Supervision and Monitoring. As stated in Regulation 6190, “Since the network and network storage areas are District property or otherwise constitute District-leased storage capacity, network administrators may review and delete files, web browsing history and communications to maintain system integrity and ensure that users are using the system responsibly and in accordance with acceptable network use guidelines. Users should not expect that files or other electronic information stored on or available from District servers will always be private or secure.” The District reserves the right to determine which uses constitute acceptable use and to limit access to such uses. The District also reserves the right to limit the time of access and use. Classroom teachers will determine what constitutes appropriate use of electronic devices within their classroom. However, electronic devices may be used when and as required pursuant to a student’s Individual Education Program or Section 504 Service Agreement. Electronic devices may be used at any time to respond to or report emergency situations.
Supervision and Monitoring. Monitoring shall be undertaken by the employer, this shall be done by IWAI representative or an appointed supervision consultant or EIC (engineer in charge). Any supervision and monitoring shall not relieve the contractor from his contractual obligations, including his duty of quality control, survey and all such factors.
Supervision and Monitoring. The use of District-owned information technology resources is not private. School and administrators, and their authorized employees, may monitor the use of information technology resources to help ensure that users are secure and in conformity with this policy. Administrators and teachers reserve the right to examine District-issued devices in order to further the health, safety, discipline, or security of any student. They may also use this information in disciplinary actions, and will furnish evidence of crime to law enforcement. The district reserves the right to determine which uses constitute acceptable use and to limit access to such uses. The district also reserves the right to limit the time of access and priorities among competing acceptable uses.
Supervision and Monitoring. The use of digital devices at school is not private. School and network administrators and their authorised employees monitor the use of information technology resources to help ensure that users are secure and in conformity with this policy. Administrators reserve the right to examine, use and disclose any data found on a student’s device or the school’s information networks in order to further the health, safety, discipline, or security of any student or other person, or to protect property.
Supervision and Monitoring. 9.1.1 The Buyer is entitled at any time during the Agreement Period to audit the conformity to the contractual provisions of the Services itself or have the conformity audited by an auditor of its choice by notifying the Air Operator of the audit in writing at least fourteen (14) days in advance.
Supervision and Monitoring. Supervision includes the activities that the management of the Projects carried out in order to track the internal audits and all the processes and actions in the Project. The management of the Project will create a supervision mechanism on the controls by way of ongoing actions, separate assessments or a combination of both. Pursuant to the model, a strong internal audit system is essential to implement effective risk management.
Supervision and Monitoring. The use of District owned information technology resources is not private. School and network administrators and their authorized employees monitor the use of information technology resources to help ensure that uses are secure and in conformity with this policy. Administrators reserve the right to examine, use, and disclose any data found on the school's information networks in order to further the health, safety, discipline, or security of any student or other person, or to protect property. They may also use this information in disciplinary actions, and will furnish evidence of crime to law enforcement. The district reserves the right to determine which uses constitute acceptable use and to limit access to such uses. The district also reserves the right to limit the time of access and priorities among competing acceptable uses.
Supervision and Monitoring. The supervision of the consultancy will be carried out jointly by the PS/ACTO and the National Water Agency – XXX do Brazil, which will designate the contract supervisors. The products must be delivered to PS/ACTO and XXX-Brazil. The outcomes delivered by the consulting firm on the aforementioned dates will be subject to a review by the supervisors of the aforementioned entities, within a period not exceeding fifteen days after receipt. Subsequently, the general and specific observations will be communicated to the consulting company to make relevant adjustments. These revisions must be returned to ACTO and XXX- Brazil for approval.
Supervision and Monitoring. It shall be the responsibility of all members of the District staff to supervise and monitor usage of the online computer network and access to the Internet in accordance with this policy and CIPA. Procedures for the disabling or otherwise modifying any technology protection measures shall be the responsibility of the Superintendent and the Superintendent's designees.
Supervision and Monitoring. School and network administrators and their authorized employees monitor the use of information technology resources to help ensure that uses are secure and in conformity with this policy. Any personal device connecting to the CCSD wireless or wired network will be scanned to make sure it adheres to basic security standards. Administrators reserve the right to examine, use, and disclose any data found on the school's information networks in order to further the health, safety, discipline, or security of any student or other person, or to protect property. They may also use this information in disciplinary actions and will furnish evidence of crime to law enforcement.