Unacceptable Use 3.1 The following is considered unacceptable use of the trust’s ICT facilities by any member of the trust community. Any breach of this policy may result in disciplinary or behaviour proceedings 3.2 Unacceptable use of the trust’s ICT facilities includes the below list. This is not an exhaustive list. The trust reserves the right to amend this list at any time. The trust will use professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the trust’s ICT facilities • Using the trust’s ICT facilities to breach intellectual property rights or copyright • Using the trust’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination • Breaching the trust’s policies or procedures • Any illegal conduct, or statements which are deemed to be advocating illegal activity • Online gambling, inappropriate advertising, phishing and/or financial scams • Accessing, creating, storing, linking to, or sending material that is pornographic, offensive, obscene or otherwise inappropriate or harmful • Consensual and non-consensual sharing of nude and semi-nude images and/or videos and/or livestreams (also known as sexting or youth-produced sexual imagery) • Activity which defames or disparages the trust, or risks bringing the trust into disrepute • Sharing confidential information about the trust, its pupils, or other members of the trust community • Connecting any device to the trust’s ICT network without approval from authorised personnel • Setting up any software, applications, or web services on the trust’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data • Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel • Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the trust’s ICT facilities • Causing intentional damage to ICT facilities • Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel • Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation • Using inappropriate or offensive language • Promoting a private business, unless that business is directly related to the trust • Using websites or mechanisms to bypass the trust’s filtering mechanisms • Engaging in content or conduct that is radicalised, extremist, racist, anti-Semitic, or discriminatory in any other way • Leaving ICT equipment anywhere other than on your person, at work or at home e.g., in the car • Using a (generic portable solid-state data storage device): data stick, pen drive, thumb drive, USB drive
Right of Refusal The proposing vendor has the right not to sell under the awarded agreement with a TIPS member at vendor's discretion unless required by law.
Offer Notice (i) The Company shall give written notice (the “Offering Notice”) to the Sponsor stating its bona fide intention to offer the New Equity Securities and specifying the number of New Equity Securities and the material terms and conditions, including the price, pursuant to which the Company proposes to offer the New Equity Securities. (ii) The Offering Notice shall constitute the Company’s offer to sell the New Equity Securities to the Sponsor, which offer shall be irrevocable for a period of three (3) business days (the “ROFO Notice Period”).
ODUF Pack Rejection 6.4.1 Image Access will notify BellSouth within one (1) business day of rejected packs (via the mutually agreed medium). Packs could be rejected because of pack sequencing discrepancies or a critical edit failure on the Pack Header or Pack Trailer records (e.g., out-of-balance condition on grand totals, invalid data populated). Standard ATIS EMI error codes will be used. Image Access will not be required to return the actual rejected data to BellSouth. Rejected packs will be corrected and retransmitted to Image Access by BellSouth.
Pack Rejection 6.4.1 <<customer_name>> will notify BellSouth within one business day of rejected packs (via the mutually agreed medium). Packs could be rejected because of pack sequencing discrepancies or a critical edit failure on the Pack Header or Pack Trailer records (i.e. out-of-balance condition on grand totals, invalid data populated). Standard ATIS EMI Error Codes will be used. <<customer_name>> will not be required to return the actual rejected data to BellSouth. Rejected packs will be corrected and retransmitted to <<customer_name>> by BellSouth.