Computers Sample Clauses

Computers. All computers, hardware, software, computer upgrades and maintenance in connection therewith shall be at Owner's expense.
AutoNDA by SimpleDocs
Computers. Executive will be provided with a fixed location computer to be selected by the Executive to be used by the Executive at the location selected by Executive. The Company will also provide Executive with a laptop computer to his specification. Executive will have the option to return such computers to the Company upon Executive's employment termination, or at his option, he may retain such computers for his personal benefit upon his departure from the Company.
Computers. Security for data maintained in the HMIS depends on a secure computing environment. Computer security is adapted from relevant provisions of the Department of Housing and Urban Development’s (“HUD”) “Homeless Management Information Systems (HMIS); Data and Technical Standards Proposed Rule” (Docket No. FR 5475-P-01- Fed. Reg. Vol. 76, No. 237 (December 9, 2011/Proposed Rules). Agencies are encouraged to directly consult that document for complete documentation of HUD’s standards relating to HMIS, and hereby agree to incorporate any changes to HUD policy into their computing environment on the timeline specified by HUD. Agency will allow access to the HMIS only from computers which are: i. protected from viruses by commercially available virus protection software (a) that includes, at a minimum, automated scanning of files as they are accessed by End Users on the system on which the HMIS application is accessed and (b) with virus definitions that are regularly updated from the software vendor; ii. protected with a secure software or hardware firewall between, at least, the workstation and any systems (including the internet and other computer networks) located outside of the Agency; iii. maintained to ensure that the computer operating system running the computer used for the HMIS is kept up to date in terms of security and other operating system patches, updates, and fixes; iv. accessed through web browsers with 128-bit encryption (e.g., Internet Explorer, and Google Chrome). Some browsers have the capacity to remember passwords, so that the End User does not need to type in the password when returning to password-protected sites. This default shall not be used with respect to the HMIS; the End User is expected to physically enter the password each time he or she logs on to the system; and v. staffed at all times when in public areas. When computers are not in use and staff is not present, steps should be taken to ensure that the computers and data are secure and not usable by unauthorized individuals. These steps should minimally include (a) logging off the HMIS system, (b) physically locking the computer in a secure area, (c) shutting down the computer entirely, or (d) using a password protected screen saver.
Computers. If the Employer determines it is technologically feasible, the Employer shall insure that at least one (1) computer is available at each driver site, for work related use.
Computers. Security for data maintained in NW Social Service Connections CMIS/HMIS depends on a secure computing environment. Computer security is adapted from relevant provisions of the Department of Housing and Urban Development’s (HUD) “Homeless Management Information Systems (HMIS) Data and Technical Standards Notice”. Agencies are encouraged to directly consult that document for complete documentation of HUD’s standards relating to CMIS/HMIS. • xxxx://xxx.xxxx.xxxx/ClassicAsp/documents/HUD%20Data%20and%20Technical%20Standard s.pdf • xxxx://xxx.xxxx.xxxx/ClassicAsp/documents/Final%20HMIS%20Data%20Standards- Revised%20_3.pdf PHB and Community Stakeholders may add additional standards and will provide notice(s) to Participants.
Computers. Security for data maintained in the HMIS depends on a secure computing environment. Computer security is adapted from relevant provisions of the Department of Housing and Urban Development’s (“HUD”) “Homeless Management Information Systems (HMIS); Data and Technical Standards Proposed Rule” (Docket No. FR 5475-P-01- Fed. Reg. Vol. 76, No. 237 (December 9, 2011/Proposed Rules). Agencies are encouraged to directly consult that document for complete documentation of HUD’s standards relating to HMIS. Agency will allow access to the HMIS only from computers which are: i. approved by IHCDA for the purpose of accessing and working with the HMIS; ii. protected from viruses by commercially available virus protection software (a) that includes, at a minimum, automated scanning of files as they are accessed by Users on the system on which the HMIS application is accessed and (b) with virus definitions that are regularly updated from the software vendor; iii. protected with a secure software or hardware firewall between, at least, the workstation and any systems (including the internet and other computer networks) located outside of the Agency; iv. maintained to ensure that the computer operating system running the computer used for the HMIS is kept up to date in terms of security and other operating system patches, updates, and fixes; v. accessed through web browsers with 128-bit encryption (e.g., Internet Explorer, version 8.0). Some browsers have the capacity to remember passwords, so that the User does not need to type in the password when returning to password-protected sites. This default shall not be used with respect to the HMIS; the end-user is expected to physically enter the password each time he or she logs on to the system; and vi. staffed at all times when in public areas. When computers are not in use and staff is not present, steps should be taken to ensure that the computers and data are secure and not usable by unauthorized individuals. These steps should minimally include (a) logging off the data entry system, (b) physically locking the computer in a secure area, (c) shutting down the computer entirely, or (d) using a password protected screen saver.
Computers. Each student in grades 5 - 8 should bring a laptop or tablet as part of the required school supplies. Students will be using these devices to write original work and to access online resources and textbooks for study and research. This program not only gives our students greater access to the wide range of digital educational resources available, but it will also help our students develop the skills needed to be successful in a digital learning environment. It is important that each student has a device on which he or she is comfortable using Microsoft Office (i.e. Microsoft Word, Excel, Power Point, Publisher) and utilizing online resources. Since many of our students already have access to devices they can bring to school, they are recommended to use what is available to them before purchasing a new device. Generally, any laptop purchased within the past few years should meet the specifications needed. Some specific recommendations are listed below. There are a limited number of laptops available to students who do not have access to their own devices.
AutoNDA by SimpleDocs
Computers. The County agrees to provide computer equipment required to perform their duties for the county employees covered under Section 2.02, subject to the budget amount set forth in Article 3.
Computers. The only computers allowed for purchase through this solicitation are those computers dedicated to mail room equipment and operations.
Computers. 01 a) After each hour of continuous operation of a computer, a computer operator shall be relieved of such duties for a period of ten (10) minutes.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!