Laptop Bags Sample Clauses

Laptop Bags. A. All BCS laptops must be stored and carried in an approved laptop bag. If the laptop is not stored in an appropriate bag it may be considered abuse/misuse and the student may be required to pay the full replacement cost.
AutoNDA by SimpleDocs
Laptop Bags. You are highly encouraged to obtain and use a waterproof laptop bag to protect your computer. Bags should be padded and designed for laptop computers. Taking good care of your laptop is cheap and easy. Keep your laptop safe. It is a target for thieves. Don’t leave it sitting in a car in plain view. Better yet, don’t leave it in a car at all (heat will damage the computer). Don’t leave your laptop sitting around unattended. Keeping your laptop in a laptop bag that has padding is the best place for it. You have the responsibility to treat your laptop correctly. Dropping it onto a desk or the floor can be damaging. Don’t fling it around. Don’t stack things on top of it. Don’t hold it by one corner. Instead use two hands. If you think about how it might fall before it does fall, you can usually prevent that fall from happening in the first place. Don’t loan your computer to someone else. You are the person responsible for what happens to your laptop. You can’t blame someone else for damage if you had the opportunity to stop damage from occurring. Friends or siblings could do damage that you will be responsible for. Email You will be provided with a District sponsored “student safe” email account. It is very important that you keep your password secret! Someone else logging into your email and sending inappropriate messages will get you into trouble. You will be expected to use your school email for communicating with students, teachers, and other staff. Email etiquette:
Laptop Bags. 1. The school provides a laptop bag, but it is the student’s responsibility to ensure they use their bag or an approved laptop bag that is in workable condition.

Related to Laptop Bags

  • Computers All computers, hardware, software, computer upgrades and maintenance in connection therewith shall be at Owner's expense.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store County PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Security Office.

  • Cell Phones The College follows the State’s Cell Phone Policy. Employees who receive cell phones from the College shall also abide by this Policy. The College shall provide the Policy to any employee who is given a cell phone. Employees are responsible for the cost of all personal calls. While the College anticipates some incidental personal use of cell phones, it is also expected that such use is infrequent.

  • Servers Marco backs up the following servers only: Windows Servers, SQL servers, Exchange server, and Virtual Machines images running VMWare or Hyper V.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • Mobile Phones The Company’s expectations in relation to the use of Company provided mobile phones are outlined in Company policy HR-P13. If an Employee is provided with a mobile phone by the Company, the Employee shall be liable for the cost of excessive private telephone calls. Employees agree to make themselves contactable via their personal mobile phone to receive instructions from their supervisors, with the Company reimbursing Employees the cost of any such telephone calls. It is not a condition of employment to own a mobile phone. No Employee shall be engaged in private telephone conversations whilst at work with the exception of designated breaks and in emergency situations. The Company will not be liable for the repair or replacement of personal mobile phones.

  • Server Software Subject to the terms and conditions of this XXXX, Vocera grants you the non-exclusive right to (i) install and run (“Use”) the Server Software on computer systems (each, a “Server Computer”) located at End User’s Facilities in the geographic territory designated above (“Territory”); (ii) to Use the Client Software in conjunction with Authorized Client Devices and such Server Computers; and (iii) for pilot licenses for certain Software provided on a trial basis, use such Software for the limited term specified by Vocera in writing. You may Use the standard Server Software on one primary Server Computer (or a primary cluster of computers suitably configured for productive use of the Server Software). You may install backup copies of the Server Software on backup Server Computers to provide redundancy in the event of failure of the primary Server Computer(s) but, unless you have acquired additional licenses or a failover license from Vocera, you may not run such backup or additional copies concurrently with the primary copies. Vocera grants you the right to use the applicable License Key issued by Vocera only to enable Use of the Server Software in conjunction with the licensed Server Computers. Server Software may be licensed for a Subscription Term as specified in the Quote.

  • Devices BNY Mellon will restrict the transfer of Customer Data from its network to mass storage devices. BNY Mellon will use a mobile device management system or equivalent tool when mobile computing is used to provide the services. Applications on such authenticated devices will be housed within an encrypted container and BNY Mellon will maintain the ability to remote wipe the contents of the container.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!