Tablet PCs and Notebooks Sample Clauses

Tablet PCs and Notebooks. As a college we appreciate students have increasing access to personal mobile devices which can be beneficial to education. As a college we strongly advise all students to leave any high value devices at home as correct and appropriate ICT facilities will be provided to students whenever necessary. Any devices which are brought into school must be used appropriately and responsibly, and only when specific permission is agreed with the class teacher. The school, it’s staff and governing body takes no responsibility for loss or theft of any Tablet PC’s and Notebooks which students choose to bring into school. XXXXXXXXXXX COLLEGE ACCEPTABLE USE POLICY | X XXXXX Computer Misuse Act (1990) The Computer Misuse Act makes it an offence for anyone to have:-  Unauthorised access to computer material e.g. if you find or guess a fellow pupil’s password and use it.  Unauthorised access to deliberately commit an unlawful act e.g. if you guess a fellow pupil’s password and access their learning account without permission  Unauthorised changes to computer material e.g. if you change the desk-top set up on your computer or introduce a virus deliberately to the school’s network system. Data Protection Act (1998) The Data Protection Act ensures that information held about you is used for specific purposes only. These rules apply to everyone in the school, including teaching staff, support staff, volunteers and governors. The Act covers the collection, storing, editing, retrieving, disclosure, archiving and destruction of data held about individuals in the school. The Act not only applies to paper files it also applies to electronic files. The principles of the Act state that data must be:  Fairly and lawfully processed  Processed for limited purposes  Adequate, relevant and not excessive  Accurate and up to date  Kept no longer than necessary  Processed in accordance with data subject’s rights  Secure  Not transferred to other countries without adequate provision. RIPA – Regulation of Investigatory Powers Act (2002) If a request for authorised access is made to the school they will provide the appropriate access to your ICT records and files. The Act legislates for using methods of surveillance and information gathering to help the prevention of crime, including terrorism. RIPA makes provision for:  the interception of communications  the acquisition and disclosure of data relating to communications  the carrying out of surveillance  the use of covert human in...
AutoNDA by SimpleDocs

Related to Tablet PCs and Notebooks

  • Manuals Each product delivered under contract to any Customer must be delivered with at least one (1) copy of a safety and operating manual and any other technical or maintenance manual. The cost of the manual(s) must be included in the price for the Product offered.

  • Devices BNY Mellon will restrict the transfer of Customer Data from its network to mass storage devices. BNY Mellon will use a mobile device management system or equivalent tool when mobile computing is used to provide the services. Applications on such authenticated devices will be housed within an encrypted container and BNY Mellon will maintain the ability to remote wipe the contents of the container.

  • Training Materials Training Materials will be provided for each student. Training Materials may be used only for either (i) the individual student’s reference during Boeing provided training and for review thereafter or (ii) Customer’s provision of training to individuals directly employed by the Customer.

  • Computer The Contractor shall maintain at its office for its use a computer with, at a minimum, a 1 GHz processor and an internet connection. The Contractor shall maintain individual email accounts for each of its project managers.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Computers All computers, hardware, software, computer upgrades and maintenance in connection therewith shall be at Owner's expense.

  • Interfaces GTE provides the CLECs with choices for access to OSS pre-ordering, ordering, maintenance and repair systems. Availability of the interfaces is fundamental to the CLEC being able to effectively do business with GTE. Additionally, in many instances, CLEC personnel must work with the service personnel of GTE. Measurements in this category assess the availability to the CLECs of systems and personnel at GTE work centers.

  • Passwords Passwords are an important aspect of computer security. A poorly chosen password may result in unauthorized access and/or exploitation of Placer County’s resources. All users, including contractors and vendors with access to the County’s systems, are responsible for the creation and protection of passwords and additionally any updates to County Password policies must be followed. Users must not use the same password for Placer County accounts and personal accounts. The reliability of passwords for maintaining confidentiality cannot be guaranteed. Always assume that someone, in addition to the intended or designated recipient, may read any and all messages and files. Any user suspecting that his/her password may have been compromised must, without delay, report the incident to Placer County IT. 10.2.4.1 Passwords must never be shared or disclosed. If a password is accidentally exposed or suspected of exposure, the password should be changed immediately. 10.2.4.2 All passwords must be changed on a specified, periodic basis. 10.2.4.3 Default passwords provided by the vendor for access to applications/systems on the network must be changed to unique and secret passwords. 10.2.4.4 Immediately inform the Information Technology Service Desk when user accounts are no longer required or will not be used for a period of 30 days or more. 10.2.4.5 All accounts not used for 90 days will be automatically disabled.

  • Protocols Each party hereby agrees that the inclusion of additional protocols may be required to make this Agreement specific. All such protocols shall be negotiated, determined and agreed upon by both parties hereto.

  • Processes Any employer, employee, trade union or employer’s association may at any point in time apply for an exemption from any of the provisions of this Collective Agreement. The applicant is required to complete and submit in writing with the relevant office of the Council, a fully and properly completed prescribed application for exemption form, accompanied by all relevant supporting documentation.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!