Contractor Access Agreement Sample Clauses

Contractor Access Agreement. Any servicing, repairing, or maintaining of vessels whether Basic Routine Maintenance and Cleaning (including, but not limited to oil changes, lubrications, cleaning or detailing or canvas repair) or Major Repair Work, conducted in the Marina on behalf of the Vessel Owner by contractors, subcontractors or outside agents must be done, as appropriate, within the
AutoNDA by SimpleDocs

Related to Contractor Access Agreement

  • Zone File Access Agreement Registry Operator will enter into an agreement with any Internet user, which will allow such user to access an Internet host server or servers designated by Registry Operator and download zone file data. The agreement will be standardized, facilitated and administered by a Centralized Zone Data Access Provider, which may be ICANN or an ICANN designee (the “CZDA Provider”). Registry Operator (optionally through the CZDA Provider) will provide access to zone file data per Section 2.1.3 of this Specification and do so using the file format described in Section 2.1.4 of this Specification. Notwithstanding the foregoing, (a) the CZDA Provider may reject the request for access of any user that does not satisfy the credentialing requirements in Section 2.1.2 below; (b) Registry Operator may reject the request for access of any user that does not provide correct or legitimate credentials under Section 2.1.2 below or where Registry Operator reasonably believes will violate the terms of Section 2.1.5. below; and, (c) Registry Operator may revoke access of any user if Registry Operator has evidence to support that the user has violated the terms of Section 2.1.5 below.

  • Acceptable Use Policy Agreement I understand that I must use school IT systems in a responsible way, to ensure that there is no risk to my safety or to the safety and security of the IT systems and other users. For my own personal safety: • I understand that the school will monitor my use of the IT systems, email and other digital communications. • I will treat my username and password like my toothbrush – I will not share it, nor will I try to use any other person’s username and password. • I will be aware of “stranger danger”, when I am communicating on-line. • I will not disclose or share personal information about myself or others when on-line. • If I arrange to meet people off-line that I have communicated with on-line, I will do so in a public place and take an adult with me. • I will immediately report any unpleasant or inappropriate material or messages or anything that makes me feel uncomfortable when I see it on-line. I understand that everyone has equal rights to use technology as a resource and: • I understand that the school IT systems are primarily intended for educational use and that I will not use the systems for personal or recreational use unless I have permission to do so. • I will not try (unless I have permission) to make large downloads or uploads that might take up internet capacity and prevent other users from being able to carry out their work. • I will not use the school IT systems for on-line gaming, on-line gambling, internet shopping, file sharing, or video broadcasting (e.g. YouTube), unless I have permission of a member of staff to do so. I will act as I expect others to act toward me: • I will respect others’ work and property and will not access, copy, remove or otherwise alter any other user’s files, without the owner’s knowledge and permission. • I will be polite and responsible when I communicate with others, I will not use strong, aggressive or inappropriate language and I appreciate that others may have different opinions. • I will not take or distribute images of anyone without their permission. I recognise that the school has a responsibility to maintain the security and integrity of the technology it offers me and to ensure the smooth running of the school: • I will only use my personal hand held / external devices (mobile phones / USB devices etc) in school if I have permission. I understand that, if I do use my own devices in school, I will follow the rules set out in this agreement, in the same way as if I was using school equipment. • I understand the risks and will not try to upload, download or access any materials which are illegal or inappropriate or may cause harm or distress to others, nor will I try to use any programmes or software that might allow me to bypass the filtering / security systems in place to prevent access to such materials.

  • Acceptable Use Agreement I understand that I must use school ICT systems in a responsible way, to ensure that there is no risk to my safety or to the safety and security of the ICT systems and other users. I will, where possible, educate the young people in my care in the safe use of ICT and embed E-Safety in my work with young people including my ‘Prevent’ duty. For my professional and personal safety: • I understand that the school will monitor my use of the ICT systems, email and other digital communications. • I understand that the rules set out in this agreement also apply to use of school ICT systems (e.g. laptops, email, VLE etc.) out of school, and to the transfer of personal data (digital or paper based) out of school • I understand that the school ICT systems are intended for educational use and that I will only use the systems for personal or recreational use within the policies and rules set down by the school. • I will not disclose my username or password to anyone else, nor will I try to use any other person’s username and password. I understand that I should not write down or store a password where it is possible that someone may steal it. • I will immediately report any illegal, inappropriate or harmful material or incident, I become aware of, to the appropriate person.  Will report damaged equipment to the ICT support staff and will not attempt to repair any damage. I will be professional in my communications and actions when using school ICT systems: • I will not access, copy, remove or otherwise alter any other user’s files, without their express permission. • I will ensure that when I take and / or publish images of others I will do so with their permission and in accordance with the school’s policy on the use of digital / video images. If my personal device is used to record images this should be transferred to school systems and deleted from my device as soon as is practicable • I will only use chat and social networking sites in school in accordance with the school’s policies. • I will only communicate with students / pupils and parents / carers using official school systems. • I will not engage in any on-line activity that may compromise my professional responsibilities or be harmful to the reputation of the school. The school and the local authority have the responsibility to provide safe and secure access to technologies and ensure the smooth running of the school: • I will not use personal email addresses when communicating with pupils and parents. • I will not try to upload, download or access any materials which are illegal (including but not restricted to child sexual abuse images, criminally racist material, adult pornography covered by the Obscene Publications Act) or inappropriate or may cause harm or distress to others. I will not try to use any programmes or software that might allow me to bypass the filtering / security systems in place to prevent access to such materials. • I will not install or attempt to install programmes of any type on a machine, or store programmes on a computer and understand that all software should be appropriately licenced. • I will not disable or cause any damage to school equipment, or the equipment belonging to others. • Where digital personal data is transferred outside the secure local network, it must be encrypted. • I understand that the GDPR policy requires that any staff or student / pupil data to which I have access, will be kept private and confidential. • I will immediately report any damage or faults and loss of data to an appropriate person. I understand that I am responsible for my actions in and out of the school: • I understand that this Acceptable Use Agreement applies not only to my work and use of school ICT equipment in school, but also applies to my use of school ICT systems and equipment off the premises and my use of personal equipment on the premises or in situations related to my employment by the school • I understand that if I fail to comply with this Acceptable Use Agreement, I could be subject to disciplinary action. I have read and understand the above and agree to use the school ICT systems (both in and out of school) and my own devices (in school and when carrying out communications related to the school) within these guidelines. Staff / Volunteer Name Signed

  • DATA/ACCESS/CONFIDENTIALITY/ PRESERVATION 10.1 As used in this Agreement, the word “data” shall mean all information and things developed or obtained during the performance of, or acquired or developed by reason of, this Agreement, including, but not limited to, all studies, reports, files, formulae, surveys, maps, charts, sound recordings, video recordings, pictorial reproductions, drawings, analyses, graphic representations, computer programs, computer printouts, notes, letters, memoranda, papers, and documents, all whether finished or unfinished.

  • Agreements with Subcontractors Business Associate shall enter into a Business Associate Agreement with any Subcontractor to whom it provides PHI received from Covered Entity or created or received by Business Associate on behalf of Covered Entity in which the Subcontractor agrees to the same restrictions and conditions that apply through this Agreement to Business Associate with respect to such PHI. Business Associate must enter into this Business Associate Agreement before any use by or disclosure of PHI to such agent. The written agreement must identify Covered Entity as a direct and intended third party beneficiary with the right to enforce any breach of the agreement concerning the use or disclosure of PHI. Business Associate shall provide a copy of the Business Associate Agreement it enters into with a subcontractor to Covered Entity upon request. Business associate may not make any disclosure of PHI to any Subcontractor without prior written consent of Covered Entity.

  • Service Level Agreement Subject to the terms and conditions of this Agreement, Bank agrees to perform the custody services provided for under this Agreement in a manner that meets or exceeds any service levels as may be agreed upon by the parties from time to time in a written document that is executed by both parties on or after the date of this Agreement, unless that written document specifically states that it is not contractually binding. For the avoidance of doubt, Bank’s Service Directory shall not be deemed to be such a written document.

  • COMMENCEMENT OF WORK UNDER A SOW AGREEMENT Commencement of work as a result of the SOW-RFP process shall be initiated only upon issuance of a fully executed SOW Agreement and Purchase Order.

  • Vendor Agreement 230105 Vendor Agreement pdf The Vendor Agreement must be downloaded from the “Attachments” section of the IonWave eBid System, reviewed, Vendor Name placed in the line provided at the top, and uploaded to this location. If Vendor has proposed deviations to the Vendor Agreement, Vendor may assert so in the Attribute Questions and those shall be addressed during evaluation.

  • HHSC and Contractor Agreements HHSC and Contractor hereby agree:

  • ADDITIONAL CONTRACTOR TERMS AND CONDITIONS WITHIN AN AUTHORIZED USER AGREEMENT Additional Contractor Terms and Conditions may become part of an Authorized User Agreement in accordance with Section 28 of Appendix B. EMPLOYEE INFORMATION REQUIRED TO BE REPORTED BY CERTAIN CONSULTANT CONTRACTORS AND SERVICE CONTRACTORS Civil Service Law § 97 and State Finance Law § 163 establish reporting requirements for maintaining certain information concerning Contract Employees working under State Agency service and consulting Contracts. State Agency consultant Contracts are defined as “Contracts entered into by a state Agency for analysis, evaluation, research, training, data processing, computer programming, engineering, environmental health and mental health services, accounting, auditing, paralegal, legal, or similar services” (“covered consultant Contract” or “covered consultant services”). The information must be provided to the state Agency awarding such Contracts, OSC, DOB and CS. To meet these requirements, the Contractor agrees to complete:

Time is Money Join Law Insider Premium to draft better contracts faster.