Students are Responsible For Sample Clauses

The "Students are Responsible For" clause defines the obligations and duties that students must fulfill under an agreement or within an institution. Typically, this clause outlines expectations such as attending classes, completing assignments on time, adhering to codes of conduct, and maintaining academic integrity. By clearly specifying these responsibilities, the clause ensures that students understand what is required of them, thereby promoting accountability and helping to prevent misunderstandings or disputes regarding student conduct and performance.
Students are Responsible For. Using computers/devices in a responsible and ethical manner. • Obeying general school rules concerning behavior and communication that apply to device use. • Using all technology resources in an appropriate manner so as to not damage school equipment. This “damage” includes, but is not limited to, the loss of data resulting from delays, non-deliveries, mis-deliveries or service interruptions caused by the students own negligence, errors or omissions. Use of any information obtained via the District’s designated Internet System is at your own risk. The District specifically denies any responsibility for the accuracy or quality of information obtained through its services. • Helping the District protect our computer system/device by contacting any staff member about any security problems they may encounter. • Monitoring all activity on their account(s)/device. • Securing their device after they are done working to protect their work information and device. • Notifying an adult immediately should they receive inappropriate digital content. • Returning their device at the end of each school year. Students who graduate early, withdraw, are suspended or expelled, or terminate enrollment for any other reason, must return their individual school device computer on the date of termination.
Students are Responsible For. 🟏 Using computers/devices in a responsible and ethical manner. 🟏 Obeying school rules concerning behavior and communication that applies to Chromebook/computer use. 🟏 Using all technology resources in an appropriate manner so as to not damage school equipment. 🟏 Helping the School District protect our computer system/device by contacting any staff member about any security problems they may encounter. 🟏 Students should always secure their Device when finished working to protect their information & device. 🟏 Students are to keep Devices in their protective Cases at all times. 🟏 If a student should receive inappropriate digital content, he/she should immediately notify an adult.
Students are Responsible For. Using computers/devices in a responsible, safe and ethical manner. • Obeying general school rules concerning behaviour and communication which apply to all mobile devices. • Using all technology resources in an appropriate manner so as to not damage them. • Monitoring all activity on their account(s) and taking the necessary and appropriate steps to protect their privacy. • Students should always turn off and secure their device after they are done working to protect their work and information. • If a student should receive email containing inappropriate or abusive language or if the subject matter is questionable, he/she is asked to print a copy and turn it in to their class teacher. • Return their Mobile Device to the school at the end of the lease. Students who leave KPS prior to the end of the lease must return the device to the school. • Ensure that their personal information is protected at all times. This includes usernames, pin numbers and passwords.
Students are Responsible For. ▪ Using computers/devices in a responsible and ethical manner. ▪ Obeying school rules concerning behavior and communication that applies to Chromebook/computer use. ▪ Using all technology resources in an appropriate manner so as to not damage school equipment. ▪ Helping the School District protect our computer system/device by contacting any staff member about any security problems they may encounter. ▪ Monitoring all activity on their account(s)/device. ▪ Students should always secure their Chromebook when finished working to protect their information & device. ▪ If a student should receive inappropriate digital content, he/she should immediately notify an adult.

Related to Students are Responsible For

  • GENERAL RESPONSIBILITIES OF THE PARTIES 1. The Parties will work together in a spirit of cooperation and partnership, with the responsibilities and accountabilities set out in this Agreement, to implement the Programme Documents in full in a timely, efficient, and effective, manner. 2. The Parties agree to carry out their respective responsibilities in accordance with the provisions of this Agreement, including the Programme Documents. 3. The Parties shall keep each other informed of all relevant activities pertaining to the implementation of the Programme Documents, and shall hold consultations when either Party considers it appropriate, including any circumstance that may affect the achievement of the results of the Programme and the Programme Documents. 4. The Parties shall fulfill their commitments with the fullest regard for the terms and conditions of this Agreement and the principles of the United Nations.

  • Data Protection Impact Assessments Workday will, at Customer’s request and subject to the confidentiality terms set forth in the UMSA, make its most recent Audit Reports and Certifications available to Customer. To the extent Customer requires additional assistance to meet its obligations under applicable Data Protection Laws to carry out a data protection impact assessment and prior consultation with the competent supervisory authority related to Customer’s use of the Covered Service, Workday will, taking into account the nature of Processing and the information available to Workday, provide reasonable assistance to Customer.

  • Escrow Agent Not Responsible for Furnished Information The Escrow Agent will have no responsibility for seeking, obtaining, compiling, preparing or determining the accuracy of any information or document, including the representative capacity in which a party purports to act, that the Escrow Agent receives as a condition to a release from escrow or a transfer of escrow securities within escrow under this Agreement.

  • Data Protection Impact Assessment If, pursuant to Data Protection Law, Customer (or its Controllers) are required to perform a data protection impact assessment or prior consultation with a regulator, at Customer’s request, SAP will provide such documents as are generally available for the Cloud Service (for example, this DPA, the Agreement, audit reports or certifications). Any additional assistance shall be mutually agreed between the Parties.

  • BREACH DISCOVERY AND NOTIFICATION 17 1. Following the discovery of a Breach of Unsecured PHI, CONTRACTOR shall notify 18 COUNTY of such Breach, however both parties agree to a delay in the notification if so advised by a 19 law enforcement official pursuant to 45 CFR § 164.412. 20 a. A Breach shall be treated as discovered by CONTRACTOR as of the first day on which 21 such Breach is known to CONTRACTOR or, by exercising reasonable diligence, would have been 22 known to CONTRACTOR. 23 b. CONTRACTOR shall be deemed to have knowledge of a Breach, if the Breach is 24 known, or by exercising reasonable diligence would have known, to any person who is an employee, 25 officer, or other agent of CONTRACTOR, as determined by federal common law of agency. 26 2. CONTRACTOR shall provide the notification of the Breach immediately to the COUNTY 27 Privacy Officer. CONTRACTOR’s notification may be oral, but shall be followed by written 28 notification within twenty four (24) hours of the oral notification. 29 3. CONTRACTOR’s notification shall include, to the extent possible: 30 a. The identification of each Individual whose Unsecured PHI has been, or is reasonably 31 believed by CONTRACTOR to have been, accessed, acquired, used, or disclosed during the Breach; 32 b. Any other information that COUNTY is required to include in the notification to 33 Individual under 45 CFR §164.404 (c) at the time CONTRACTOR is required to notify COUNTY or 34 promptly thereafter as this information becomes available, even after the regulatory sixty (60) day 35 period set forth in 45 CFR § 164.410 (b) has elapsed, including: 36 1) A brief description of what happened, including the date of the Breach and the date 37 of the discovery of the Breach, if known; 1 2) A description of the types of Unsecured PHI that were involved in the Breach (such 2 as whether full name, social security number, date of birth, home address, account number, diagnosis, 3 disability code, or other types of information were involved); 4 3) Any steps Individuals should take to protect themselves from potential harm 5 resulting from the Breach; 6 4) A brief description of what CONTRACTOR is doing to investigate the Breach, to 7 mitigate harm to Individuals, and to protect against any future Breaches; and 8 5) Contact procedures for Individuals to ask questions or learn additional information, 9 which shall include a toll-free telephone number, an e-mail address, Web site, or postal address. 10 4. COUNTY may require CONTRACTOR to provide notice to the Individual as required in 11 45 CFR § 164.404, if it is reasonable to do so under the circumstances, at the sole discretion of the 12 COUNTY. 13 5. In the event that CONTRACTOR is responsible for a Breach of Unsecured PHI in violation 14 of the HIPAA Privacy Rule, CONTRACTOR shall have the burden of demonstrating that 15 CONTRACTOR made all notifications to COUNTY consistent with this Subparagraph F and as 16 required by the Breach notification regulations, or, in the alternative, that the acquisition, access, use, or 17 disclosure of PHI did not constitute a Breach. 18 6. CONTRACTOR shall maintain documentation of all required notifications of a Breach or 19 its risk assessment under 45 CFR § 164.402 to demonstrate that a Breach did not occur. 20 7. CONTRACTOR shall provide to COUNTY all specific and pertinent information about the 21 Breach, including the information listed in Section E.3.b.(1)-(5) above, if not yet provided, to permit 22 COUNTY to meet its notification obligations under Subpart D of 45 CFR Part 164 as soon as 23 practicable, but in no event later than fifteen (15) calendar days after CONTRACTOR’s initial report of 24 the Breach to COUNTY pursuant to Subparagraph F.2. above. 25 8. CONTRACTOR shall continue to provide all additional pertinent information about the