Laptops Sample Clauses

Laptops. The Font Software may be installed and used on a laptop as a secondary and alternate use computer.
AutoNDA by SimpleDocs
Laptops. The Government will procure laptops as Government Furnished Equipment (GFE) and will issue to the contractor. Laptops will be Government property and will be identified on the contractor's hand receipt.
Laptops. An employee can elect to sacrifice the purchase of a laptop as per the ATO rulings. Variations to this general policy may be negotiated by the CEO and will need to be reflected in the total remuneration package value.
Laptops. 2.1.1. Students have one-to-one access to individually assigned laptops which they can use in class and at home to support their learning. 2.1.2. In specialist learning areas, like AV Studies, Music and Art, students have access to dedicated desktop computers to support their classroom learning. 2.1.3. Student access to a variety of mobile digital devices, such as iPads, tablets and ActivExpression devices, is available according to learning activities managed by staff.
Laptops. Laptops are a great convenience. They also come with many risks including ease of theft, operation in unsecured environments, and easily intercepted wireless communications. In order to protect our valuable information; laptop users must follow these rules of use: • Only City approved laptops may be used to access City information resources. • Laptops are subject to the same City controls as workstations, including patch requirements, malware protection, firewall rules, screen saver timeouts, etc. • Laptops must be full disk encrypted. • Laptops must be physically secured at all times. • The theft or loss of a laptop must be reported to the IT Department immediately. • Protected and/or Confidential company data cannot be stored on laptops unless specifically authorized by the IT Department. REMOTE ACCESS This section applies to all users who have been granted permission to access the Organization’s internal computing resources from a remote location. REMOTE ACCESS POLICY • Remote access to the City’s network will be provided to users authorized by the IT Department. • Any devices used for remote connectivity to the City’s network must conform to the City remote access standards. • Termination of an authorized user’s Remote Access is handled through the standard employee termination process upon employee termination or at management’s request. REMOTE ACCESS SYSTEM Users must review this Acceptable Use Agreement and acknowledge they understand their requirements in respect to remote access. • City information WILL NOT be stored on / saved to the remote workstation unless authorized by the IT Department. • Remote access connections must use the authorized remote access solution, Windows Virtual Desktop or Remote Desktop with SSLVPN (NetExtender). • Remote access connections require two factor authentication where possible. • The remote workstation will: o Be kept physically secure and not be used by anyone other than a City workforce member. o Have security controls in place: ▪ Antivirus Software installed and virus definition files updated. ▪ Desktop Firewall Software. ▪ Updated and current with operating system and application patches. ▪ No critical vulnerabilities or malware are present that could negatively affect the health of the City network. PHYSICAL ACCESS The section applies to all facilities operated by the City and all workforce members and any other person who may come in physical contact with resources that affect the City’s information assets o...
Laptops. Students are required to bring their school assigned laptop to class every day. The expectation is that laptops will be charged, but if not, students will be able to utilize the plugs on their desks to charge their laptops. For students to be successful this academic year, laptops are vital to the success. Without having a laptop, students will not be able to participate fully in lessons, assignments, quizzes, exams, or any other work in this class. Paper copies will not be provided as an option to not bringing your laptop. Paper copies will typically only be provided if there is a special circumstance or if there is no wifi during class time. Students will not be permitted to use their cell phones to complete class work in lieu of their computer. Students should not expect this to be done as an exception at any time unless an assignment warrants the use of the student’s cell phones. Please see the cell phone policy below.
Laptops. Laptops are a great convenience. They also come with many risks including ease of theft, operation in unsecured environments, and easily intercepted wireless communications. In order to protect our valuable information; laptop users must follow these rules of use: • Only Brunswick approved laptops may be used to access Brunswick information resources. • Laptops are subject to the same Brunswick controls as workstations, including patch requirements, malware protection, firewall rules, screen saver timeouts, etc. • Laptops must be full disk encrypted. • Laptops must be physically secured at all times. • The theft or loss of a laptop must be reported to xxxxxxx@xxxxxxxxxxx.xxx immediately. • Protected and/or Confidential organizational data cannot be stored on laptops unless specifically authorized by the IT Director.
AutoNDA by SimpleDocs
Laptops. Managers will be entitled to the use of a laptop (not older than 4 years), for business and private use.
Laptops. Feature Technical Specs Met Not Met General Technical Features

Related to Laptops

  • Computers All computers, hardware, software, computer upgrades and maintenance in connection therewith shall be at Owner's expense.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Cell Phones The College follows the State’s Cell Phone Policy. Employees who receive cell phones from the College shall also abide by this Policy. The College shall provide the Policy to any employee who is given a cell phone. Employees are responsible for the cost of all personal calls. While the College anticipates some incidental personal use of cell phones, it is also expected that such use is infrequent.

  • Computer The Contractor shall maintain at its office for its use a computer with, at a minimum, a 1 GHz processor and an internet connection. The Contractor shall maintain individual email accounts for each of its project managers.

  • Telephones The Unit may or may not have a telephone. If this is a material concern please check with Manager to determie if the Unit has phone service. Phones are for local calls only. LIMITED DAMAGE WAIVER PROGRAM

  • Devices BNY Mellon will restrict the transfer of Customer Data from its network to mass storage devices. BNY Mellon will use a mobile device management system or equivalent tool when mobile computing is used to provide the services. Applications on such authenticated devices will be housed within an encrypted container and BNY Mellon will maintain the ability to remote wipe the contents of the container.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • Badges (A) Correctional officers and correctional probation officers shall be issued badges according to the following specifications: (1) Badges issued to correctional officers below the rank of lieutenant shall be silver metal, black lettering and pre-numbered. These badges shall be worn on the officers’ uniforms in a manner consistent with department policy and procedures. (2) Badges issued to correctional officers at the rank of lieutenant and above shall be gold metal, black lettering and pre-numbered. These badges shall be worn on the officers’ uniforms in a manner consistent with department policy and procedures. (3) Badges issued to correctional probation officers shall be police size. These badges shall be carried in badge holders and in accordance with department procedure. (B) Correctional officers are only authorized to wear issued badges with the correctional officer class “A” or “B” uniform, and only while performing official duties, or while in uniform and traveling to or returning from their official duty station. (C) The use of an issued badge as a credential for personal purposes is prohibited. (D) Issued badges are considered state property and, except for retirement under specific conditions or death in the line of duty, are to be returned upon an employee’s termination of employment with the department or removal from a position in the Security Services Unit. Only badges, which are issued by the department, shall be used to conduct officially designated duties. Employees shall be responsible for reimbursing the department for any issued badge which is lost. (E) Correctional officers and correctional probation officers who retire from the department under honorable conditions from the Florida Retirement System upon reaching the appropriate retirement age of 55 or 25 years of continuous service, including retirement under medical disability, shall be authorized to retain their issued badge. (F) The badge of a correctional officer or a correctional probation officer who is killed in the line of duty shall be presented to the employee’s next of kin. (G) Upon request, correctional officers and correctional probation officers who are promoted or transferred to other positions may retain their badge if they are in good standing with the department and pay the cost of the badge.

  • Hardware NCR Voyix may offer you the option to purchase or subscribe to Hardware. Hardware provided may not be new but may be like-new, except for Hardware purchased from NCR Voyix, which will be new. Delivery of the Hardware will be made to your designated Licensed Site(s). All Hardware purchased by you directly from NCR Voyix or from a Reseller for use in the United States, including Alaska and Hawaii, includes a standard 30-day non-transferable warranty against defects in manufacture, beginning on the date of purchase. Damage from wear and tear, misuse and other factors are not covered.

  • Passwords Passwords are an important aspect of computer security. A poorly chosen password may result in unauthorized access and/or exploitation of Placer County’s resources. All users, including contractors and vendors with access to the County’s systems, are responsible for the creation and protection of passwords and additionally any updates to County Password policies must be followed. Users must not use the same password for Placer County accounts and personal accounts. The reliability of passwords for maintaining confidentiality cannot be guaranteed. Always assume that someone, in addition to the intended or designated recipient, may read any and all messages and files. Any user suspecting that his/her password may have been compromised must, without delay, report the incident to Placer County IT. 10.2.4.1 Passwords must never be shared or disclosed. If a password is accidentally exposed or suspected of exposure, the password should be changed immediately. 10.2.4.2 All passwords must be changed on a specified, periodic basis. 10.2.4.3 Default passwords provided by the vendor for access to applications/systems on the network must be changed to unique and secret passwords. 10.2.4.4 Immediately inform the Information Technology Service Desk when user accounts are no longer required or will not be used for a period of 30 days or more. 10.2.4.5 All accounts not used for 90 days will be automatically disabled.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!