DEVICE USE AT SCHOOL Sample Clauses

DEVICE USE AT SCHOOL. SCEC-issued devices are intended for use at school every day upon teacher approval. In addition to teacher expectations for device use, school messages, announcements, calendars, academic handbooks, student handbooks and schedules may be accessed by students using the SCEC-issued device. Secondary school devices must be brought to school each day in a fully charged condition. In the secondary schools, students must be responsible for bringing their devices to all classes unless specifically advised not to do so by their teacher or principal.
AutoNDA by SimpleDocs

Related to DEVICE USE AT SCHOOL

  • Pin and Use at Atm 8.1 Issue of PIN The Bank may in the Bank’s absolute discretion (but without any obligation to do so) issue a PIN to the Cardholder upon written request of the Corporate Account Holder. The Bank may send to the Cardholder the PIN by ordinary post at the Corporate Account Xxxxxx’s and Cardholder’s sole risk and the Bank shall not be liable to the Corporate Account Holder or Cardholder for any loss or damage suffered or incurred by the Corporate Account Holder or Cardholder resulting from the loss of the PIN.

  • Use of School Equipment The Association shall have the right to use school facilities and equipment, including manual typewriters, mimeographing machines, other duplicating equipment, audio visual equipment and computers at reasonable times when such equipment is not otherwise in use. The Association shall provide its own supplies and shall be responsible for any damage sustained by such equipment during Association use.

  • Device Data We may share certain personal information and device-identifying technical data about you and your devices with third party service providers, who will compare and add device data and fraud data from and about you to a database of similar device and fraud information in order to provide fraud management and prevention services, which include but are not limited to identifying and blocking access to the applicable service or Web site by devices associated with fraudulent or abusive activity. Such information may be used by us and our third party service providers to provide similar fraud management and prevention services for services or Web sites not provided by us. We will not share with service providers any information that personally identifies the user of the applicable device.

  • Customer Feedback The contractor is expected to establish and maintain professional communication between its employees and customers. The primary objective of this communication is customer satisfaction. Customer satisfaction is the most significant external indicator of the success and effectiveness of all services provided and can be measured through customer complaints and surveys. Performance management drives the contractor to be customer focused through initially and internally addressing customer complaints and investigating the issues and/or problems but the customer always has the option to communicate complaints to the PM, as opposed to the contractor. Customer feedback may also be obtained either from the results of formal customer satisfaction surveys or from random customer complaints. Any customer complaints will be investigated by the PM using the Quality Assurance Monitoring Form – Customer Complaint Investigation, identified in Attachment A4.

  • End User This agreement shall bind the ordering activity as end user but shall not operate to bind a Government employee or person acting on behalf of the Government in his or her personal capacity.

  • Markings 2.8.1. Every hose shall bear, at intervals of not greater than 0.5 m, the following clearly legible and indelible identification markings consisting of characters, figures or symbols.

  • User 4.9.1 Not to use the Property otherwise than for the Permitted Use;

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!