Computer Use and Conduct Standards Sample Clauses

Computer Use and Conduct Standards a. SSA is committed to compliance with safe use of technology such as computers and the internet, in accordance with the Children's Internet Protection Act (CIPA). Accordingly, SSA has developed Computer Use and Conduct Standards. The primary goal of SSA's available technology is to enrich the learning that takes place in and out of classrooms. In particular, technology offers opportunities for exploration and analysis of academic subjects in ways that traditional instruction cannot replicate. However, certain legal and ethical restrictions apply. b. Network Resources refers to all aspects of SSA's owned or leased equipment, including computers, printers, scanners and other peripherals, as well as email, internet services, servers, network files and folders, and all other technology-related equipment and services. These rules apply to any use of SSA's Network Resources whether this access occurs while on or off campus.
AutoNDA by SimpleDocs
Computer Use and Conduct Standards a. SSA staff retains the right to collect and/or inspect the Chromebook at any time, including via electronic remote access; and to alter, add or delete any file such as documents, photographs, videos, etc… and any installations such as software, hardware, widgets, etc… b. SSA is committed to compliance with safe use of technology such as computers and the internet, in accordance with the Children's Internet Protection Act (CIPA). Accordingly, SSA has developed Computer Use and Conduct Standards. The primary goal of SSA's available technology is to enrich the learning that takes place in and out of classrooms. In particular, technology offers opportunities for exploration and analysis of academic subjects in ways that traditional instruction cannot replicate. However, certain legal and ethical restrictions apply.  The limited supply of bandwidth requires us to set priorities for use. Academic work for courses always takes priority over any other use of the computer equipment.  Network Resources refers to all aspects of SSA's owned or leased equipment, including computers, printers, scanners and other peripherals, as well as email, internet services, servers, network files and folders, and all other technology- related equipment and services. These rules apply to any use of SSA's Network Resources whether this access occurs while on or off campus.
Computer Use and Conduct Standards a. ISNP is committed to compliance with safe use of technology such as computers and the internet, in accordance with the Children’s Internet Protection Act (CIPA). Accordingly, ISPN has developed Computer Use and Conduct Standards. The primary goal of ISNP’s available technology is to enrich the learning that takes place in and out of classrooms. In particular, technology offers opportunities for exploration and analysis for academic subjects in ways that traditional instruction cannot replicate. However, certain legal and ethical restrictions apply. b. The limited supply of bandwidth requires us to set priorities for use. Academic work for courses always takes priority over any other use of the computer equipment. The following is a list of rules and guidelines which govern the use of ISNP computers and Network resources. Network Resources refers to all aspects of ISNP’s owned or leased equipment, including computers, printers, scanners and other peripherals, as well as email, Internet services, xxxxxx, network files and folders, and all other technology-related equipment and services. These rules apply to any use of ISNP’s Network Resources whether this access occurs while on or off campus.
Computer Use and Conduct Standards. 11.1 ISNP is committed to compliance with safe use of technology such as computers and the internet, in accordance with the Children's Internet protection Act (CIPA). Accordingly, ISNP has developed Computer Use and Conduct Standards. The primary goal of ISNP's available technology is to enrich the learning that takes place in and out of classrooms. In particular, technology offers opportunities for exploration and analysis of academic subjects in ways that traditional instruction cannot replicate. However, certain legal and ethical restrictions apply.

Related to Computer Use and Conduct Standards

  • Procurement Standards For projects being managed by the Local Government and on the State highway system or that include state funding, the Local Government must obtain approval from the State for its proposed procurement procedure for the selection of a professional services provider, a contractor for a construction or maintenance project, or a materials provider.

  • General Guidelines Conduct yourself in a responsible manner at all times in the laboratory.

  • Enterprise Information Management Standards Grantee shall conform to HHS standards for data management as described by the policies of the HHS Office of Data, Analytics, and Performance. These include, but are not limited to, standards for documentation and communication of data models, metadata, and other data definition methods that are required by HHS for ongoing data governance, strategic portfolio analysis, interoperability planning, and valuation of HHS System data assets.

  • Quality Standards Each Party agrees that the nature and quality of its products and services supplied in connection with the other Party's Marks will conform to quality standards set by the other Party. Each Party agrees to supply the other Party, upon request, with a reasonable number of samples of any Materials publicly disseminated by such Party which utilize the other Party's Marks. Each Party will comply with all applicable laws, regulations, and customs and obtain any required government approvals pertaining to use of the other Party's marks.

  • Policies, Guidelines, Directives and Standards Either the Funder or the Ministry will give the HSP Notice of any amendments to the manuals, guidelines or policies identified in Schedule C. An amendment will be effective in accordance with the terms of the amendment. By signing a copy of this Agreement the HSP acknowledges that it has a copy of the documents identified in Schedule C.

  • Content Standards You agree that you will not upload or provide content or otherwise post, transmit, distribute, or disseminate through the Zelle® Payment Service any material that: (1) is false, misleading, unlawful, obscene, indecent, lewd, pornographic, defamatory, libelous, threatening, harassing, hateful, abusive, or inflammatory; (2) encourages conduct that would be considered a criminal offense or gives rise to civil liability; (3) breaches or infringes any duty toward or rights of any person or entity, including rights of publicity, privacy or intellectual property; (4) contains corrupted data or any other harmful, disruptive, or destructive files; (5) advertises products or services competitive with Zelle®, as determined by Zelle® in its sole discretion; or (6) in Zelle®’s or our sole judgment, is objectionable, restricts or inhibits any person or entity from using or enjoying any portion of the Zelle® Payment Service, or which may expose us, Zelle® or our respective affiliates or customers to harm or liability of any nature.

  • Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.

  • Human and Financial Resources to Implement Safeguards Requirements The Borrower shall make available necessary budgetary and human resources to fully implement the EMP and the RP.

  • PARKING RULES AND REGULATIONS The following rules and regulations govern the use of the parking facilities which serve the Building. Tenant will be bound by such rules and regulations and agrees to cause its employees, subtenants, assignees, contractors, suppliers, customers and invitees to observe the same: 1. Tenant will not permit or allow any vehicles that belong to or are controlled by Tenant or Tenant’s employees, subtenants, customers or invitees to be loaded, unloaded or parked in areas other than those designated by Landlord for such activities. No vehicles are to be left in the parking areas overnight and no vehicles are to be parked in the parking areas other than normally sized passenger automobiles, motorcycles and pick-up trucks. No extended term storage of vehicles is permitted. 2. Vehicles must be parked entirely within painted stall lines of a single parking stall. 3. All directional signs and arrows must be observed. 4. The speed limit within all parking areas shall be five (5) miles per hour. 5. Parking is prohibited: (a) in areas not striped for parking; (b) in aisles or on ramps; (c) where “no parking” signs are posted; (d) in cross-hatched areas; and (e) in such other areas as may be designated from time to time by Landlord or Landlord’s parking operator. 6. Landlord reserves the right, without cost or liability to Landlord, to tow any vehicle if such vehicle’s audio theft alarm system remains engaged for an unreasonable period of time. 7. Washing, waxing, cleaning or servicing of any vehicle in any area not specifically reserved for such purpose is prohibited. 8. Landlord may refuse to permit any person to park in the parking facilities who violates these rules with unreasonable frequency, and any violation of these rules shall subject the violator’s car to removal, at such car owner’s expense. Tenant agrees to use its best efforts to acquaint its employees, subtenants, assignees, contractors, suppliers, customers and invitees with these parking provisions, rules and regulations. 9. Parking stickers, access cards, or any other device or form of identification supplied by Landlord as a condition of use of the parking facilities shall remain the property of Landlord. Parking identification devices, if utilized by Landlord, must be displayed as requested and may not be mutilated in any manner. The serial number of the parking identification device may not be obliterated. Parking identification devices, if any, are not transferable and any device in the possession of an unauthorized holder will be void. Landlord reserves the right to refuse the sale of monthly stickers or other parking identification devices to Tenant or any of its agents, employees or representatives who willfully refuse to comply with these rules and regulations and all unposted city, state or federal ordinances, laws or agreements. 10. Loss or theft of parking identification devices or access cards must be reported to the management office in the Development immediately, and a lost or stolen report must be filed by the Tenant or user of such parking identification device or access card at the time. Landlord has the right to exclude any vehicle from the parking facilities that does not have a parking identification device or valid access card. Any parking identification device or access card which is reported lost or stolen and which is subsequently found in the possession of an unauthorized person will be confiscated and the illegal holder will be subject to prosecution. 11. All damage or loss claimed to be the responsibility of Landlord must be reported, itemized in writing and delivered to the management office located within the Development within ten (10) business days after any claimed damage or loss occurs. Any claim not so made is waived. Landlord is not responsible for damage by water or fire, or for the acts or omissions of others, or for articles left in vehicles. In any event, the total liability of Landlord, if any, is limited to Two Hundred Fifty Dollars ($250.00) for all damages or loss to any car. Landlord is not responsible for loss of use.

  • Information Services Traffic 5.1 For purposes of this Section 5, Voice Information Services and Voice Information Services Traffic refer to switched voice traffic, delivered to information service providers who offer recorded voice announcement information or open vocal discussion programs to the general public. Voice Information Services Traffic does not include any form of Internet Traffic. Voice Information Services Traffic also does not include 555 traffic or similar traffic with AIN service interfaces, which traffic shall be subject to separate arrangements between the Parties. Voice Information services Traffic is not subject to Reciprocal Compensation charges under Section 7 of the Interconnection Attachment. 5.2 If a D&E Customer is served by resold Verizon Telecommunications Service or a Verizon Local Switching UNE, subject to any call blocking feature used by D&E, to the extent reasonably feasible, Verizon will route Voice Information Services Traffic originating from such Service or UNE to the Voice Information Service platform. For such Voice Information Services Traffic, unless D&E has entered into an arrangement with Verizon to xxxx and collect Voice Information Services provider charges from D&E’s Customers, D&E shall pay to Verizon without discount the Voice Information Services provider charges. D&E shall pay Verizon such charges in full regardless of whether or not it collects such charges from its own Customers. 5.3 D&E shall have the option to route Voice Information Services Traffic that originates on its own network to the appropriate Voice Information Services platform(s) connected to Verizon’s network. In the event D&E exercises such option, D&E will establish, at its own expense, a dedicated trunk group to the Verizon Voice Information Service serving switch. This trunk group will be utilized to allow D&E to route Voice Information Services Traffic originated on its network to Verizon. For such Voice Information Services Traffic, unless D&E has entered into an arrangement with Verizon to xxxx and collect Voice Information Services provider charges from D&E’s Customers, D&E shall pay to Verizon without discount the Voice Information Services provider charges. 5.4 D&E shall pay Verizon such charges in full regardless of whether or not it collects charges for such calls from its own Customers. 5.5 For variable rated Voice Information Services Traffic (e.g., NXX 550, 540, 976, 970, 940, as applicable) from D&E Customers served by resold Verizon Telecommunications Services or a Verizon Local Switching Network Element, D&E shall either (a) pay to Verizon without discount the Voice Information Services provider charges, or (b) enter into an arrangement with Verizon to xxxx and collect Voice Information Services provider charges from D&E’s Customers. 5.6 Either Party may request the other Party provide the requesting Party with non discriminatory access to the other party’s information services platform, where such platform exists. If either Party makes such a request, the Parties shall enter into a mutually acceptable written agreement for such access. 5.7 In the event D&E exercises such option, D&E will establish, at its own expense, a dedicated trunk group to the Verizon Information Service serving switch. This trunk group will be utilized to allow D&E to route information services traffic originated on its network to Verizon.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!