Use of Computers. Will necessary job tasks require access to a computer or other information technology (IT) equipment (either agency provided or employee owned)? If the job tasks require equipment, if the agency is not able to supply the employee with equipment, does the employee possess required equipment? Will the employee be permitted to use personal devices/home computers for business purposes? Access to files stored on networked servers?
Use of Computers. Access to Data Importer production networks is restricted to systems running Data Importer-approved and managed anti-virus software. As well, all Data Importer computer systems are managed by a centralized authentication system. All Data Importer employees are made aware of Data Importer acceptable use policies for Data Importer computers, internet access and email communications. New employees also receive a copy of Data Importer's Employee Handbook. New employees are required to sign a non-disclosure agreement relating to proprietary software and confidentiality of information relating to customers.
Use of Computers. Xxxxxx Carers are expected to comply with the Local Authority's policy relating to acceptable computer security and use, including the Internet, for themselves and any xxxxxx children in their care. In particular, information of a confidential nature must not be communicated via domestic or unsecure electronic devices, such as by email or text etc, as this would constitute a serious breach of confidentiality. The Local Authority policy on this will be made available to Xxxxxx Carers.
Use of Computers. The USPA President and Secretary shall be provided access to a networked computer, if not already provided as part of their jobs. December 1991 Revised, July 1992 Revised, July 1995 Revised, June 2003 Revised, August 2007
Use of Computers. Every student has a username and password to give them access to a personal area of the computer network and other shared resources. Your logon name will be your admission Number assigned from XXXX e.g. R07892 this will never change. If you need any help or have forgotten your password, ask IT Support Desk. Alternatively call ext.123
Use of Computers. Access to Proofpoint production networks is restricted to systems running Proofpoint-approved and managed anti-virus software. As well, all Proofpoint computer systems are managed by a centralized authentication system. All Proofpoint employees are made aware of Proofpoint acceptable use policies for Proofpoint computers, internet access and email communications. Proofpoint employees must acknowledge these policies and sign a document stating they agree to abide by them. New employees review and acknowledge Proofpoint’s Security Code of Conduct. New employees are required to sign a non-disclosure agreement relating to proprietary software and confidentiality of information relating to customers.
Use of Computers. If not being otherwise used for the Employer's business, union representatives may use computer equipment situated in their duty station or work site for representational matters. Such use is subject to security requirements and the provisions of Article 6.
Use of Computers. 16.1 Use by Students of the School’s computers will be subject to availability and at the School’s discretion
16.2 The Student is prohibited for using the School’s computers for unauthorised purposes including, but not limited to, accessing pornographic material or commercial activities
Use of Computers. (a) Rest Breaks Employees required to work continuously on computers will be given a ten (10) minute break (which shall include scheduled rest periods) within every hour of such continuous work.
Use of Computers. At no additional cost to Buyers, Sellers agree that Buyers will have “read only” access to the pharmacy application software for each specified location for a period of one hundred twenty (120) days following the Effective Time. Sellers warrant that such software shall be in working order as of the Effective Time and for a period of 120 days following Closing, and that Sellers are not prohibited by their licenses from allowing “read only” access to Buyers. Notwithstanding any of the foregoing, the computer(s), including the hardware and printers, used in the Business at the Leased Real Property location are included in the Purchased Assets.