Monitoring Usage. ● Student activity on the Chromebook, including browsing history, email and files, may be monitored by the school district. ● Students should never be left unsupervised while using Chromebooks or other computers. While at school, this is the responsibility of the school-district personnel. While at home, this is the responsibility of the parent and/or guardian. ● Students will provide access to the Chromebook and any accessories assigned to them upon request by the school or district. A search of the Chromebook and student files may be conducted if there is suspicion that any policies, procedures, or guidelines have been violated. ● School District personnel will be able to monitor student Chromebooks at any point during the day through remote monitoring software (there is no way to remotely access or view the camera on the device). Care must be taken with any application running that displays the camera on the screen as what is displayed on the screen can be seen remotely. ● Students may be randomly selected to provide the Chromebook for inspection. Students with damaged Chromebooks who fail to report the damage will be subject to additional fines and disciplinary actions. ● In the event of a Chromebook that is reported stolen, WCPS may take steps to locate the device including accessing files, logs, location data or screenshots from the Chromebook. Police reports will be filed for any stolen devices.
Monitoring Usage. 7.1. Monitoring user activity is important for early detection of attacks and incidents, as well as inappropriate usage by pupils or staff.
7.2. The school will inform all pupils and staff that their usage will be monitored, in accordance with the school’s Acceptable Use Policy and E-safety Policy.
7.3. An alert will be sent to the ICT technician when monitoring usage, if the user accesses inappropriate content or a threat is detected. Alerts will also be sent for unauthorised and accidental usage.
7.4. Alerts will identify the user, the activity that prompted the alert and the information or service the user was attempting to access.
7.5. The ICT technician will record any alerts using an incident log and will report this to the Executive Headteacher. All incidents will be responded to in accordance with section 11 of this policy, and as outlined in the E-safety Policy.
7.6. All data gathered by monitoring usage will be kept in a secure location, SBM office, for easy access when required. This data may be used as a method of evidence for supporting a not yet discovered breach of network security.
Monitoring Usage. You acknowledge and agree that StandardFusion may, from time to time, review and monitor use of the Services, including analysis of individual user behaviour, in order to test and evaluate the performance of the Services and to protect the operation and integrity of StandardFusion’s systems. StandardFusion may collect technical data and related account activity information, including, but not limited to, technical information about your use of the Services (for example: session length, device type, operating system), and use this information (other than User Data) for purposes of research, development, and service improvement. Such information does not include User Data and is data used by StandardFusion internally. The foregoing shall not
Monitoring Usage. The Student will provide access to the Student Laptop and any accessories assigned to them upon request by the school or district. Glassboro Public Schools District or its designees may search the Student Laptop and student files if there is suspicion that any policies, procedures, or guidelines have been violated. Glassboro Public Schools District technicians and personnel will be able to monitor the Student Laptop at any point during the day through remote transmission. Students may be randomly selected to provide the Student Laptop for inspection. Students with damaged Student Laptops who fail to report the damage will be subject to additional fines and disciplinary actions.
Monitoring Usage. 5.1 The Supplier reserves the right to use a security mechanism within the Software to monitor usage of the Software by Authorised Users (including tracking User Subscriptions if applicable) in order to establish that the Customer’s and Authorised Users’ use of the Software is in accordance with this Agreement. The Customer shall not engage in any activity designed to circumvent or obstruct, or which has the effect of circumventing or obstructing, the Software’s monitoring and/or tracking capabilities.
5.2 In addition to the above, the Customer shall permit the Supplier to audit usage of the Software no more than once per quarter, at the Supplier’s expense, and this right shall be exercised with reasonable prior notice, in such a manner as not to substantially interfere with the Customer’s normal conduct of business.
5.3 If any of the monitoring or audit measures referred to in this clause 5 reveal that the Customer has underpaid Subscription Fees to the Supplier (or Reseller), then without prejudice to the Supplier’s other rights, the Customer shall pay to the Supplier an amount equal to such underpayment within 30 days of the date the Supplier issues the outcome of the relevant audit to the Customer. The Supplier reserves the right, without liability to the Customer or prejudice to its other rights, to suspend the Subscription if the Customer does not pay such underpayment by the due date.
Monitoring Usage. Sphera may monitor the usage of SaaS and Sphera Property to ensure Client’s compliance with the authorization rights, limitations and restrictions described in this Section 3.
Monitoring Usage. Usage of all services will be continuously monitored to ensure compliance with this FUP. AFT aggregates usage statistics across all accounts to identify patterns and potential issues of non-compliance.
Monitoring Usage. We reserve the right to monitor your use of our services and network or use of the network of our service provider partners. This may include investigating matters such as bandwidth consumption and its impact on the operation and efficiency of the overall network and services.
Monitoring Usage. NORC reserves the right to take measures to monitor Requestor's use of the Data to ensure that the Requestor complies with all terms of this Agreement. These measures include, without limitation:
a. NORC may maintain a full record of all computer-based interactions with the Data.
b. NORC may review all Requestor's data output derived from Data.
Monitoring Usage. The Licensor reserves the right to monitor the Licensee’s use of the Products. If the Licensor shall have any questions about the Licensee’s use of the Products, the Licensor may raise these as issues with the Licensee. In any such case, the Licensee will investigate any such issues to endeavour to determine whether there has been a violation of the License Agreement, and will provide reasonable responses, including the results of its investigation, to the Licensor.