IT and Information Security Sample Clauses

IT and Information Security. 11.1 You must comply with all policies, rules and regulations in relation to the use of IT during the course of your programme of study. These services include the College’s ‘Information Security Policy’, which is available on the College’s Website. 11.2 Use of all IT equipment and its connection to the College’s IT network must comply with the Code of Practice for the Acceptable Use of ICT and Electronic Communications Systems by Exeter College Students, which will be provided to students post-enrolment during their IT induction and is available on the College Moodle. This prohibits the use of computing devices and the College’s network for, amongst other things, any illegal activity, the creation or transmission of offensive or obscene material and communicating extreme or radical views. The College may monitor the use (including personal use) of its network and systems (including telephone, email, voicemail, internet, other communications and internet systems) and review or restrict information transmitted using them as reasonably necessary to ensure the appropriate use of its services and to comply with legal obligations. 11.3 By connecting to the College’s IT network, you are accepting all of the associated risks. This includes when you connect with any of your own devices. The College will not be liable for any damage that is caused by your use of IT equipment and/or connection to the College network, except in the case of any foreseeable damage arising directly from the College’s negligence or failure to comply with this contract.
AutoNDA by SimpleDocs
IT and Information Security. 11.1 You must comply with all policies, rules and regulations in relation to the use of IT during the course of your studies. These include the University’s "Use of Computers Policy" and "Information Security Policy" which are available on the University’s website, and any IT or computer policy of the College in force from time to time (as set out on the College’s website). 11.2 With regard to the University’s Policy, use of all IT equipment and its connection to the University's IT network must comply with the "appropriate use of services" element of the Policy. The Policy prohibits the use of computing devices and the University's network for, amongst other things, any illegal activity, the creation or transmission of offensive or obscene material, and the creation or transmission of any material which infringes the IP rights of another person. The University may monitor the use (including any personal use) of its network and systems (including telephone, e-mail, voicemail, internet, other communications, and computer systems) and review or restrict information transmitted using them as reasonably necessary to ensure the appropriate use of its services and to comply with its legal obligations. 11.3 By connecting to the IT network of the College or the University, you are accepting all of the associated risks. This includes when you connect to the network with any of your own devices. Neither the College nor the University will be liable for any damage that is caused by your use of IT equipment and/or connection to the network of the College or the University, except in the case of any foreseeable damage resulting directly from negligence or a failure to comply with this contract on the part of the College or the University (as the case may be).
IT and Information Security. 13.1 You will need the following essentials to participate in one of our Programmes. a) Access to a PC or laptop; b) Headset with microphone; c) Ability to connect to the internet via a broadband connection; and d) Microsoft Office software or equivalent, for example Open Office. 13.2 Our learning platform supports all the major modern browsers. However, for optimum performance we recommend that you use the latest version of Chrome. Our learning platform does not support versions of Internet Explorer 9 or below. 13.3 Your web browser may have active pop-up blockers to suppress unwanted advertising. Similarly, you may be behind a content-blocking device such as a firewall. It may be necessary to reconfigure or disable these. If you are accessing the learning platform from work or in a public place you may have to contact the system administrator to do this. 13.4 Computer equipment and internet access costs are not included in our Full Tuition Fees and are your responsibility. 13.5 You must comply with all regulations, policies and codes of practice in relation to the use of University and Kaplan IT facilities during the course of your studies. 13.6 Use of all IT equipment and its connection to the University’s or Xxxxxx’x IT network must comply with the relevant sections of the regulations and policies. These prohibit the use of computing devices and the University’s or Xxxxxx’x network for, amongst other things, any illegal activity, the creation or transmission of offensive or obscene material, and the creation or transmission of any material which infringes the IP rights of another person. Both the University and/or Kaplan may monitor the use (including any personal use) of their respective networks and systems (including telephone, email, voicemail, internet, other communications, and computer systems) and review or restrict information transmitted using them as reasonably necessary to ensure the appropriate use of their services and to comply with their legal obligations. 13.7 By connecting to the University’s and Xxxxxx’x IT networks, you are accepting all of the associated risks. This includes when you connect to the network with any of your own devices. Neither the University nor Kaplan will not be liable for any damage that is caused by your use of IT equipment and/or connection to their network, except in the case of any foreseeable damage resulting directly from a party’s negligence or failure to comply with this contract.
IT and Information Security. 12.1 You must comply with all policies, rules and regulations in relation to the use of IT during the course of your studies. These include the University’s "Use of Computers Policy" and "Information Security Policy" which are available on the University’s website, and any IT or computer policy of the College in force (as set out on the College’s website). 12.2 With regard to the University’s Policy, use of all IT equipment and its connection to the University's IT network must comply with the "appropriate use of services" element of the Policy. The Policy prohibits the use of computing devices and the University's network for, amongst other things, any illegal activity, the creation or transmission of offensive or obscene material, and the creation or transmission of any material which infringes the IP rights of another person, as well as other similarly inappropriate actions. 12.3 The University may monitor the use (including any personal use) of its network and systems (including telephone, e-mail, voicemail, internet, other communications, and computer systems) and review or restrict information transmitted using them as reasonably necessary to ensure the appropriate use of its services and to comply with its legal obligations. 12.4 Use of all IT equipment and its connection to the College's IT network must comply with the College’s relevant policies in force. These policies prohibit the use of computing devices and the College's network for, amongst other things, any illegal activity, the creation or transmission of offensive or obscene material, and the creation or transmission of any material which infringes the IP rights of another person. 12.5 The College may monitor the use (including any personal use) of its network and systems (including telephone, e-mail, voicemail, internet, other communications, and computer systems) and review or restrict information transmitted using them as reasonably necessary to ensure the appropriate use of its services and to comply with its legal obligations. 12.6 By connecting to the IT network of the College or the University, you are accepting all of the associated risks, including when you connect to the network with any of your own devices. Neither the College nor the University will be liable for any damage that is caused by your use of IT equipment and/or connection to the network of the College or the University, except to the extent required by law or in the case of any foreseeable damage resulting directly ...
IT and Information Security. 10.1 You must comply with all policies, rules and regulations in relation to the use of IT during the course of your studies. These include the Colleges "Use of Computers Policy" and "Information Security Policy" which are available on the Colleges website. 10.2 With regard to the Colleges Policy, use of all IT equipment and its connection to the College’s IT network must comply with the "appropriate use of services" element of the Policy. The Policy prohibits the use of computing devices and the College’s network for, amongst other things, any illegal activity, the creation or transmission of offensive or obscene material, and the creation or transmission of any material which infringes the IP rights of another person. The College may monitor the use (including any personal use) of its network and systems (including telephone, e- mail, voicemail, internet, other communications, and computer systems) and review or restrict information transmitted using them as reasonably necessary to ensure the appropriate use of its services and to comply with its legal obligations. 10.3 By connecting to the IT network of the College, you are accepting all of the associated risks. This includes when you connect to the network with any of your own devices. The College will not be liable for any damage that is caused by your use of IT equipment and/or connection to the network of the College, except in the case of any foreseeable damage resulting directly from negligence or a failure to comply with this contract on the part of the College.
IT and Information Security. 10.1 You must comply with all policies, rules and regulations in relation to the use of IT during the course of your studies. These include any IT or computer policy of the College in force from time to time. 10.2 With regard to the College’s Policy, use of all IT equipment and its connection to the IT network must comply with the "appropriate use of services" element of the Policy. The Policy prohibits the use of computing devices and the College's network for, amongst other things, any illegal activity, the creation or transmission of offensive or obscene material, and the creation or transmission of any material which infringes the IP rights of another person. The College may monitor the use (including any personal use) of its network and systems (including telephone, e-mail, voicemail, internet, other communications, and computer systems) and review or restrict information transmitted using them as reasonably necessary to ensure the appropriate use of its services and to comply with its legal obligations. 10.3 By connecting to the IT network of the College, you are accepting all of the associated risks. This includes when you connect to the network with any of your own devices. The College will not be liable for any damage that is caused by your use of IT equipment and/or connection to the network of the College, except in the case of any foreseeable damage resulting directly from negligence or a failure to comply with this contract on the part of the College.
IT and Information Security. 11.1 You must comply with all policies, rules and regulations in relation to the use of IT during the course of your studies. These include any IT or computer policy of the College in force from time to time (as set out on the College’s website).
AutoNDA by SimpleDocs
IT and Information Security. 14.1 You must comply with all regulations, policies and codes of practice in relation to the use of IT during the course of your studies. These can be found on the University’s website. 14.2 By using University IT facilities, you agree to abide by the IT Acceptable Use Policy, including when you use any of your own devices. The University will not be liable for any damage that is caused by your use of IT equipment and/or connection to the University’s network, except in the case of any foreseeable damage resulting directly from the University’s negligence or failure to comply with this contract. 14.3 The use of computing devices and the University's network for, amongst other things, any illegal activity, the creation or transmission of offensive or obscene material, or the creation or transmission of any material which infringes the IP rights of another person is strictly prohibited. The University may monitor the use (including any personal use) of its network and systems (including telephone, email, voicemail, internet, other communications, and computer systems) and review or restrict information transmitted using them as reasonably necessary to ensure the appropriate use of its services and to comply with its legal obligations.
IT and Information Security. 14.1 You must comply with all regulations, policies and codes of practice in relation to the use of IT during the course of your studies. These can be found on the University’s website.

Related to IT and Information Security

  • Access and Information The Company, on the one hand, and Parent and Acquisition Corp., on the other hand, shall each afford to the other and to the other’s accountants, counsel and other representatives full access during normal business hours throughout the period prior to the Effective Time to all of its properties, books, contracts, commitments and records (including but not limited to tax returns) and during such period, each shall furnish promptly to the other all information concerning its business, properties and personnel as such other party may reasonably request, provided that no investigation pursuant to this Section 6.01 shall affect any representations or warranties made herein. Each party shall hold, and shall cause its employees and agents to hold, in confidence all such information (other than such information that (a) is already in such party’s possession or (b) becomes generally available to the public other than as a result of a disclosure by such party or its directors, officers, managers, employees, agents or advisors or (c) becomes available to such party on a non-confidential basis from a source other than a party hereto or its advisors, provided that such source is not known by such party to be bound by a confidentiality agreement with or other obligation of secrecy to a party hereto or another party until such time as such information is otherwise publicly available; provided, however, that (i) any such information may be disclosed to such party’s directors, officers, employees and representatives of such party’s advisors who need to know such information for the purpose of evaluating the transactions contemplated hereby (it being understood that such directors, officers, employees and representatives shall be informed by such party of the confidential nature of such information), (ii) any disclosure of such information may be made as to which the party hereto furnishing such information has consented in writing and (iii) any such information may be disclosed pursuant to a judicial, administrative or governmental order or request; provided, further, that the requested party will promptly so notify the other party so that the other party may seek a protective order or appropriate remedy and/or waive compliance with this Agreement and if such protective order or other remedy is not obtained or the other party waives compliance with this provision, the requested party will furnish only that portion of such information that is legally required and will exercise its best efforts to obtain a protective order or other reliable assurance that confidential treatment will be accorded the information furnished. If this Agreement is terminated, each party will deliver to the other all documents and other materials (including copies) obtained by such party or on its behalf from the other party as a result of this Agreement or in connection herewith, whether so obtained before or after the execution hereof.

  • Documents and Information After the Closing Date, the Purchaser and the Company shall, and shall cause their respective Subsidiaries to, until the seventh (7th) anniversary of the Closing Date, retain all books, records and other documents pertaining to the business of the Target Companies in existence on the Closing Date and make the same available for inspection and copying by the Purchaser Representative during normal business hours of the Company and its Subsidiaries, as applicable, upon reasonable request and upon reasonable notice. No such books, records or documents shall be destroyed after the seventh (7th) anniversary of the Closing Date by the Purchaser or its Subsidiaries (including any Target Company) without first advising the Purchaser Representative in writing and giving the Purchaser Representative a reasonable opportunity to obtain possession thereof.

  • Documentation and Information Such Stockholder shall not make any public announcement regarding this Agreement or the transactions contemplated hereby without the prior written consent of Parent (such consent not to be unreasonably withheld, conditioned or delayed), except as may be required by applicable Law (provided that reasonable notice of any such disclosure will be provided to Parent, and such Stockholder will consider in good faith the reasonable comments of Parent with respect to such disclosure and otherwise cooperate with Parent in obtaining confidential treatment with respect to such disclosure). Such Stockholder consents to and hereby authorizes Parent to publish and disclose in all documents and schedules filed with the SEC or any other Governmental Entity or applicable securities exchange, and any press release or other disclosure document that Parent reasonably determines to be necessary or advisable in connection with the Offer, the Merger or any other transactions contemplated by the Business Combination Agreement or this Agreement, such Stockholder’s identity, the aggregate number of Subject Shares owned by Stockholders subject to this Agreement, the existence of this Agreement and the nature of such Stockholder’s commitments and obligations under this Agreement, and such Stockholder acknowledges that Parent may, in Parent’s sole discretion, file this Agreement or a form hereof with the SEC or any other Governmental Entity or securities exchange. Such Stockholder agrees to promptly give Parent any information necessary for the preparation of any such disclosure documents, and such Stockholder agrees to promptly notify Parent of any changes with respect to information supplied by such Stockholder specifically for use in any such disclosure document, if and to the extent that any such information shall have become false or misleading in any material respect.

  • Reports and Information Contractor shall at such times and in such forms as the City may require furnish the City such periodic reports as it may request pertaining to the work or services undertaken pursuant to this Agreement, the costs and obligations incurred or to be incurred in connection therewith, and any other matters are covered by this Agreement as specified in Exhibit A and Exhibit E.

  • Records and Information 14.1 A Sector Association and an Operator must retain records of all information required to be supplied to the Administrator under these Rules. 14.2 In particular, an Operator must retain: 14.2.1 sufficient records to allow the Administrator to verify whether a target unit has met its target, including sufficient records to allow the accurate verification of throughput and annual consumption of energy of a target unit; and 14.2.2 records of energy saving actions and measures implemented during each target period. 14.3 A Sector Association and an Operator must make all records which it is required to retain under these Rules available for inspection by the Administrator or a person appointed by the Administrator and must provide copies of such records in response to a request by the date specified in the request. 14.4 All records required to be retained under these Rules must be retained throughout the duration of an agreement and for a period of four years following the termination of an agreement.

  • Other Reports and Information Borrower shall advise Lender promptly, in reasonable detail, of: (a) any Lien, other than Permitted Encumbrances, attaching to or asserted against any of the Collateral or any occurrence causing a material loss or decline in value of any Collateral and the estimated (or actual, if available) amount of such loss or decline; (b) any material change in the composition of the Collateral; and (c) the occurrence of any Default or other event that has had or could reasonably be expected to have a Material Adverse Effect. Borrower shall, upon request of Lender, furnish to Lender such other reports and information in connection with the affairs, business, financial condition, operations, prospects or management of Borrower or any other Credit Party or the Collateral as Lender may request, all in reasonable detail.

  • Fund Information Each Fund will provide documentary evidence of its tax domicile, organizational specifics and other documentation and information as may be required by the Custodian from time to time for tax purposes, including, without limitation, information relating to any special ruling or treatment to which the Fund may be entitled that is not applicable to the general nationality and category of person to which the Fund belongs under general laws and treaty obligations and documentation and information required in relation to countries where the Fund engages or proposes to engage in investment activity or where Portfolio assets are or will be held. The provision of such documentation and information shall be deemed to be a Proper Instruction, upon which the Custodian shall be entitled to rely and act. In giving such documentation and information, the Fund represents and warrants that it is true and correct in all material respects and that it will promptly provide the Custodian with all necessary corrections or updates upon becoming aware of any changes or inaccuracies in the documentation or information supplied.

  • Financial Statements and Information Furnish to the Agent each of the following: (a) as soon as available and in any event within ninety (90) days after the end of each fiscal year of the Credit Parties, Annual Audited Financial Statements of the Credit Parties and their Subsidiaries; (b) as soon as available and in any event within thirty (30) days after the end of each calendar month, Monthly Unaudited Financial Statements of the Credit Parties and their Subsidiaries; (c) concurrently with the financial statements provided for in Subsections 6.3(a) and 6.3(b) hereof, (1) an Officer’s Certificate, signed by a Responsible Officer of applicable Credit Party, and (2) if applicable, a written certificate in Proper Form, identifying each Subsidiary which is otherwise required by the provisions of Section 6.10 hereof to become a Guarantor at the request of the Agent, but which has not yet done so as of the date of such certificate, and providing an explanation of the reasons why each such Subsidiary is not a Guarantor, signed by a Responsible Officer of the applicable Credit Party; (d) as soon as available and in any event within five (5) Business Days after the date of issuance thereof (if any such audit report or management letter is ever issued), any (1) interim or special audit report made by independent accountants of the books of the Credit Parties or any of their Subsidiaries or (2) management letter prepared by the independent public accountants who reported on the financial statements provided for in Subsection 6.3(a) above, with respect to the internal audit and financial controls of the Credit Parties and their Subsidiaries; (e) as soon as available and in any event within thirty (30) days prior to the commencement of each fiscal year of the Credit Parties, management-prepared Consolidated financial projections of the Credit Parties and their Subsidiaries for the immediately following three (3) fiscal years (setting forth such projections on both an annual basis and on a monthly basis for the upcoming fiscal year and on an annual basis only for the two (2) fiscal years thereafter), such projections to be prepared and submitted in such format and detail as reasonably requested by the Agent; and (f) such other information relating to the financial condition, operations and business affairs of any Credit Party or any of its Subsidiaries as from time to time may be reasonably requested by the Agent.

  • Data and Information In furtherance of the authority contained in this Article 5, one or more of the Parties are authorized to obtain, compile, maintain, share, and exchange among themselves, or with one or more third parties, information related to any aspect of intermodal transport, equipment use, inland or marine terminals, operations, cargo throughput, transportation or traffic volumes, equipment use, and/or other information pertaining to matters authorized under this Article 5. Such information may include records, statistics, studies, compilations, projections, costs, data, and electronic or paper documents of any kind or nature whether prepared by a Party or the Parties or obtained from outside sources, relating to matters authorized by Article 5.

  • Use of Contract Documents and Information 3.5.1 The tenderer shall not, without the Procuring entity’s prior written consent, disclose the Contract, or any provision therefore, or any specification, plan, drawing, pattern, sample, or information furnished by or on behalf of the Procuring entity in connection therewith, to any person other than a person employed by the tenderer in the performance of the Contract. 3.5.2 The tenderer shall not, without the Procuring entity’s prior written consent, make use of any document or information enumerated in paragraph 3.5.1 above 3.5.3 Any document, other than the Contract itself, enumerated in paragraph 3.5.1 shall remain the property of the Procuring entity and shall be returned (all copies) to the Procuring entity on completion of the Tenderer’s performance under the Contract if so required by the Procuring entity

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!