We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.

For more information visit our privacy policy.

Monitoring Software Sample Clauses

Monitoring Software. Teachers, school administrators, and the technology department staff may use monitoring software that allows them to view the screens and activity on student Chromebooks.
Monitoring SoftwareSchool administrators, teachers, and instructional technology staff may use monitoring software that allows them to view screens and activity on student Chromebooks, laptops, iPads, Google accounts, or any other district issued technology at any time. Additionally all Carlynton School District Google accounts have the Impero extension automatically activated. This means that if a Carlynton School District Google account is being used on a personal computer and or Chromebook, those activities can be monitored. To avoid this, you must not use a Carlynton School District Google account or discontinue use of Google Chrome while logged into a Carlynton School District Google account on a personal device. All images, documents, files, and apps downloaded onto the Chromebook becomes the property of Carlynton School District as allowable by law.
Monitoring Software. Teachers, school administrators, and the technology department staff may use monitoring software that allows them to view the screens and activity on student iPads/Laptops.
Monitoring SoftwareSchool administrators, teachers, and instructional technology staff may use monitoring software that allows them to view screens and activity on student devices at any time. Files Downloaded onto Devices - All images, documents, files, and apps downloaded onto the device become the property of East Allegheny School District as allowable by law.
Monitoring Software. Regent uses intrusion detection software, network monitoring software, log monitoring software, port scan detectors, and network sniffer detectors. These utilities help with the daily monitoring of servers. Some of the key usage and uptime metrics monitored on a continual basis include: • Server uptime • Windows Services running on the machine • Memory utilization / quota • CPU utilization /quota • Disk utilization / quota • Port availability • Health check pages • Uptime availability Reports
Monitoring Software. In order to provide the services specified in this Agreement, Consultant must install remote monitoring and management software on Client’s servers, desktop computers, laptops, or possibly other equipment at Client’s office. Client grants permission to Consultant to install remote monitoring and management software or any other remote monitoring and managing software deemed necessary by Consultant.
Monitoring Software. ● Students have no expectation of confidentiality or privacy with respect to any usage of a Chromebook, regardless of whether that use is for school related or personal purposes, other than as specifically provided by law. TCS may, without prior notice or consent, log, supervise, access, view, monitor, and record use of student Chromebooks at any time for any reason related to the operation of the school. By using a Chromebook, students agree to such access, monitoring, and recording of their use. ● Teachers, school administrators, and the technology department staff may use monitoring software that allows them to view the screens and activity on students Chromebooks.
Monitoring Software. Provider, in its sole discretion, may utilize hosted remote monitoring software, such as N- Able Technologies N-Central Hosted Remote Monitoring and Management Software, (“Monitoring Software”) to aid in providing Client with the Services. Provider is responsible for installing the Monitoring Software, using the software to manage and monitor the Supported Devices, managing and monitoring the software, billing, and collection of payments for the Monitoring Software. Provider shall have no liability with respect to the content of the Monitoring Software or any part thereof, including but not limited to errors or omissions contained therein, libel, infringements of rights of publicity, privacy, trademark rights, business interruption, personal injury, loss of privacy, moral rights or the disclosure of confidential information. Provider shall have no liability with respect to any damage resulting from Client’s improper use of the Monitoring Software.
Monitoring SoftwareSchool administrators, teacher, and technology staff may use monitoring software that allows them to view screens and activity on student Chromebooks while at school. All images, documents, files, and apps downloaded onto the Chromebook become the property of Xxxxxx Xxxxxxxx Area School District as allowable by law. Please read this entire document to determine if this program is needed for you and your child’s protection against damage of the loaned Chromebook equipment in your care. Please refer to the Incident Assessment Chart to see how the whole plan, associated potential charges, and incident reporting work. This form must be completed and marked YES or NO before the Chromebook will be provided to the student. The administration will review all damages determined to be from misuse or negligence and will assess the student’s continued privilege of taking the Chromebook to and from School. It will be the right of the school administrators and designees to determine if damages were due to negligence or accidental.
Monitoring SoftwareNetwork monitoring software and the data that it produces is that is the property of Advanced Computer Connections, Inc. The Client has no rights to the software. If the service is terminated, the Client will not have access to the program or any information it provides.