Monitoring the Use of ICT Sample Clauses

Monitoring the Use of ICT. 18.1 Use of the Council communications equipment and systems (e.g. email, Internet usage, telephone usage) is routinely monitored by the Council for the following purposes:- • to help ensure compliance with regulatory or self-regulatory practices and procedures • To help ensure compliance with Information Security standards • to ascertain or demonstrate achievement of operational quality standards • to prevent or detect crime or misuse • to detect and investigate unauthorised use • to detect excessive use for personal purposes Appendix A – Legal Acts Governing the Use of ICT All users of WBC ICT Shall comply with all laws pertaining to the use of ICT. Current relevant law includes, but is not restricted to, the acts listed in the table below. Legal Act The Computer Misuse Act 1990 The Copyright, Designs and Patents Act 1988 The Data Protection Act 1998 The Defamation Act 1996 The Disability Discrimination Act 2005 The Equality Act 2010 The Freedom of Information Act 2000 The Human Rights Act 1998 The Obscene Publications Act 1964 The Protection of Children Act 1999 The Race Relations Act 2000 The Sex Discrimination Act 1975 The Telecommunications Act 1984 The Official Secrets Act 1911-1989 (Possible future requirement for some GCSx Users) Appendix BGlossary of Terms Acronym Meaning Description 3G Data Card 3rd Generation Mobile Data Card A small card that plugs into laptop or tablet PCs and allows internet access via the mobile phone network GCSx Government Connect Secure Extranet A secure private Wide-Area Network (WAN) which enables secure interactions between connected Local Authorities and organisations. ICT Information and Communications Technology Communication equipment and services to provide computing and telephony (often also known as IT) SIM Card Subscriber Identity Module A small computer chip that fits inside a mobile phone and identifies the phone users id an personal facilities and details PIN Personal Identification Number A 4-digit (usually) code which is used to control access to devices such as mobile phones VoIP Voice over IP A technology which allows telephone calls to be made over data networks including the Internet WAN Wide Area Network A computer or communications network that spans a wide geographic area of more than one building, town, or country
AutoNDA by SimpleDocs

Related to Monitoring the Use of ICT

  • We provide Message Boards for the use of Our Website users The Message Boards may not be used to promote Websites or any commercial or business activity. We are not responsible for any of the opinions expressed in the Message Boards. By posting a message to the message board You agree to take full legal responsibility and liability for your comments, including for offensive or defamatory statements. Feedback: Feedback is provided for the purpose of facilitating trading by You on Our Website. Feedback provided on other parties must not contain offensive, defamatory, retaliatory or inappropriate language or content. We may remove any feedback that is considered to be offensive, defamatory, retaliatory or inappropriate. You may only give feedback that relates to a specific transaction. You must not post feedback on a transaction that does not relate to that specific transaction. You must not post feedback about Yourself or include any contact details or Personal Information in Your feedback.

  • Access to and Use of Content Customer has the right to access and use applicable Content subject to the terms of applicable Order Forms, this Agreement and the Documentation.

  • Conditions Affecting the Work The Contractor shall be responsible for having taken steps reasonably necessary to ascertain the nature and location of the Work, and the general and local conditions, which can affect the Work or the cost thereof for any Job Order. Any failure by the Contractor to do so will not relieve him from responsibility for successfully performing the Work without additional expense to the County. The County assumes no responsibility for any understanding or representations concerning conditions made by any of its officers or agents prior to the execution of this Contract, unless such understanding or representations by the County are expressly stated in the Contract.

  • Consent to Use of Data You agree that the Licensor may collect and use technical data and related information, including but not limited to technical information about your device, system and application software, and peripherals, that is gathered periodically to facilitate the provision of software updates, product support and other services (if any) related to the Software. The Licensor may use this information, as long as it is in a form that does not personally identify you, to improve its products or to provide services or technologies.

  • Exclusive Use (A) After the Occupancy Date, Lessee expressly agrees and warrants that the Leased Premises will be used exclusively as a Champps Restaurant or other casual dining sit-down restaurant. In any other such case, after obtaining Lessor's prior written consent, such consent not to be unreasonably withheld or delayed, Lessee may conduct any lawful business from the Leased Premises. Lessee acknowledges and agrees that any other use without the prior written consent of Lessor will constitute a default under and a violation and breach of this Lease. Lessee agrees: To open for business within a reasonable period of time after completion of construction of the contemplated Improvements; to operate all of the Leased Premises during the Term or Renewal Terms during regular and customary hours for businesses similar to the permitted exclusive use stated herein, unless prevented from doing so by causes beyond Lessee's control or due to remodeling; and to conduct its business in a professional and reputable manner.

  • Access, Use, Monitoring and Inspection Site shall provide original or copies (as the case may be) of all Study Data to Quintiles and Sponsor for Sponsor’s use. Site shall afford Sponsor and Quintiles and their representatives and designees reasonable access to Site’s facilities and to Medical Records and Study Data so as to permit Sponsor and Quintiles and their representatives and designees to monitor the Study. 1.3.3.

  • Use of Data by User Registry Operator will permit user to use the zone file for lawful purposes; provided that (a) user takes all reasonable steps to protect against unauthorized access to and use and disclosure of the data and (b) under no circumstances will Registry Operator be required or permitted to allow user to use the data to, (i) allow, enable, or otherwise support the transmission by email, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than user’s own existing customers, or (ii) enable high volume, automated, electronic processes that send queries or data to the systems of Registry Operator or any ICANN-­‐accredited registrar.

  • Server Use This agreement does not permit you to install or Use the Software on a computer file server. For information on Use of Software on a computer file server please refer to xxxx://xxx.xxxxx.xxx/go/acrobat_distribute for information about Adobe Reader; or xxxx://xxx.xxxxx.xxx/go/licensing for information about the Adobe Runtimes.

  • Specific Restrictions on Use of Licensed Materials Unauthorized Use. Licensee shall not knowingly permit anyone other than Authorized Users to use the Licensed Materials.

  • Right to Refuse Unsafe Work Employees have the right to refuse to perform unsafe work pursuant to the Occupational Health and Safety Regulations of the Workers Compensation Act.

Time is Money Join Law Insider Premium to draft better contracts faster.