data definition methods that are required by HHS for ongoing data governance, strategic portfolio analysis, interoperability planning, and valuation of HHS System data assets.

  • Quality Standards Each Party agrees that the nature and quality of its products and services supplied in connection with the other Party's Marks will conform to quality standards set by the other Party. Each Party agrees to supply the other Party, upon request, with a reasonable number of samples of any Materials publicly disseminated by such Party which utilize the other Party's Marks. Each Party will comply with all applicable laws, regulations, and customs and obtain any required government approvals pertaining to use of the other Party's marks.

  • Policies, Guidelines, Directives and Standards Either the LHIN or the MOHLTC will give the HSP Notice of any amendments to the manuals, guidelines or policies identified in Schedule C. An amendment will be effective in accordance with the terms of the amendment. By signing a copy of this Agreement the HSP acknowledges that it has a copy of the documents identified in Schedule C.

  • Use Guidelines 3.3.1. The JAGGAER Applications are provided to Client for use only as expressly set forth in the Agreement, and Client will not use the JAGGAER Applications in whole or in part for any other use or purpose. In particular, Client will not, and will not allow any third party to: (i) decompile, disassemble, reverse engineer or attempt to reconstruct, identify or discover any source code, underlying ideas, underlying user interface techniques or algorithms of the JAGGAER Applications by any means, or disclose any of the foregoing; (ii) except as expressly set forth in the Agreement, provide, rent, lease, lend, or use the JAGGAER Applications for timesharing, subscription, or service bureau purposes; (iii) sublicense, transfer or assign the JAGGAER Applications or any of the rights or licenses granted under the Agreement; or remove or obscure any trademark, product identification, proprietary marking, copyright or other notices provided with the JAGGAER Applications or related documentation.

  • Visitors to and Conduct on School Property Petitions or written correspondence to the Board shall be presented to the Board in the next regular Board packet. LEGAL REF.: 5 ILCS 120/2.06, Open Meetings Act. 105 ILCS 5/10-6 and 5/10-16. CROSS REF.: 2:220 (School Board Meeting Procedure), 8:10 (Connection with the Community), 8:30 (Visitors to and Conduct on School Property) Adopted: September 5, 2019 Meridian CUSD 223 2:240 Board Policy Development The School Board governs using written policies. Written policies ensure legal compliance, establish Board processes, articulate District ends, delegate authority, and define operating limits. Board policies also provide the basis for monitoring progress toward District ends. Policy Development Anyone may propose new policies, changes to existing policies, or elimination of existing policies. Staff suggestions should be processed through the Superintendent. Suggestions from all others should be made to the Board President or the Superintendent. A Board Policy Committee will consider all policy suggestions, and provide information and recommendations to the Board. The Superintendent is responsible for: (1) providing relevant policy information and data to the Board,

  • Content Standards You agree that you will not upload or provide content or otherwise post, transmit, distribute, or disseminate through the Zelle® Payment Service any material that: (1) is false, misleading, unlawful, obscene, indecent, lewd, pornographic, defamatory, libelous, threatening, harassing, hateful, abusive, or inflammatory; (2) encourages conduct that would be considered a criminal offense or gives rise to civil liability; (3) breaches or infringes any duty toward or rights of any person or entity, including rights of publicity, privacy or intellectual property; (4) contains corrupted data or any other harmful, disruptive, or destructive files; (5) advertises products or services competitive with Zelle®, as determined by Zelle® in its sole discretion; or (6) in Zelle®’s or our sole judgment, is objectionable, restricts or inhibits any person or entity from using or enjoying any portion of the Zelle® Payment Service, or which may expose us, Zelle® or our respective affiliates or customers to harm or liability of any nature.

Time is Money Join Law Insider Premium to draft better contracts faster.