Network and Internet Access Sample Clauses

Network and Internet Access. The network is provided to facilitate the sharing of knowledge and information. Resident shall abide by all state and federal laws and regulations and all University regulations regarding the network, such being incorporated herein by reference, and will be held accountable for any inappropriate activity originating from his or her computer.
AutoNDA by SimpleDocs
Network and Internet Access. All content including but not limited to files, photos, videos and music must remain appropriate, as deemed by the college, at all times. The college retains the right to review the content of any device registered under this agreement. Content accessed through the internet will be subject to monitoring and filtering.
Network and Internet Access. Content accessed through the College network will be subject to monitoring and filtering. The College reserves the right to block student access to the network.
Network and Internet Access. Client is responsible for procuring and maintaining its network and any network connections that connect its network to the TeleTracking Software, and all reasonable and appropriate security measures therefor, including, but not limited to, “browser” software that supports protocols used by TeleTracking, including Secure Socket Layer (SSL) protocol or other protocols accepted by TeleTracking, and to follow secure log-on procedures for services that support such protocols. TeleTracking is not responsible for any compromise of data transmitted across computer networks or telecommunications facilities (including, but not limited to, the internet and mobile devices) which are not owned or operated by TeleTracking. TeleTracking assumes no responsibility for the reliability or performance of Client’s network or any network connections thereto.
Network and Internet Access. The Heights Christian Schools Network and internet access is a shared resource. Please use it responsibly with our community members in mind. Internet access on campus is monitored and filtered. Our goal is not ultimately to restrict student access, but to educate students about responsible and appropriate use. If we find a student accessing inappropriate material at school or using the technology in an inappropriate manner, the school will respond. If disciplinary action is deemed necessary, a conversation with parents and appropriate consequences, as determined by the administration, will follow. Heights Christian Schools is a wireless campus. All Chromebooks have access to the wireless network. It is expected that students will: • Use the internet for appropriate work and resources—make good decisions for themselves and the people around them. • Refrain from downloading large multimedia files in school. • Save online gaming (not sanctioned by a teacher) and nonacademic multimedia consumption for home, if permitted at home. Students in Kindergarten – 4th grade are restricted from sending and receiving email. Students in grades 5th – 6th are restricted to within the HCS domain. These email communications are monitored. Students will not be able to send and receive emails outside of our school community. Students should use their Heights Christian Schools-provided email account for all school communications. Students should not use email or other electronic communication during class unless specifically instructed by the teacher. The Chromebook allows easy access to information online. It is important that students remember to do their own work on assignments using material they find from various sources. Students deserve the opportunity to be an author and to respect the work of other authors. Copying other people’s work, whether intentionally or unintentionally, is considered plagiarism and will result in a response from the school. If disciplinary action is deemed necessary, consequences to academic dishonesty are outlined in Expectations for Behavior. Students may not use social networking sites at school. Our filters are strong and intended to restrict access, but students are ultimately responsible for making good choices. In addition, online chatting or video conferencing with classmates during class is dependent on teacher permission. Parents are strongly encouraged to establish guidelines pertaining to how these tools may be used at home.
Network and Internet Access. County provides the Comal County Law Librarian with secure County network and Internet access including County provided email and the currently licensed version of Microsoft Office. Law Library PC’s that are used by library patrons are provided with network and Internet access on a public network. Law Librarian understands that all network and internet access as well as I. T. services and technical assistance provided to the Law Library will be done so in accordance with County I.T. operations standards. This includes the Comal Acceptable Use Policy, Comal Security Policies and Standards, Comal Network Access and Password Policy and Comal Internet Use Policy. (Available electronically on Comal County Intranet). It is further understood that Comal County I.T. does not grant any user access rights or privileges nor does it offer technical training or assistance to non-county personnel with the exception of certain contractors or vendors upon execution of the Vendor Access Policy. In instances where Law Library support is requested and said support is provided via remote access, I.T. staff will coordinate the remote access with the Law Librarian in order to ensure that the computer being accessed by technicians is not in use by a Law Library patron.
Network and Internet Access. A. The School District is providing access to its computer networks and the Internet for only educational purposes. If you have any doubt about whether a contemplated activity is educational, you may consult with the person(s) designated by the School to help you decide if a use is appropriate.
AutoNDA by SimpleDocs

Related to Network and Internet Access

  • Internet Access Hotels and Airports Employees who travel may need to access their e-mail at night. Many hotels provide free high speed internet access and Tyler employees are encouraged to use such hotels whenever possible. If an employee’s hotel charges for internet access it is reimbursable up to $10.00 per day. Charges for internet access at airports are not reimbursable.

  • Network Access TENANT may find it necessary to purchase a network interface card, wireless PC card or other hardware in order to connect to the internet service. LANDLORD is not responsible for the purchase of these items and LANDLORD cannot guarantee compatibility with any device TENANT may have. The computer and network card must have software installed that supports the Internet Protocol commonly referred to as TCP/IP. Any conflicts between the software compatibility of the network and the TENANT’S computer operating system or any other feature will be the responsibility of the TENANT to resolve. LANDLORD will not be responsible for software issues related to the user’s personal computer.

  • Network Services Local Access Services In lieu of any other rates and discounts, Customer will pay fixed monthly recurring local loop charges ranging from $1,200 to $2,000 for TDM-based DS-3 Network Services Local Access Services at 2 CLLI codes mutually agreed upon by Customer and Company.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • Computer Access Where possible, providing no additional costs are incurred by the Employer, one (1) authorized representative of each Union shall be entitled to submit for posting on the Employer's electronic communication system one electronic Union notice per month for members of the bargaining unit. The Employer shall determine the method of distribution. The Employer shall review all proposed notices and retain a discretion not to post any notice that it deems unlawful or contrary to the Employer’s interests, which discretion shall not be unreasonably exercised. The Union agrees to indemnify the Employer for any liability arising out of offensive or otherwise unlawful notices posted by the Union. Nothing in this Article requires a change to distribution practices that existed prior to April 1, 2015.

  • NETWORK INTERCONNECTION METHODS 3.1 The Interconnection provided herein may not be used solely for the purpose of originating a Party’s own interexchange traffic.

  • Internet Use Customer assumes total responsibility for its and its users’ use of the Internet. Masergy specifically disclaims any warranties, endorsements or representations regarding any merchandise, information, software, products, data, files, or services provided through the Internet.

  • Availability of Verizon Telecommunications Services 3.1 Verizon will provide a Verizon Telecommunications Service to Z-Tel for resale pursuant to this Attachment where and to the same extent, but only where and to the same extent, that such Verizon Telecommunications Service is provided to Verizon’s Customers. 3.2 Except as otherwise required by Applicable Law, subject to Section 3.1, Verizon shall have the right to add, modify, grandfather, discontinue or withdraw, Verizon Telecommunications Services at any time, without the consent of Z-Tel. 3.3 To the extent required by Applicable Law, the Verizon Telecommunications Services to be provided to Z-Tel for resale pursuant to this Attachment will include a Verizon Telecommunications Service customer-specific contract service arrangement (“CSA”) (such as a customer specific pricing arrangement or individual case based pricing arrangement) that Verizon is providing to a Verizon Customer at the time the CSA is requested by Z-Tel.

  • WORK ACCESS The Association shall provide a current, written list of its Association Representatives to all heads of departments, offices, or bureaus represented herein and the CAO. The Association shall be responsible for keeping the list current. An Association Representative shall have access to department, office, or bureau facilities where Unit members are employed during regular working hours to assist employees covered under this MOU in addressing grievances when such Association assistance is requested by a grievant(s) or to investigate matters arising out of the application of the provisions of this MOU. The Association Representative shall request authorization for such visits by contacting the designated Management representative of the head of the office, department, or bureau. In the event immediate access cannot be authorized, the designated Management representative shall inform the Association Representative as to the earliest time when access can be granted. This Article shall not be construed as a limitation on the power of the head of a department, office, or bureau to restrict access to areas designated for security or confidential purposes.

  • System Access CUSTOMER agrees to provide to PROVIDER, at CUSTOMER’S expense, necessary access to the mainframe computer and related information technology systems (the “System”) on which CUSTOMER data is processed during the times (the “Service Hours”) specified in the PSAs, subject to reasonable downtime for utility outages, maintenance, performance difficulties and the like. In the event of a change in the Service Hours, CUSTOMER will provide PROVIDER with at least fifteen (15) calendar days written notice of such change.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!