Technology Use Policy Sample Clauses

Technology Use Policy. The Student acknowledges that the Technology Use Policy of the Institution applies to the use of the learning tool(s) hereunder and agrees to be bound by the terms of the Policy which can be accessed at xxxx.xxxx.
Technology Use Policy. PARENT AGREEMENT: I hereby release Oakwood School, its personnel, and any institutions with which it is affiliated, from any and all claims and damages of any nature arising from my child’s use of, or inability to use, the Oakwood School computer network; including, but not limited to claims that may arise from the unauthorized use of the system to purchase products or services. I will instruct my child regarding the rules of use of the information technology systems contained in this document and I understand and agree that the agreements contained herein are incorporated into the contract under which my child is enrolled at Oakwood School. I understand that it is impossible for Oakwood School to restrict access to all controversial materials, and I will not hold the school responsible for materials accessed on the network. I also agree to report any misuse of the system that I become aware of to the school administration. I understand that misuse includes, but is not limited to, sending or seeking to receive messages that contain or suggest pornography, unethical or illegal solicitation, physical or sexual threats, racism, sexism, inappropriate language and information, the disclosure of which would violate another person’s right of privacy. I accept full responsibility for my child’s use of information technology. I give permission to issue an email and network user account for my child and certify that my child and I have read and understand the information contained in this agreement and agree to abide by all rules set forth in this agreement.
Technology Use Policy. In accepting admission to Overlake I, on behalf of my student, accept the Overlake “Technology Use Policy” in its entirety. This policy is located on Overlake's website under Academic & Student Policies (xxxxx://xxx.xxxxxxxx.xxx/academics/technology/program).
Technology Use Policy. The purpose of this policy is to establish guidelines to ensure the proper use of computer and telecommunication resources and services by volunteers and other authorized users. LAFLA provides workplace technology—computers, voicemail, e-mail, internet and videoconferencing access—for authorized users to support LAFLA’s mission and professional activities. All users have the responsibility to use computer and telecommunications resources and services in an efficient, ethical, and lawful manner, in accordance with the guidelines established under this policy. LAFLA expects users to develop competency in using the computer and telecommunications resources to maximize efficiency and minimize the demand on LAFLA’s Technical Services staff. Violations of this policy may result in disciplinary action up to and including suspension, termination and/or legal action. 1. All computer and telecommunications equipment, resources, and services, including internal and external hard drives, software, CD-ROMs, datasticks, programs, documents, and data stored are LAFLA property and are intended for legitimate business purposes only. LAFLA may, at its discretion, monitor any and all aspects of the computer and telecommunication resources and services, including employee documents, e-mail, voice mail, and internet activity. Users have no expectation of privacy or right to claim ownership of anything they create, send, or receive using LAFLA’s computer and telecommunications technology. 2. LAFLA issues each user a personal password that is intended for his/her use only. LAFLA will determine, on an individual “need to have” basis, which directories and files each user can access, and will assign access rights accordingly. Users may not share their log-in information with anyone. Users must not facilitate non-authorized access to LAFLA systems, programs or databases. 3. Hackers, viruses, worms, and other intrusions can seriously compromise the integrity of LAFLA’s computer network. Because of the potential exposure to such dangers, no user may use his or her own personal computer (including laptops and tablets) to access LAFLA’s technology systems without LAFLA’s Director of Information and Technology’s written authorization. LAFLA does allow web-based email access through xxxxx.xxx. 4. LAFLA strictly prohibits using wireless technology (including PDAs and wireless routers) to access LAFLA’s technology systems. Users may only synchronize PDAs with LAFLA systems with LAFLA’s Dir...
Technology Use Policy. Before working on technological devices, it is important that you understand the responsibility and standards of conduct necessary for its use. This includes: ● Respect for Property: taking care of school and personal possessions. ● Morally good conduct: showing a godly example. With regard to these standards a student must not at school: ● Use technological equipment (other than Chromebooks) without permission and without supervision of a CCA staff member. ● Initiate or visit accounts for private use or communication. This includes Yahoo, Skype, Facebook, etc… ● Access sites that the school would deem inappropriate (i.e. pornographic, unlawful, obscene, or otherwise objectionable material). ● Violate copyright or other intellectual property rights. ● Illegally store, use, distribute or copy software. ● Transmit threatening, obscene or offensive materials. ● Engage in electronic ‘stalking’, cyberbullying, or other forms of harassment, including abusive or aggressive language toward other students or staff. ● Gain unauthorized access to any computing, information or communication devices or resources, including, but not limited to, any machines accessible via the Internet. ● Damage, modify or destroy the files, data, passwords, devices or resources of CCA, other users or third parties. ● Conduct any activity or solicit the performance of any activity that is prohibited by law. ● Use the service to interfere with or disrupt other network users, services or equipment. ● Load, attempt to load or use any unauthorized discs, programs or files. ● Use the computer/internet for anything other than school assignments and projects. ● Send or receive email, send or respond to an instant message, or enter a chat room at any time while using school computers without direct approval and supervision from the teacher. ● Post personal contact information about yourself or others. This includes information such as: home address, telephone number, financial information, etc.
Technology Use Policy. I have read the St. Xxxx Lutheran School Technology Usage Policy and have discussed it with my child(ren), and we agree to the Code of Conduct as outlined. I understand that my child’s privilege to use technology at SPLS can and will be revoked if he/she violates these rules. I give consent for SPLS teachers to use educational technology tools and resources with students as such tools would augment the learning process. Students will not be allowed access to technology at SPLS until this agreement is signed by a parent or legal guardian.

Related to Technology Use Policy

  • Technology Access Contractor expressly acknowledges that state funds may not be expended in connection with the purchase of an automated information system unless that system meets certain statutory requirements relating to accessibility by persons with visual impairments. Accordingly, Contractor represents and warrants to System Agency that the technology provided to System Agency for purchase (if applicable under this Contract or any related Solicitation) is capable, either by virtue of features included within the technology or because it is readily adaptable by use with other technology, of: • providing equivalent access for effective use by both visual and non-visual means; • presenting information, including prompts used for interactive communications, in formats intended for non-visual use; and • being integrated into networks for obtaining, retrieving, and disseminating information used by individuals who are not blind or visually impaired. For purposes of this Section, the phrase “equivalent access” means a substantially similar ability to communicate with or make use of the technology, either directly by features incorporated within the technology or by other reasonable means such as assistive devices or services which would constitute reasonable accommodations under the Americans With Disabilities Act or similar state or federal laws. Examples of methods by which equivalent access may be provided include, but are not limited to, keyboard alternatives to mouse commands and other means of navigating graphical displays, and customizable display appearance. In accordance with Section 2157.005 of the Texas Government Code, the Technology Access Clause contract provision remains in effect for any contract entered into before September 1, 2006.

  • Technology Upgrades Notwithstanding any other provision of this Agreement, Verizon shall have the right to deploy, upgrade, migrate and maintain its network at its discretion. The Parties acknowledge that Verizon, at its election, may deploy fiber throughout its network and that such fiber deployment may inhibit or facilitate Ymax’s ability to provide service using certain technologies. Nothing in this Agreement shall limit Verizon's ability to modify its network through the incorporation of new equipment or software or otherwise. Ymax shall be solely responsible for the cost and activities associated with accommodating such changes in its own network.

  • Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: xxxx://xxx.xxxxxx-xxxxx.xxx/508.htm.

  • Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.

  • Technology Research Analyst Job# 1810 General Characteristics

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes. 11.2 We may (i) compile statistical and other information related to the performance, operation and use of the Services, and (ii) use data from the Services in aggregated form for security and operations management, to create statistical analyses, and for research and development purposes (clauses i and ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly available; however, Service Analyses will not incorporate Your Content, Personal Data or Confidential Information in a form that could serve to identify You or any individual. We retain all intellectual property rights in Service Analyses. 11.3 We may provide You with the ability to obtain certain Oracle Software (as defined below) for use with the Services. If we provide Oracle Software to You and do not specify separate terms for such software, then such Oracle Software is provided as part of the Services and You have the non-exclusive, worldwide, limited right to use such Oracle Software, subject to the terms of this Agreement and Your order (except for separately licensed elements of the Oracle Software, which separately licensed elements are governed by the applicable separate terms), solely to facilitate Your use of the Services. You may allow Your Users to use the Oracle Software for this purpose, and You are responsible for their compliance with the license terms. Your right to use any Oracle Software will terminate upon the earlier of our notice (by web posting or otherwise) or the end of the Services associated with the Oracle Software. Notwithstanding the foregoing, if Oracle Software is licensed to You under separate terms, then Your use of such software is governed by the separate terms. Your right to use any part of the Oracle Software that is licensed under the separate terms is not restricted in any way by this Agreement.

  • Software Development Software designs, prototypes, and all documentation for the final designs developed under this agreement must be made fully transferable upon direction of NSF. NSF may make the software design, prototype, and documentation for the final design available to competitors for review during any anticipated re-competition of the project.

  • Technology License 4.1 Unless any event described in Article 2.2 or 2.3 of this Agreement occurs, all of the technology required to be licensed for any of Party B’s business shall be provided by Party A on an exclusive basis. Party A will try its best to license Party B to use the technology owned by Party A, or re-license Party B to use the technology as approved by the owner. 4.2 The Parties shall negotiate with each other to enter into specific technology license contracts to expressly specify the detail matters such as the technology to be licensed, the method to license the technology, license fees and payment.

  • Maintenance and Support Services If this Agreement is for IT goods or services, this section applies: Unless otherwise specified in this Agreement: The Contractor shall promptly provide the Court with all Upgrades, including without limitation: (i) all Upgrades generally made available by Contractor to its other customers; (ii) Upgrades as necessary so that the Work complies with the Specifications and Applicable Law (including changes in Applicable Law); (iii) Upgrades as necessary so that the Work operates under new versions or releases of the Court’s operating system or database platform; and (iv) all on-site services necessary for installation of Upgrades. Without limiting any other obligation of Contractor under this Agreement, Contractor represents and warrants that it will maintain services, equipment, software or any other part of the Work so that they operate in accordance with their Specifications and Documentation; and The Contractor shall respond to the Court within four (4) hours after the Court reports a Technical Support Incident (such hours all occurring during Standard M&S Hours) to Contractor. DELIVERY, ACCEPTANCE, AND PAYMENT Delivery. Contractor shall deliver to the Court the Deliverables in accordance with this Agreement, including the Statement of Work. Unless otherwise specified by this Agreement, Contractor will deliver all goods purchased by the Court “Free on Board Destination Freight Prepaid” to the Court at the address and location specified by the Court. Title to all goods purchased by the Court vests in the Court upon payment of the applicable purchase price. Contractor will bear the risk of loss for any Work being delivered until received by the Court at the proper location. All shipments by Contractor or its Subcontractors must include packing sheets identifying: this Agreement number, the Court’s purchase order number, item number, quantity and unit of measure, part number and description of the goods shipped, and appropriate evidence of inspection, if required. Goods for different Agreements shall be listed on separate packing sheets.

  • Technology Access Fee In consideration of the licenses and rights granted to Regado herein, Regado shall, as of the date immediately preceding the closing (the “Closing’) of the first equity financing of Regado in which Regado is assigned a pre-money valuation of not less than three million dollars ($3,000,000), issue to Archemix fully-paid and non-assessable shares of common stock of Regado equal to three and three-quarters percent (3.75%) of the total number of equity shares of Regado, on a fully diluted basis, immediately prior to the issuance of shares at the Closing. Regado shall deliver written notice of the Closing to Archemix at least ten (10) business days prior to such Closing in accordance with the notice provisions contained in Section 14.1 of this Agreement. Archemix and Regado shall enter into such agreements relating to the issuance of the common stock as are customary under such circumstances. For the purpose of this Agreement, “fully diluted basis” shall mean the aggregate of (a) the number of shares of common stock issued and outstanding on the determination date, (b) the number of shares of common stock issuable upon exercise, exchange or conversion of all exercisable, exchangeable or convertible securities outstanding on the determination date, assuming such securities were exercised, exchanged or converted on the determination date (without regard to whether such securities are actually exercisable, exchangeable or convertible on the determination date) and (c) the number of shares of common stock issuable pursuant to any other obligation or agreement of, or right granted by, Regado, whether vested or unvested, contingent or otherwise.