Email, Fax Machines & Intranets Sample Clauses

Email, Fax Machines & Intranets. Employees may use State-operated email to request Union representation only. The Union and employees covered by this Agreement will not use State-owned or operated email, fax machines or Intranets to communicate with one another for Union purposes, except as specifically provided for in this Agreement. Union Representatives may use State-owned/operated equipment to communicate with the affected employees and/or the Employer for the exclusive purposes of administration of this Agreement to include electronic transmittal of grievances and responses in accordance with Article _ , Grievance Procedure. It is the responsibility of the sending party to ensure the material is received. Such use will: Result in little or no cost to the Xxxxxxxx.Xx brief in duration and frequency. Not interfere with the performance of their official duties.Not distract from the conduct of State business. Not disrupt other State employees and will not obligate other employees to make apersonal use of State resources. Not compromise the security or integrity of State information or software. Not include general communication and/or solicitation with employees. Communication that occurs over State-owned equipment is the property of the Employer and may be subject to public disclosure.
AutoNDA by SimpleDocs

Related to Email, Fax Machines & Intranets

  • Electronic Visit Verification (EVV). Provider shall cooperate with State requirements for electronic visit verification for personal care services and home health services, as applicable.

  • Electronic Visit Verification ("EVV Provider shall cooperate with State requirements for electronic visit verification for personal care services and home health services, as applicable.

  • Computer The Contractor shall maintain at its office for its use a computer with, at a minimum, a 1 GHz processor and an internet connection. The Contractor shall maintain individual email accounts for each of its project managers.

  • Web site Information on registration for and use of the E-Verify program can be obtained via the Internet at the Department of Homeland Security Web site: xxxx://xxx.xxx.xxx/E-Verify.

  • Mailboxes Each department or unit shall make available a convenient receptacle at a designated location for Employees to receive University business correspondence.

  • Internet We will provide internet service to you for your noncommercial use. You acknowledge that the internet service is a shared service. We have no duty to you to edit, censor, review or take any responsibility for any information you or your guests may create, place on the internet, or view. You shall not use the internet we provide to engage in any criminal, illegal or unauthorized activity and any such use is a default of this Lease. Any violation of the Digital Millennium Copyright Act ("DMCA") is a breach of this Lease. You shall not attempt to degrade the performance of the internet service or hamper the ability of others to use the internet. You shall not use rogue devices, including wireless routers or modems, or take any measurers to interfere with our internet systems by configuring devices connected to our network so that they can communicate on our network using the internet protocol. Your use of the internet is at your sole risk and we are not responsible for your equipment, programs or software. Although we strive to provide superior internet service and sufficient bandwidth to our residents, we are not responsible for slow internet or other residents taking up significant bandwidth. WE RESERVE THE RIGHT TO INTERRUPT YOUR INTERNET SERVICE IN RESPONSE TO A BREACH OF THIS LEASE, INCLUDING BUT NOT LIMITED TO A FAILURE TO PAY RENT OR A VIOLATION OF THIS PARAGRAPH 6.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Links If The Services are made available through the Internet, the Financial Institution’s website may provide links to other websites, including those of Third Parties who may also provide services to You. You acknowledge that all those other websites and Third Party services are independent from the Financial Institution’s and may be subject to separate agreements that govern their use. The Financial Institution and Central 1 have no liability for those other websites or their contents or the use of Third Party services. Links are provided for convenience only, and You assume all risk resulting from accessing or using such other websites or Third Party services.

  • Websites Distributor shall utilize the Company's proprietary Internet site, and may link to "TXXXXXXXXXXXXXXX.XXX" as a source for new customers and related matters.

  • Internet Use 7.1. Customer is prohibited from posting or transmitting unlawful material on or via the Internet or the World Wide Web.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!