Privacy and Monitoring Sample Clauses

Privacy and Monitoring. There is no right to privacy in the use of Electronic Information Resources. Also, students are hereby put on notice as to the lack of privacy afforded by an electronic data storage and electronic communications in general and must apply appropriate security to protect confidential information from unintended disclosure. Electronic data including, but not limited to, data associated with Internet use, email, text messages, and voicemail, which is transmitted through District Electronic Information Resources may be monitored and logged. Under such conditions, the transfer of information which is intended to be confidential or personal should not be sent through or stored on Electronic Information Resources. The district reserves the right to monitor and access information contained on its Electronic Information Resources under various circumstances including but not limited to the following:
AutoNDA by SimpleDocs
Privacy and Monitoring. A. While the College recognizes the importance of privacy in an institution of higher learning and will endeavor to honor that ideal, Users should have no expectation of privacy in any information stored on or sent through PCC Technology or personal devices connected to PCC Technology, except as required by law. Users should note that electronically stored information of any kind may be discoverable in a legal action or accessed and reviewed during the course of a PCC administrative investigation. B. All PCC Technology and the work, data, and other material stored on it in any form is subject to review, monitoring, blocking, or removal by PCC, as well as other maintenance and protective actions, such as logging, deleting, encrypting or decrypting, threat analysis, performance analysis, backup, and troubleshooting. All such actions are within the authority of PCC’s administration.
Privacy and Monitoring. Grantee shall not tap or monitor, or arrange for the tapping or monitoring, or permit any other Person to tap or monitor, any cable, line, signal, input device, or Subscriber facility for any purpose, without the written authorization of the affected Subscriber. Such authorization shall be revocable at any time by the Subscriber without penalty by delivering a written notice of revocation to Grantee; provided, however, that Grantee may conduct System-wide or individually addressed “sweeps” solely for the purpose of verifying System integrity, checking for illegal taps, or billing.
Privacy and Monitoring. 5.1. All information created or stored on the IACC’s computers and computer network and Internet-related systems, including e-mail and vmail, is the property of the Company and is not private to any user. 5.2. No user should have any expectation of privacy as to his or her Internet or network usage or information stored on any IACC system. IACC reserves the right to access and monitor all files, v-mail, email and other network and Internet-related systems.
Privacy and Monitoring. As part of our commitment to ensuring the best possible user experience and to maintain the integrity of the device, the following information may be monitored:
Privacy and Monitoring. Company shall comply with the provisions of ---------------------- Federal law on the privacy of personally identifiable subscriber information and the monitoring or collection of such information.

Related to Privacy and Monitoring

  • Reporting and Monitoring Please provide a brief description of the mechanisms proposed for this project for reporting to the UNDP and partners, including a reporting schedule.

  • Evaluation, Testing, and Monitoring 1. The System Agency may review, test, evaluate and monitor Grantee’s Products and services, as well as associated documentation and technical support for compliance with the Accessibility Standards. Review, testing, evaluation and monitoring may be conducted before and after the award of a contract. Testing and monitoring may include user acceptance testing. Neither the review, testing (including acceptance testing), evaluation or monitoring of any Product or service, nor the absence of review, testing, evaluation or monitoring, will result in a waiver of the State’s right to contest the Grantee’s assertion of compliance with the Accessibility Standards. 2. Grantee agrees to cooperate fully and provide the System Agency and its representatives timely access to Products, records, and other items and information needed to conduct such review, evaluation, testing, and monitoring.

  • EVALUATION AND MONITORING The ORGANIZATION agrees to maintain books, records and other documents and evidence, and to use accounting procedures and practices that sufficiently and properly support the complete performance of and the full compliance with this Agreement. The ORGANIZATION will retain these supporting books, records, documents and other materials for at least three (3) calendar years following the year in which the Agreement expires. The COUNTY and/or the State Auditor and any of their representatives shall have full and complete access to these books, records and other documents and evidence retained by the ORGANIZATION respecting all matters covered in and under this Agreement, and shall have the right to examine such during normal business hours as often as the COUNTY and/or the State Auditor may deem necessary. Such representatives shall be permitted to audit, examine and make excerpts or transcripts from such records, and to make audits of all contracts, invoices, materials, and records of matters covered by this Agreement. These access and examination rights shall last for three calendar years following the year in which the Agreement expires. The COUNTY intends without guarantee for its agents to use reasonable security procedures and protections to assure that related records and documents provided by the ORGANIZATION are not erroneously disclosed to third parties. The COUNTY will, however, disclose or make this material available to those authorized by/in the above paragraph or permitted under the provisions of Chapter 42.56 RCW without notice to the ORGANIZATION. The ORGANIZATION shall cooperate with and freely participate in any other monitoring or evaluation activities pertinent to this Agreement that the COUNTY finds needing to be conducted.

  • ANALYSIS AND MONITORING The Custodian shall (a) provide the Fund (or its duly-authorized investment manager or investment adviser) with an analysis of the custody risks associated with maintaining assets with the Eligible Securities Depositories set forth on Schedule B hereto in accordance with section (a)(1)(i)(A) of Rule 17f-7, and (b) monitor such risks on a continuing basis, and promptly notify the Fund (or its duly-authorized investment manager or investment adviser) of any material change in such risks, in accordance with section (a)(1)(i)(B) of Rule 17f-7.

  • Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.

  • Customer Cooperation 3.2.1. Customer shall provide and make available all Customer personnel as may be further addressed in an applicable Order Form or that SAP reasonably requires in connection with performance of the Services. 3.2.2. Customer shall appoint a contact person with the authority to make decisions and to supply SAP with any necessary or relevant information expeditiously.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • DATA PROTECTION AND PRIVACY 14.1 In addition to Supplier’s obligations under Sections 6, 9, 10, and 15, Supplier will comply with this Section 14 when processing Accenture Personal Data. "Accenture Personal Data" means personal data owned, licensed, or otherwise controlled or processed by Accenture including personal data processed by Accenture on behalf of its clients. “Accenture Data” means all information, data and intellectual property of Accenture or its clients or other suppliers, collected, stored, hosted, processed, received and/or generated by Supplier in connection with providing the Deliverables to Accenture, including Accenture Personal Data.

  • Contract Monitoring The criminal background checks required by this rule shall be national in scope, and must be conducted at least once every three (3) years. Contractor shall make the criminal background checks required by Paragraph IV.G.1 available for inspection and copying by DRS personnel upon request of DRS.

  • Insurance and Fingerprint Requirements Information Insurance If applicable and your staff will be on TIPS member premises for delivery, training or installation etc. and/or with an automobile, you must carry automobile insurance as required by law. You may be asked to provide proof of insurance. Fingerprint It is possible that a vendor may be subject to Chapter 22 of the Texas Education Code. The Texas Education Code, Chapter 22, Section 22.0834. Statutory language may be found at: xxxx://xxx.xxxxxxxx.xxxxx.xxxxx.xx.xx/ If the vendor has staff that meet both of these criterion: (1) will have continuing duties related to the contracted services; and (2) has or will have direct contact with students Then you have ”covered” employees for purposes of completing the attached form. TIPS recommends all vendors consult their legal counsel for guidance in compliance with this law. If you have questions on how to comply, see below. If you have questions on compliance with this code section, contact the Texas Department of Public Safety Non-Criminal Justice Unit, Access and Dissemination Bureau, FAST-FACT at XXXX@xxxxx.xxxxx.xx.xx and you should send an email identifying you as a contractor to a Texas Independent School District or ESC Region 8 and TIPS. Texas DPS phone number is (000) 000-0000. See form in the next attribute to complete entitled: Texas Education Code Chapter 22 Contractor Certification for Contractor Employees

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!