PROTECTING & STORING YOUR CHROMEBOOK Sample Clauses

PROTECTING & STORING YOUR CHROMEBOOK. 7 .1 Chromebook Identification Student Chromebooks will be labeled in the manner specified by the school. Chromebooks may be identified in the following ways: • Record of serial number (barcode) • Xxxxxx ISD label
AutoNDA by SimpleDocs
PROTECTING & STORING YOUR CHROMEBOOK. 7.1 Chromebook Identification

Related to PROTECTING & STORING YOUR CHROMEBOOK

  • Using Your Card You understand that the use of your credit card or credit card account will constitute acknowledgement of receipt and agreement to the terms of the Credit Card Agreement and Credit Card Account Opening Disclosure (Disclosure). You may use your card to make purchases from merchants and others who accept your card. The credit union is not responsible for the refusal of any merchant or financial institution to honor your card. If you wish to pay for goods or services over the Internet, you may be required to provide card number security information before you will be permitted to complete the transaction. In addition, you may obtain cash advances from the Credit Union, from other financial institutions that accept your card, and from some automated teller machines (ATMs). (Not all ATMs accept your card.) If the credit union authorizes ATM transactions with your card, it will issue you a personal identification number (PIN). To obtain cash advances from an ATM, you must use the PIN issued to you for use with your card. You agree that you will not use your card for any transaction that is illegal under applicable federal, state, or local law. Even if you use your card for an illegal transaction, you will be responsible for all amounts and charges incurred in connection with the transaction. If you are permitted to obtain cash advances on your account, you may also use your card to purchase instruments and engage in transactions that we consider the equivalent of cash. Such transactions will be posted to your account as cash advances and include, but are not limited to, wire transfers, money orders, bets, lottery tickets, and casino gaming chips, as applicable. This paragraph shall not be interpreted as permitting or authorizing any transaction that is illegal.

  • PROTECTION OF YOUR CONTENT 5.1 In order to protect Your Content provided to Oracle as part of the provision of the Services, Oracle will comply with the applicable administrative, physical, technical and other safeguards, and other applicable aspects of system and content management, available at xxxx://xxx.xxxxxx.xxx/us/corporate/contracts/cloud-services/index.html. 5.2 To the extent Your Content includes Personal Data (as that term is defined in the applicable data privacy policies and the Data Processing Agreement (as that term is defined below)), Oracle will furthermore comply with the following: a. the relevant Oracle privacy policies applicable to the Services, available at xxxx://xxx.xxxxxx.xxx/us/legal/privacy/overview/index.html; and b. the applicable version of the Data Processing Agreement for Oracle Services (the “Data Processing Agreement”), unless stated otherwise in Your order. The version of the Data Processing Agreement applicable to Your order (a) is available at xxxxx://xxx.xxxxxx.xxx/corporate/contracts/cloud- services/contracts.html#data-processing and is incorporated herein by reference, and (b) will remain in force during the Services Period of Your order. In the event of any conflict between the terms of the Data Processing Agreement and the terms of the Service Specifications (including any applicable Oracle privacy policies), the terms of the Data Processing Agreement shall take precedence.

  • Information About You and Your Visits to the Website All information we collect on this Website is subject to our Privacy Policy. By using the Website, you consent to all actions taken by us with respect to your information in compliance with the Privacy Policy.

  • Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: xxxx://xxx.xxxxxx-xxxxx.xxx/508.htm.

  • Safeguarding and Protecting Children and Vulnerable Adults The Supplier will comply with all applicable legislation and codes of practice, including, where applicable, all legislation and statutory guidance relevant to the safeguarding and protection of children and vulnerable adults and with the British Council’s Child Protection Policy, as notified to the Supplier and amended from time to time, which the Supplier acknowledges may include submitting to a check by the UK Disclosure & Barring Service (DBS) or the equivalent local service; in addition, the Supplier will ensure that, where it engages any other party to supply any of the Services under this Agreement, that that party will also comply with the same requirements as if they were a party to this Agreement.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Trunk Group Architecture and Traffic Routing 5.2.1 The Parties shall jointly establish Access Toll Connecting Trunks between CLEC and CBT by which they will jointly provide Tandem-transported Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic from and to CLEC's Customers. 5.2.2 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access and non-translated Toll Free traffic (e.g., 800/888) to allow CLEC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier that is connected to the CBT access Tandem. 5.2.3 The Access Toll Connecting Trunks shall be one-way or two-way trunks, as mutually agreed, connecting an End Office Switch that CLEC utilizes to provide Telephone Exchange Service and Switched Exchange Access Service in the given LATA to an access Tandem Switch CBT utilizes to provide Exchange Access in the LATA.

  • Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.

  • Know Your Customer Information The Administrative Agent shall have received at least three Business Days prior to the Closing Date all documentation and other information about the Borrower as has been reasonably requested by the Administrative Agent at least 10 Business Days prior to the Closing Date that is required by regulatory authorities under applicable “know your customer” and anti-money laundering rules and regulations, including without limitation the USA PATRIOT Act.

  • Income Protection, Trauma and Journey Insurance The Employer is, and will remain during the life of this Agreement, a participating employer in the Nominated Redundancy Fund and an employer member of IPT Agency Co Ltd. IPT Agency Co Ltd administers the insurance schemes covering income protection, trauma and journey accidents (Income Protection, Trauma and Journey Accidents Insurance Schemes).

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!