Tablet PCs and Notebooks Sample Clauses

Tablet PCs and Notebooks. As a college we appreciate students have increasing access to personal mobile devices which can be beneficial to education. As a college we strongly advise all students to leave any high value devices at home as correct and appropriate ICT facilities will be provided to students whenever necessary. Any devices which are brought into school must be used appropriately and responsibly, and only when specific permission is agreed with the class teacher. The school, it’s staff and governing body takes no responsibility for loss or theft of any Tablet PC’s and Notebooks which students choose to bring into school. REVISED MAY 2014 XXXXXXXXXXX COLLEGE ACCEPTABLE USE POLICY | X XXXXX GLOSSARY Computer Misuse Act (1990) The Computer Misuse Act makes it an offence for anyone to have:-  Unauthorised access to computer material e.g. if you find or guess a fellow pupil’s password and use it.  Unauthorised access to deliberately commit an unlawful act e.g. if you guess a fellow pupil’s password and access their learning account without permission  Unauthorised changes to computer material e.g. if you change the desk-top set up on your computer or introduce a virus deliberately to the school’s network system. Data Protection Act (1998) The Data Protection Act ensures that information held about you is used for specific purposes only. These rules apply to everyone in the school, including teaching staff, support staff, volunteers and governors. The Act covers the collection, storing, editing, retrieving, disclosure, archiving and destruction of data held about individuals in the school. The Act not only applies to paper files it also applies to electronic files. The principles of the Act state that data must be:  Fairly and lawfully processed  Processed for limited purposes  Adequate, relevant and not excessive  Accurate and up to date  Kept no longer than necessary  Processed in accordance with data subject’s rights  Secure  Not transferred to other countries without adequate provision. RIPA – Regulation of Investigatory Powers Act (2002) If a request for authorised access is made to the school they will provide the appropriate access to your ICT records and files. The Act legislates for using methods of surveillance and information gathering to help the prevention of crime, including terrorism. RIPA makes provision for:  the interception of communications  the acquisition and disclosure of data relating to communications  the carrying out of surveillance  ...
AutoNDA by SimpleDocs

Related to Tablet PCs and Notebooks

  • MANUALS Each product delivered under contract to any Customer must be delivered with at least one (1) copy of a safety and operating manual and any other technical or maintenance manual. The cost of the manual(s) must be included in the price for the Product offered.

  • Devices BNY Mellon will restrict the transfer of Customer Data from its network to mass storage devices. BNY Mellon will use a mobile device management system or equivalent tool when mobile computing is used to provide the services. Applications on such authenticated devices will be housed within an encrypted container and BNY Mellon will maintain the ability to remote wipe the contents of the container.

  • Images If applicable, the CONSULTANT is prohibited from capturing on any visual medium images of any property, logo, student, or employee of the DISTRICT, or any image that represents the DISTRICT without express written consent from the DISTRICT.

  • Training Materials Training Materials will be provided for each student. Training Materials may be used only for either (i) the individual student’s reference during Boeing provided training and for review thereafter or (ii) Customer’s provision of training to individuals directly employed by the Customer.

  • DOCUMENTS, PRINTOUTS, ETC Certified copies of all documents, books, records, instructional materials, programs, printouts and memoranda of every description derived therefrom and pertaining to this Contract shall become the property of the Government and shall be turned over to it at the termination of this Contract, or at the Government’s request, during the life of the contract. The above-described materials shall not be used by Contractor or by any other person or entity except upon the written permission of the Government.

  • Computer The Contractor shall maintain at its office for its use a computer with, at a minimum, a 1 GHz processor and an internet connection. The Contractor shall maintain individual email accounts for each of its project managers.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Computers All computers, hardware, software, computer upgrades and maintenance in connection therewith shall be at Owner's expense.

  • Templates The Applicant shall use Templates provided by Alberta Innovates to comply with its Required Reporting Metrics, Reports obligations, and with the Survey requirements. Because the Reports may contain technical or proprietary information about the Project or the Applicant, the Templates will specify when a section will be considered non-confidential. The content of sections that are marked as non-confidential can be disclosed in the public domain. All other sections will be considered confidential, and thus can only be disclosed to the Government of Alberta and to Funding Partners, if any, in confidence, but to no other party.

  • Interfaces Bellcore’s GR-446-CORE defines the interface between the administration system and LIDB including specific message formats. (Bellcore’s TR-NWP-000029, Section 10)

Time is Money Join Law Insider Premium to draft better contracts faster.