The Web Services E-Verify Employer Agent agrees to, consistent with applicable laws, regulations, and policies, commit sufficient personnel and resources to meet the requirements of this MOU.
Workspace Whenever an academic or student union building is planned for construction or renovation, there shall be consideration of the needs for office space of graduate student employees in relevant departments. The University shall provide to all graduate student employees an on-campus mailbox. With approval of their department chair, graduate student employees shall be given key access into the buildings in which their offices or labs are housed for the purpose of performing assistantship work in said office or lab which is permitted by the department chair to be done outside of regular business hours. Department chairs may deny key access into buildings and/or offices/labs in order to minimize access to confidential materials or to minimize the risk of theft, fire/explosion hazards, personal harm, and other security/safety issues. Denial shall not be arbitrary or capricious. If key access is denied, the reason will be provided to the graduate student employee(s) involved. All departmental policies related to the issuance of keys to TOs shall apply equally to TOs in the Division of Continuing Education. Graduate student employees shall have reasonable access to photocopiers for copying related to their employment within departmental guidelines for usage. The parties agree to the creation of a joint committee, composed of equal numbers of representatives of the Union and the University, that will attempt to develop a plan to provide appropriate telephone access for bargaining unit members in connection with their employment responsibilities. The University will provide to this committee a report on the offices assigned to bargaining unit members during the 2005-2006 academic year and the proximity of those offices to a University telephone available for use by the respective bargaining unit member.
E10 Malicious Software E10.1 The Contractor shall, as an enduring obligation throughout the Contract Period, use the latest versions of anti-virus definitions available from an industry accepted anti-virus software vendor to check for and delete Malicious Software from the ICT Environment.
Linking to the Website and Social Media Features You may link to our homepage, provided you do so in a way that is fair and legal and does not damage our reputation or take advantage of it, but you must not establish a link in such a way as to suggest any form of association, approval, or endorsement on our part. This Website may provide certain social media features that enable you to: • Link from your own or certain third-party websites to certain content on this Website. • Send emails or other communications with certain content, or links to certain content, on this Website. • Cause limited portions of content on this Website to be displayed or appear to be displayed on your own or certain third-party websites. You may use these features solely as they are provided by us, and solely with respect to the content they are displayed with, and otherwise in accordance with any additional terms and conditions we provide with respect to such features. Subject to the foregoing, you must not: • Establish a link from any website that is not owned by you. • Cause the Website or portions of it to be displayed on, or appear to be displayed by, any other site, for example, framing, deep linking, or in-line linking. • Link to any part of the Website other than the homepage. • Otherwise take any action with respect to the materials on this Website that is inconsistent with any other provision of these Terms of Use. The website from which you are linking, or on which you make certain content available, must comply in all respects with the Content Standards set out in these Terms of Use. You agree to cooperate with us in causing any unauthorized framing or linking immediately to stop. We reserve the right to withdraw linking permission without notice. We may disable all or any social media features and any links at any time without notice in our discretion.
Misuse of Internet-based Services You may not use these services in any way that could harm them or impair anyone else’s use of them. You may not use the services to try to gain unauthorized access to any service, data, account or network by any means.
Malicious Software 12.1 The Supplier shall, as an enduring obligation throughout the Term, use the latest versions of anti-virus definitions available [from an industry accepted anti-virus software vendor] to check for and delete Malicious Software from the ICT Environment.
Functionality Customer is entitled to additional functionality previously purchased or bundled with the software if available in the version or update released on or after the start date of the Agreement. Customer acknowledges that certain functionality in current and previous software versions may not be available in future upgrades. Added functionality may require additional paid services (clinical and technical) to configure and support.
Content You Provide You hereby grant to the Financial Institution and its service providers, including Central 1 and Yodlee Inc. (collectively, “Service Providers”) a license to use any information, data, passwords, materials or other content (collectively, “Your Content”) that you provide through or to the PFM Service for the following purposes:
AT WEBSITE XXX XXXXXXXXXXXXXXXX.XXX Prospective bidders may submit bids for the property online via xxx.xxxxxxxxxxxxxxxx.xxx (For online bidding, please register at least one (1) working day before auction day for registration & verification purposes)
Software Use Case Red Hat Enterprise Virtualization Supported on physical hardware solely to support virtual quests. Red Hat Enterprise Virtualization is designed to run and manage virtual instances and does not support user-space applications. Red Hat Enterprise Virtualization may be used as a virtual desktop infrastructure solution, however, the Subscription does not come with any software or support for the desktop operating system. You must purchase the operating system for each instance of a desktop or server separately.