Receiving Your Laptop Sample Clauses

Receiving Your Laptop. Before receiving a device, students and parents must sign and complete the following online documents: ● Device Usage Policy FormEquipment Guidelines Form Devices will be returned during the final week of school, unless Technology Support Services requests devices earlier, during student checkout so they can be examined for serviceability. If a student transfers out of Classical Preparatory School during the school year, their device must be returned at that time. Moreover, devices will be returned upon request of the Technology Support Services at any point in the year. Individual school laptops and accessories must be returned to Classical Preparatory School within five days of Technology Support Services requesting school owned materials from students. Students who withdraw, are suspended or expelled, or terminate enrollment for any reason must return their laptop on the date of termination. If a student fails to return the laptop, that student is subject to criminal prosecution or civil liability. The student will also pay the cost of the laptop. Failure to return any device will result in a theft report being filed with the Pasco County Sheriff's Office.
AutoNDA by SimpleDocs
Receiving Your Laptop. Students will be assigned the same computer until they finish their senior year. - Every user must respect the security and privacy of others. The student’s connection to the Internet will be filtered in accordance with school filter policy and required CIPPA compliance. The laptop is configured to apply the filter independent of connection location (inside or outside of school). Bypassing or attempting to bypass the filtering system is prohibited. - Violations of any provision of this policy may result in disciplinary action including: student conference, parent contact, conference with parent, revocation of computer access and use, detention, suspension, contact with Law Enforcement Agencies, and criminal charges.
Receiving Your Laptop 

Related to Receiving Your Laptop

  • Information About You and Your Visits to the Website All information we collect on this Website is subject to our Privacy Policy. By using the Website, you consent to all actions taken by us with respect to your information in compliance with the Privacy Policy.

  • PROTECTION OF YOUR CONTENT 5.1 In order to protect Your Content provided to Oracle as part of the provision of the Services, Oracle will comply with the applicable administrative, physical, technical and other safeguards, and other applicable aspects of system and content management, available at xxxx://xxx.xxxxxx.xxx/us/corporate/contracts/cloud-services/index.html. 5.2 To the extent Your Content includes Personal Data (as that term is defined in the applicable data privacy policies and the Data Processing Agreement (as that term is defined below)), Oracle will furthermore comply with the following: a. the relevant Oracle privacy policies applicable to the Services, available at xxxx://xxx.xxxxxx.xxx/us/legal/privacy/overview/index.html; and b. the applicable version of the Data Processing Agreement for Oracle Services (the “Data Processing Agreement”), unless stated otherwise in Your order. The version of the Data Processing Agreement applicable to Your order (a) is available at xxxxx://xxx.xxxxxx.xxx/corporate/contracts/cloud- services/contracts.html#data-processing and is incorporated herein by reference, and (b) will remain in force during the Services Period of Your order. In the event of any conflict between the terms of the Data Processing Agreement and the terms of the Service Specifications (including any applicable Oracle privacy policies), the terms of the Data Processing Agreement shall take precedence.

  • Use of Your Information The Beta Technology may include functionality that permits UPS to measure Your usage of its features and informs UPS of this usage electronically. UPS has the right to collect from Your computer, Your system configuration data and a log of Your activities while using the Beta Technology (the “Beta Technology Report”). UPS may use the Beta Technology Report to help conduct trouble-shooting analysis and improve the functionality of the Beta Technology. You consent and agree that UPS shall be free to reproduce, use, disclose, exhibit, display, transform, create derivative works from, and distribute to others without limitation or obligation of any type to You all comments, information, data, and suggestions, including the Beta Technology Report and feedback data (but not including financial data, financial plans or product plans not commonly known or publicly available), that You provide to UPS related to the Beta Technology. Further, UPS shall be free to use any ideas, concepts, know-how, or techniques contained in such information without limitation or obligation of any type to You.

  • Disclosure of Your Information We will disclose information to third parties about your account or the transfers you make:

  • Protection of Your Data We will maintain administrative, physical, and technical safeguards for protection of the security, confidentiality and integrity of Your Data, as described in the Documentation. Those safeguards will include, but will not be limited to, measures for preventing access, use, modification or disclosure of Your Data by Our personnel except (a) to provide the Purchased Services and prevent or address service or technical problems, (b) as compelled by law in accordance with Section 8.3 (Compelled Disclosure) below, or (c) as You expressly permit in writing.

  • YOUR PERSONAL INFORMATION 17.1 We collect certain information about the purchaser and the users of the Card in order to operate the Card programme. IDT Financial Services Limited is the data controllers of Your personal data, and will manage and protect Your personal data in accordance with applicable law.IDT Financial Services Limited receives card services from First Data Slovakia s.r.o., which acts as a data processor for IDT Financial Services Limited. 17.2 We may transfer Your personal data outside the EEA to Our commercial partners where necessary to provide Our services to You, such as customer service, account administration, financial reconciliation, or where the transfer is necessary as a result of Your request, such as the processing of any international transaction. When We transfer personal data outside the EEA, We will take steps to ensure that Your personal data is afforded substantially similar protection as personal data processed within the EEA. Please be aware that not all countries have laws to protect personal data in a manner equivalent to that of the EEA. Your use of Our products and services will indicate to Us that You agree to the transfer of Your personal data outside the EEA. If You withdraw Your consent to the processing of Your personal data or its transfer outside the EEA, which You can do by using the contact details in clause 15, We will not be able to provide Our services to You. Therefore, such withdrawal of consent will be deemed to be a termination of the Agreement. 17.3 Unless You have provided Your explicit permission, Your personal data will not be used for marketing purposes by Us or Our commercial partners (unless You have independently provided Your consent to them directly), nor will it be shared with third parties unconnected with the Card scheme. 17.4 You have the right to request details of the personal information that is held about You, and You may receive this by writing to our Customer Service Center. 17.5 Please refer to the Privacy Policy of IDT Financial Services Limited xxxx://xxx.xxxxxxxxxx.xxx/privacypolicy.pdf for full details, which You accept by accepting the Agreement.

  • Using Your Card You understand that the use of your credit card or credit card account will constitute acknowledgement of receipt and agreement to the terms of the Credit Card Agreement and Credit Card Account Opening Disclosure (Disclosure). You may use your card to make purchases from merchants and others who accept your card. The credit union is not responsible for the refusal of any merchant or financial institution to honor your card. If you wish to pay for goods or services over the Internet, you may be required to provide card number security information before you will be permitted to complete the transaction. In addition, you may obtain cash advances from the Credit Union, from other financial institutions that accept your card, and from some automated teller machines (ATMs). (Not all ATMs accept your card.) If the credit union authorizes ATM transactions with your card, it will issue you a personal identification number (PIN). To obtain cash advances from an ATM, you must use the PIN issued to you for use with your card. You agree that you will not use your card for any transaction that is illegal under applicable federal, state, or local law. Even if you use your card for an illegal transaction, you will be responsible for all amounts and charges incurred in connection with the transaction. If you are permitted to obtain cash advances on your account, you may also use your card to purchase instruments and engage in transactions that we consider the equivalent of cash. Such transactions will be posted to your account as cash advances and include, but are not limited to, wire transfers, money orders, bets, lottery tickets, and casino gaming chips, as applicable. This paragraph shall not be interpreted as permitting or authorizing any transaction that is illegal.

  • PAYING YOUR BILL 10.1 What you have to pay

  • Your Information You must provide updated information to any person to whom you claimed to be an exempt payee if you are no longer an exempt payee and anticipate receiving reportable payments in the future from this person. For example, you may need to provide updated information if you are a C corporation that elects to be an S corporation, or if you no longer are tax exempt. In addition, you must furnish a new Form W-9 if the name or TIN changes for the account; for example, if the grantor of a grantor trust dies.

  • Secure Your Tax Records from Identity Theft Identity theft occurs when someone uses your personal information such as your name, SSN, or other identifying information, without your permission, to commit fraud or other crimes. An identity thief may use your SSN to get a job or may file a tax return using your SSN to receive a refund. To reduce your risk: • Protect your SSN, • Ensure your employer is protecting your SSN, and • Be careful when choosing a tax preparer. If your tax records are affected by identity theft and you receive a notice from the IRS, respond right away to the name and phone number printed on the IRS notice or letter. If your tax records are not currently affected by identity theft but you think you are at risk due to a lost or stolen purse or wallet, questionable credit card activity or credit report, contact the IRS Identity Theft Hotline at 0-000-000-0000 or submit Form 14039. For more information, see Pub. 5027, Identity Theft Information for Taxpayers. Victims of identity theft who are experiencing economic harm or a systemic problem, or are seeking help in resolving tax problems that have not been resolved through normal channels, may be eligible for Taxpayer Advocate Service (TAS) assistance. You can reach TAS by calling the TAS toll-free case intake line at 0-000-000-0000 or TTY/TDD 0-000-000-0000. The IRS does not initiate contacts with taxpayers via emails. Also, the IRS does not request personal detailed information through email or ask taxpayers for the PIN numbers, passwords, or similar secret access information for their credit card, bank, or other financial accounts. If you receive an unsolicited email claiming to be from the IRS, forward this message to xxxxxxxx@xxx.xxx. You may also report misuse of the IRS name, logo, or other IRS property to the Treasury Inspector General for Tax Administration (TIGTA) at 0-000-000-0000. You can forward suspicious emails to the Federal Trade Commission at xxxx@xxx.xxx or report them at xxx.xxx.xxx/xxxxxxxxx. You can contact the FTC at xxx.xxx.xxx/xxxxxxx or 877-IDTHEFT (877-438-4338). If you have been the victim of identity theft, see xxx.XxxxxxxxXxxxx.xxx and Pub. 5027. Visit xxx.xxx.xxx/XxxxxxxxXxxxx to learn more about identity theft and how to reduce your risk.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!