Tablet Left at Home Sample Clauses

Tablet Left at Home. If students leave their tablet at home, they must immediately phone a parent to bring it to school. Repeat violations of this policy will result in disciplinary action.
AutoNDA by SimpleDocs

Related to Tablet Left at Home

  • Earned Value Management System ‌ An earned value management system (EVMS) means a project management tool that effectively integrates the project scope of work with cost, schedule and performance elements for optimum project planning and control. The qualities and operating characteristics of EVMS are described in American National Standards Institute /Electronics Industries Alliance (ANSI/EIA) Standard-748. An EVMS is not mandatory; however, Contractors are encouraged to have an EVMS ANSI/EIA Standard-748 during the entire term of OASIS. The Contractor shall notify the OASIS CO, in writing, if there are any changes in the status of their EVMS and provide the reasons for the change and copies of audits by the Defense Contract Management Agency (DCMA) or other cognizant Government administration office, as applicable. If only part of a Contractor’s organization is EVMS ANSI/EIA Standard-748 certified, the Contractor shall make the distinction between which business units or sites and geographic locations have been certified.

  • Terminating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • CHILD AND DEPENDENT ADULT/ELDER ABUSE REPORTING CONTRACTOR shall establish a procedure acceptable to ADMINISTRATOR to ensure that all employees, agents, subcontractors, and all other individuals performing services under this Agreement report child abuse or neglect to one of the agencies specified in Penal Code Section 11165.9 and dependent adult or elder abuse as defined in Section 15610.07 of the WIC to one of the agencies specified in WIC Section 15630. CONTRACTOR shall require such employees, agents, subcontractors, and all other individuals performing services under this Agreement to sign a statement acknowledging the child abuse reporting requirements set forth in Sections 11166 and 11166.05 of the Penal Code and the dependent adult and elder abuse reporting requirements, as set forth in Section 15630 of the WIC, and shall comply with the provisions of these code sections, as they now exist or as they may hereafter be amended.

  • Dienste Und Materialien Von Drittanbietern (a) Die Apple-Software gewährt möglicherweise Zugang zu(m) iTunes Store, App Store, Apple Books, Game Center, iCloud, Karten von Apple und zu anderen Diensten und Websites von Apple und Drittanbietern (gemeinsam und einzeln als „Dienste“ bezeichnet). Solche Dienste sind möglicherweise nicht in xxxxx Sprachen oder in xxxxx Ländern verfügbar. Die Nutzung dieser Dienste erfordert Internetzugriff und die Nutzung bestimmter Dienste erfordert möglicherweise eine Apple-ID, setzt möglicherweise dein Einverständnis mit zusätzlichen Servicebedingungen voraus und unterliegt unter Umständen zusätzlichen Gebühren. Indem du diese Software zusammen mit einer Apple-ID oder einem anderen Apple-Dienst verwendest, erklärst du dein Einverständnis mit den anwendbaren Servicebedingungen für diesen Dienst, z. B. den neuesten Apple Media Services-Bedingungen für das Land, in dem du auf diese Services zugreifst, die du über die Webseite xxxxx://xxx.xxxxx.xxx/legal/ internet-services/itunes/ anzeigen und nachlesen kannst

  • Glass Or Safety Glazing Material a. We cover:

  • New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to:

  • Searchability Offering searchability capabilities on the Directory Services is optional but if offered by the Registry Operator it shall comply with the specification described in this section.

  • List of Operator’s Subprocessors [Box 26] [Box 27] [Box 28] [Box 29]

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

Time is Money Join Law Insider Premium to draft better contracts faster.