Systems Monitoring Sample Clauses

Systems Monitoring. In accordance with the federal Childhood Internet Protection Act <CIPA>, Internet access is filtered for all users. The use of technology resources may be monitored by district, school and network administrators and their authorized employees to protect the integrity of district technological resources as well as individual compliance with this policy. Users have no expectation of privacy related to their use of the district’s technological resources. Administrators may examine and use data in disciplinary actions; evidence of crime will be provided to law enforcement officials.
AutoNDA by SimpleDocs
Systems Monitoring. During the life of this agreement, the parties may, through mutual agreement achieved in meetings of the Employee Relations Committee, alter or further refine the procedures outlined above, in 15.01 (g) and (h).
Systems Monitoring. The Town has the right to, and will, monitor employee electronic communications and usage. Employees must have no expectation of privacy in anything they create, store, send or receive on the Town' s computer systems. Your electronic communications can be monitored without prior notification if the Town deems this necessary in its sole discretion. All incoming and outgoing voice and email messages and attachments are subject to access, review and disclosure in the ordinary course of administering the systems, including communications that are password protected. Similarly, Internet web sites visited and files downloaded will be evident to those employees responsible for administering that system. Additionally, the Town uses automated monitoring tools ton continuously detect, block and/or quarantine files that may violate our policies or threaten the integrity of our systems. Employees responsible for administering the systems are required to report any abuses of the systems to the Town's managers. Indeed, certain illegal uses of the Town' s systems are required by law to be reported to law enforcement authorities. Violations of any part of the Electronic Communications Policy may result in disciplinary action, which, depending upon their severity or frequency may range from warning or suspension of privileges to possible discharge from employment.
Systems Monitoring. Ellucian will monitor the Cloud Environment on a 24x7x365 basis. 10.1 Ellucian will monitor the Application components and the Cloud Environment for availability. 10.2 Client will allow Ellucian-based remote services monitoring and security tools reasonable access to the Applications.
Systems Monitoring. Xxxxxxx monitors networks and systems to detect and log events that could cause problems.
Systems Monitoring. The Town has the right to, and will, monitor any and all employee, and/or town hall personnel electronic communications and usage on Town of Ayer computer equipment. Employees and town personnel must have no expectation of privacy in anything they create, store, send or receive on the Town’s computer Systems. Your electronic communications can be monitored without prior notification if the Town deems this necessary, in its sole discretion. All incoming and outgoing voice and messages and attachments are subject to access, review and disclosure in the ordinary course of administering the Systems, including communications that are password protected. Similarly, Internet web sites visited, private email systems and online email accounts and files downloaded will be evident to those employees responsible for administering that system. Additionally, the Town uses automated monitoring tools to continuously detect, block and/or quarantine files that may violate our policies or threaten the integrity of our Systems. Employees responsible for administering the Systems are required to report any abuses of the Systems to the Town’s IT Director and/or Town Manager. Certain illegal and unethical uses of the Town’s Systems are subject by law to be reported to the proper local, state, and/or federal authorities. Violations of any part of the Electronic Communications Policy may result in disciplinary action, which, depending upon their severity or frequency may range from warning, suspension of privileges to possible discharge from employment with the Town of Ayer. All e-mail created or received by an employee of the Town of Ayer is a public record. All Town Employees and Special Town Employees (i.e. appointed and elected board/commission/committee members; volunteers; etc.) MUST use an official Town- issued E-mail (in the form @xxxx.xx.xx) for all Town-related business. Using your personal E- Mail to conduct Town business is strictly prohibited and may be subject to disciplinary action and/or personal systems at risk for subpoena or discovery. ALL electronic communications are Public Records.
Systems Monitoring. FluidStack may monitor, collect, store and use information on the use and performance of the Cloud Infrastructure and the Platform to detect threats or errors to the Platform and/or FluidStack’s operations and for the purposes of the further development and improvement of FluidStack's services, provided that such activities at all times comply the Privacy Policy, the latest version is available at the FluidStack website.
AutoNDA by SimpleDocs
Systems Monitoring. In accordance with the federal Childhood Internet Protection Act (CIPA), Internet access at MLSD is filtered. The use of technology resources may be monitored by authorized employees to protect the integrity of district technological resources as well as individual compliance with this policy. Administrators may examine and use data in disciplinary actions; evidence of crime will be provided to law enforcement officials.

Related to Systems Monitoring

  • Program Monitoring The Contractor will make all records and documents required under this Agreement as outlined here, in OEC Policies and NHECC Policies available to the SRO or its designee, the SR Fiscal Officer or their designee and the OEC. Scheduled monitoring visits will take place twice a year. The SRO and OEC reserve the right to make unannounced visits.

  • Infrastructure Infrastructure serves as the foundation and building blocks of an integrated IT solution. It is the hardware which supports Application Services (C.3.2) and IT Management Services (C.3.3); the software and services which enable that hardware to function; and the hardware, software, and services which allow for secure communication and interoperability between all business and application service components. Infrastructure services facilitate the development and maintenance of critical IT infrastructures required to support Federal government business operations. This section includes the technical framework components that make up integrated IT solutions. One or any combination of these components may be used to deliver IT solutions intended to perform a wide array of functions which allow agencies to deliver services to their customers (or users), whether internal or external, in an efficient and effective manner. Infrastructure includes hardware, software, licensing, technical support, and warranty services from third party sources, as well as technological refreshment and enhancements for that hardware and software. This section is aligned with the FEA/DoDEA Technical Reference Model (TRM) which describes these components using a vocabulary that is common throughout the entire Federal government. A detailed review of the TRM is provided in Section J, Attachment 5. Infrastructure includes complete life cycle support for all hardware, software, and services represented above, including planning, analysis, research and development, design, development, integration and testing, implementation, operations and maintenance, information assurance, and final disposition of these components. The services also include administration and help desk functions necessary to support the IT infrastructure (e.g., desktop support, network administration). Infrastructure components of an integrated IT solution can be categorized as follows:

  • Monitoring In each case in which the Foreign Custody Manager maintains Foreign Assets with an Eligible Foreign Custodian selected by the Foreign Custody Manager, the Foreign Custody Manager shall establish a system to monitor (i) the appropriateness of maintaining the Foreign Assets with such Eligible Foreign Custodian and (ii) the contract governing the custody arrangements established by the Foreign Custody Manager with the Eligible Foreign Custodian. In the event the Foreign Custody Manager determines that the custody arrangements with an Eligible Foreign Custodian it has selected are no longer appropriate, the Foreign Custody Manager shall notify the Board in accordance with Section 3.2.5 hereunder.

  • Systems The details of any systems work will be determined after a thorough business analysis. System's work will be billed on a time and material basis. Investors Bank provides an allowance of 10 systems hours for data extract set up and reporting extract set up. Additional hours will be billed on a time and material basis.

  • Contract Monitoring The criminal background checks required by this rule shall be national in scope, and must be conducted at least once every three (3) years. Contractor shall make the criminal background checks required by Paragraph IV.G.1 available for inspection and copying by DRS personnel upon request of DRS.

  • Project Monitoring The Developer shall provide regular status reports to the NYISO in accordance with the monitoring requirements set forth in the Development Schedule, the Public Policy Transmission Planning Process Manual and Attachment Y of the OATT.

  • Telephone Monitoring You agree that Chase and its third-party service providers may listen to and record telephone calls as part of providing program services.

  • Electronic Monitoring All observations shall be conducted openly. Mechanical or electronic devices shall not be used to listen to or record the procedures of any class without the prior knowledge and consent of the teacher.

  • Configuration Management The Contractor shall maintain a configuration management program, which shall provide for the administrative and functional systems necessary for configuration identification, control, status accounting and reporting, to ensure configuration identity with the UCEU and associated cables produced by the Contractor. The Contractor shall maintain a Contractor approved Configuration Management Plan that complies with ANSI/EIA-649 2011. Notwithstanding ANSI/EIA-649 2011, the Contractor’s configuration management program shall comply with the VLS Configuration Management Plans, TL130-AD-PLN-010-VLS, and shall comply with the following:

  • Compliance Monitoring Grantee must be subject to compliance monitoring during the period of performance in which funds are Expended and up to three years following the closeout of all funds. In order to assure that the program can be adequately monitored, the following is required of Grantee: a. Grantee must maintain a financial tracking system provided by Florida Housing that ensures that CRF funds are Expended in accordance with the requirements in this Agreement. b. Grantee must maintain records on all awards to Eligible Persons or Households. These records must include, but are not limited to: i. Proof of income compliance (documentation from submission month, including but not limited to paystub, Florida unemployment statement, social security and/or disability statement, etc.); ii. Lease; and iii. Documentation of rental assistance payments made.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!