Google Workspace Sample Clauses

Google Workspace. Chromebooks seamlessly integrate with Google Workspace productivity and collaboration tools. These applications include Google Docs (word processing), Sheets, Slides, Forms, and Classroom. • All work is stored in the cloud. • Students may only install education-appropriate Chrome web apps and extensions from the Liberty Chrome Web Store with the approval of school administrators. • Students are responsible for the web apps and extensions they install on their Chromebooks. Apps and extensions that do not support instruction or are potentially harmful to the device or network may be disabled or removed at any time by the IT staff. Inappropriate material will result in disciplinary action. • Some web apps will be available to use when the Chromebook is not connected to the Internet. Chromebook Identification
AutoNDA by SimpleDocs
Google Workspace. An online suite of productivity and digital tools made specifically for schools and students to use.
Google Workspace. Migration - If the Customer wishes to migrate data into Google Workspace, this can be done by the Provider for a fee.

Related to Google Workspace

  • Workspace Whenever an academic or student union building is planned for construction or renovation, there shall be consideration of the needs for office space of graduate student employees in relevant departments. The University shall provide to all graduate student employees an on-campus mailbox. With approval of their department chair, graduate student employees shall be given key access into the buildings in which their offices or labs are housed for the purpose of performing assistantship work in said office or lab which is permitted by the department chair to be done outside of regular business hours. Department chairs may deny key access into buildings and/or offices/labs in order to minimize access to confidential materials or to minimize the risk of theft, fire/explosion hazards, personal harm, and other security/safety issues. Denial shall not be arbitrary or capricious. If key access is denied, the reason will be provided to the graduate student employee(s) involved. All departmental policies related to the issuance of keys to TOs shall apply equally to TOs in the Division of Continuing Education. Graduate student employees shall have reasonable access to photocopiers for copying related to their employment within departmental guidelines for usage. The parties agree to the creation of a joint committee, composed of equal numbers of representatives of the Union and the University, that will attempt to develop a plan to provide appropriate telephone access for bargaining unit members in connection with their employment responsibilities. The University will provide to this committee a report on the offices assigned to bargaining unit members during the 2005-2006 academic year and the proximity of those offices to a University telephone available for use by the respective bargaining unit member.

  • Software Use Case Red Hat Enterprise Virtualization Supported on physical hardware solely to support virtual quests. Red Hat Enterprise Virtualization is designed to run and manage virtual instances and does not support user-space applications. Red Hat Enterprise Virtualization may be used as a virtual desktop infrastructure solution, however, the Subscription does not come with any software or support for the desktop operating system. You must purchase the operating system for each instance of a desktop or server separately.

  • Web site Information on registration for and use of the E-Verify program can be obtained via the Internet at the Department of Homeland Security Web site: xxxx://xxx.xxx.xxx/E-Verify.

  • Licensed Software Computer program(s) provided by Contractor in connection with the Deliverables, subject to Section 14 of this Contract.

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

  • MOBILE DATA COMPUTERS 18 1. As part of the law enforcement services to be provided to CITY, COUNTY 19 has provided, or will provide, mobile data computers (hereinafter called 20 “MDCs”) that are or will be mounted in patrol vehicles and motorcycles, 21 designated by COUNTY for use within CITY limits.

  • By Microsoft Microsoft will defend Customer against any third-party claim to the extent it alleges that a Product or Fix made available by Microsoft for a fee and used within the scope of the license granted under this agreement (unmodified from the form provided by Microsoft and not combined with anything else), misappropriates a trade secret or directly infringes a patent, copyright, trademark or other proprietary right of a third party. If Microsoft is unable to resolve a claim of infringement under commercially reasonable terms, it may, as its option, either: (1) modify or replace the Product or fix with a functional equivalent; or (2) terminate Customer’s license and refund any prepaid license fees (less depreciation on a five-year, straight-line basis) for perpetual licenses and any amount paid for Online Services for any usage period after the termination date. Microsoft will not be liable for any claims or damages due to Customer’s continued use of a Product or Fix after being notified to stop due to a third- party claim.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!