MAIL USAGE POLICY Sample Clauses

MAIL USAGE POLICY. Use of e-mail to engage in any communication in violation of district policies including transmission of defamatory, obscene, profane, offensive, or harassing messages or messages that disclose personal information without authorization is strictly prohibited. Use caution in addressing messages to ensure that new messages are not inadvertently sent to the wrong party. This is critical because of the sensitive nature of the documents we often may be asked to e-mail. Always double check that the address you are using is correct and current. E-mail and other electronic communications systems can be useful tools permitting rapid and efficient communication with a large audience. This same strength can be a weakness as a hastily written note may be subject to misinterpretation in the future, when the context is not so clear. This is particularly true when your message is subject to being forwarded, rerouted or saved by others. For this reason, when sending electronic messages, you should keep the following test in mind: “Would I be concerned if I had to read this message out loud, under oath as a witness in a courtroom proceeding?” If that possibility does not unduly concern you, then your message is probably acceptable. Use of another user’s name/account to access e-mail or the Internet is strictly prohibited.
AutoNDA by SimpleDocs
MAIL USAGE POLICY. Use of email to engage in any communication in violation of College policies including transmission of defamatory, obscene, profane, offensive or harassing messages or messages that disclose personal information without authorization is strictly prohibited. Use of another user’s name/account to access email or the Internet is strictly prohibited. Personally Identifiable Information (PII) or sensitive data should NEVER be sent via email, either in the body of the email or in an attachment. Unencrypted email is not a secure method for transmitting confidential information or sensitive data over the Internet. If it is necessary to send such information, take steps to secure it by encrypting your message, taking into account the sensitivity of the data being transmitted and the level of security at the source and destination systems. FERPA (Family Educational Rights and Privacy Act) is a federal law that protects the privacy of student education records. Students have specific, protected rights regarding the release of such records and FERPA requires that institutions adhere strictly to these guidelines. Therefore, it is imperative that faculty and staff have a working knowledge of FERPA guidelines before releasing educational records. More information regarding FERPA can be found at: xxx.xx.xxx/xxxxxx/xxx/xxxx/xxxx/xxxxx/xxxxx.xxxx.

Related to MAIL USAGE POLICY

  • Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • Line Information Database (LIDB 9.1 BellSouth will store in its Line Information Database (LIDB) records relating to service only in the BellSouth region. The LIDB Storage Agreement is included in this Attachment as Exhibit C. 9.2 BellSouth will provide LIDB Storage upon written request to <<customer_name>>’s Account Manager stating a requested activation date.

  • DNS name server availability Refers to the ability of a public-­‐DNS registered “IP address” of a particular name server listed as authoritative for a domain name, to answer DNS queries from an Internet user. All the public DNS-­‐registered “IP address” of all name servers of the domain name being monitored shall be tested individually. If 51% or more of the DNS testing probes get undefined/unanswered results from “DNS tests” to a name server “IP address” during a given time, the name server “IP address” will be considered unavailable.

  • Personal Car Usage 7.1 Personal vehicle usage will be reimbursed in an amount equal to the standard mileage rate allowed by the IRS. 7.2 Per code of Federal Regulations, Title 26, Subtitle A, Chapter 1, Subchapter B, Part IX, Section 274(d), all expense reimbursement requests must include the following: 7.2.1.1 Date 7.2.1.2 Destination 7.2.1.3 Purpose 7.2.1.4 Name of traveler(s) 7.2.1.5 Correspondence that verifies business purpose of the expense 7.3 The mileage for a personal vehicle must document the date, location of travel to/from, number of miles traveled and purpose of trip. 7.4 Mileage will be reimbursed on the basis of the most commonly used route. 7.5 Reimbursement for mileage shall not exceed the cost of a round trip coach airfare. 7.6 Reimbursement for mileage shall be prohibited between place of residence and usual place of work. 7.7 Mileage should be calculated from employee’s regular place of work or their residence, whichever is the shorter distance when traveling to a meeting or traveling to Williamson County, Texas for vendors who are located outside of the Williamson County Courthouse, 000 Xxxx Xxxxxx, Xxxxxxxxxx, Xxxxx 00000 by at least a 45-mile radius. 7.8 When more than one person travels in same vehicle, only one person may claim mileage reimbursement. 7.9 Tolls, if reasonable, are reimbursable. Receipts are required for reimbursement. If a receipt is not obtainable, then written documentation of expense must be submitted for reimbursement (administrative fees on Tolls will not be reimbursed). 7.10 Parking fees, if reasonable are reimbursable for meetings and hotel stays. For vendors who contract with a third party for visitor parking at vendor’s place of business, Williamson County will not reimburse a vendor based on a percentage of its contracted visitor parking fees. Rather, Williamson County will reimburse Vendor for visitor parking on an individual basis for each time a visitor uses Vendor’s visitor parking. Receipts are required for reimbursement. If a receipt is not obtainable, then written documentation of expense must be submitted for reimbursement. 7.11 Operating and maintenance expenses as well as other personal expenses, such as parking tickets, traffic violations, and car repairs and collision damage are not reimbursable.

  • REPORT OF CONTRACT USAGE All fields of information shall be accurate and complete. The report is to be submitted electronically via electronic mail utilizing the template provided in Microsoft Excel 2003, or newer (or as otherwise directed by OGS), to the attention of the individual shown on the front page of the Contract Award Notification and shall reference the Group Number, Award Number, Contract Number, Sales Period, and Contractor's (or other authorized agent) Name, and all other fields required. OGS reserves the right to amend the report template without acquiring the approval of the Office of the State Comptroller or the Attorney General.

  • Enhanced Optional Daily Usage File Upon written request from <<customer_name>>, BellSouth will provide the Enhanced Optional Daily Usage File (EODUF) service to <<customer_name>> pursuant to the terms and conditions set forth in this section. EODUF will only be sent to existing ODUF subscribers who request the EODUF option.

  • Optional Daily Usage File (ODUF 11.1 The Optional Daily Usage File (ODUF) Agreement with terms and conditions is included in this Attachment as Exhibit D. Rates for ODUF are as set forth in Exhibit F of this Attachment. 11.2 BellSouth will provide ODUF service upon written request to its Account Manager stating a requested activation date.

  • Optional Daily Usage File Upon written request from <<customer_name>>, BellSouth will provide the Optional Daily Usage File (ODUF) service to <<customer_name>> pursuant to the terms and conditions set forth in this section.

  • Loss, Theft, Etc of Notes. Upon receipt of evidence satisfactory to the Company of the loss, theft, mutilation or destruction of any Note, and in the case of any such loss, theft or destruction upon delivery of a bond of indemnity in such form and amount as shall be reasonably satisfactory to the Company, or in the event of such mutilation upon surrender and cancellation of the Note, the Company will make and deliver without expense to the holder thereof, a new Note, of like tenor, in lieu of such lost, stolen, destroyed or mutilated Note. If the Purchaser or any subsequent Institutional Holder is the owner of any such lost, stolen or destroyed Note, then the affidavit of an authorized officer of such owner, setting forth the fact of loss, theft or destruction and of its ownership of such Note at the time of such loss, theft or destruction shall be accepted as satisfactory evidence thereof and no further indemnity shall be required as a condition to the execution and delivery of a new Note other than the written agreement of such owner to indemnify the Company.

  • Mobile Application If Red Hat offers products and services through applications available on your wireless or other mobile Device (such as a mobile phone) (the "Mobile Application Services"), these Mobile Application Services are governed by the applicable additional terms governing such Mobile Application Service. Red Hat does not charge for these Mobile Application Services unless otherwise provided in the applicable additional terms. However, your wireless carrier's standard messaging rates and other messaging, data and other rates and charges will apply to certain Mobile Application Services. You should check with your carrier to find out what plans your carrier offers and how much the plans cost. In addition, the use or availability of certain Mobile Application Services may be prohibited or restricted by your wireless carrier, and not all Mobile Application Services may work with all wireless carriers or Devices. Therefore, you should check with your wireless carrier to find out if the Mobile Application Services are available for your wireless Device, and what restrictions, if any, may be applicable to your use of such Mobile Application Services.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!