Use of Laptop Sample Clauses

Use of Laptop. Educational content and resources will be delivered through the laptop and students will often be called upon to collaborate, communicate, and create. For this to occur, students are expected to bring their laptop to school in working order and fully charged each day. Students, with support from families, are expected to manage and operate their laptops in a way that minimizes the likelihood of damage, loss, theft, and reinforces Internet safety. Monitoring student use is a partnership between families and the district. Each laptop is monitored with software when school is in session. The district is not responsible during break periods. The software provides the district with real-time alerts and automated reporting for inappropriate use of the district’s computer system. Remote access may be required to troubleshoot a laptop issue. This will only be conducted via the IT Request process with IT staff. The usage of the laptop must be consistent with district policies and the Code of Conduct and Character. It is the responsibility of the student to back up any personal content from the laptop before the date the laptop will be collected.
AutoNDA by SimpleDocs
Use of Laptop. Educational content and resources will be delivered through the laptops. Each day, students are expected to bring their laptop computers to school in working order and fully charged. Students, with support from parents/guardians, are expected to manage their laptops in a way that minimizes the likelihood of damage, loss, and theft. The district will provide all applications that are essential for schoolwork. Students will be responsible for managing available storage space on the device for curricular content. It is the responsibility of the student to back up any personal content from the laptop before the date the laptop will be collected. All use of the laptop must be consistent with District policies and the Student Code of Conduct.
Use of Laptop. Whilst the laptop is issued to the student, they are responsible for taking care of and securing the laptop and accessories.  When not in use the laptop should be stored in its carry case. Should students need to leave the laptop unattended it needs to be stored in a secure location e.g. classroom.  Equity Pool Laptops currently cannot be removed from the school. Each laptop has an inbuilt tracking and kill switch to deter theft. Should a laptop be lost or stolen students must report this immediately.  If a laptop is accidentally damaged students must report the damage immediately to administration personnel. Laptops are covered by an insurance policy that protects against accidental damage however there is no cover for negligence, abuse or malicious damage.  Where the school determines that damage to the laptop has been intentionally caused to a device or a student has disrespected school property, the full cost of repair or replacement may be charged.  If damage occurs to the laptop the school will determine when and/or if a replacement machine is made available to the student.  Before switching on, gently place the laptop on a stable surface and then switch on.  Avoid moving your laptop around when it is turned on and always package, carry and store the laptop in its carry case for transportation.  Ensure the laptop is switched off before being placed into the carry case and transported.  Take care when using the laptop. Avoid dropping or bumping the machine. Don’t poke, prod, push or slam the LCD screen. Never pick up the laptop by its screen.  Only connect the adapter supplied to your machine. Never use an adapter belonging to another machine. Do not wrap the cord tightly around the adapter box and when unplugging the power cord, pull on the plug itself, not the cord.  Computer batteries can become hot during use. Do not use the computer on your lap.  Don’t have food or drink near the laptop.  Only Rosedale State School issued USB storage devices can be used with the laptop. Foreign storage devices are not permitted to be used. Replacement USB devices are able to be purchased. Student Laptop Use Agreement Form - Ed.equip # (School use) I, understand, acknowledge and accept the above responsibilities regarding the Student Laptop Use Agreement and would like to hire a laptop (Acer Travelmate B117) from the school for $100/school year. Student name Student signature Date Parent/Caregiver name Parent/Caregiver signature Date Payment Received ...
Use of Laptop. Whilst the laptop is issued to the student, they are responsible for taking care of and securing the laptop and accessories. If at anytime during the first four years of hire agreement, the student is no longer enrolled at the school, the laptop, case and charger must be returned to the school in good condition. When not in use the laptop should be stored in its carry case. Should students need to leave the laptop unattended it needs to be stored in a secure location e.g. classroom. Equity Pool Laptops currently cannot be removed from the school. Each laptop has an inbuilt tracking and kill switch to deter theft. Should a laptop be lost or stolen students must report this immediately. If a laptop is accidentally damaged students must report the damage immediately to administration
Use of Laptop. The Parent and student also agree to abide by the terms of the laptop Acceptable Use Agreement, which is incorporated herein by reference, and acknowledges that the failure to comply with directions, agreements and covenants regarding laptop use shall constitute a breach of the obligations of the Parent and Student under this Agreement and shall constitute a default pursuant to Paragraph 8, hereinafter.
Use of Laptop. Provide NBPTS candidates with the use of a laptop computer for portfolio preparation.

Related to Use of Laptop

  • Use of Image I hereby consent to the use of my image by EMPOWER for any and all purposes, including, without limitation or compensation: Video, still photographs, publication and any trade or advertising purposes, providing such uses are not made as to constitute a direct endorsement of any product or service. PARTICIPANT INFORMATION (MUST BE COMPLETED FOR ALL PARTICIPANT(S) Name of Participant: (Print Clearly) Initial Date of Birth: _ Weight: Check In on Facebook Street Address: City: State: Zip: Phone Number: Email Address: Emergency Contact: Phone Number: Emergency Contact’s Relationship to Participant: By signing this document, I acknowledge that I may be found by a court of law to have waived my right to a lawsuit against the Released Parties on the basis of any claim herein from which I have released them. I HAVE HAD THE SUFFICIENT OPPORTUNITY TO READ THIS ENTIRE DOCUMENT. I HAVE CAREFULLY READ AND UNDERSTOOD IT AND AGREE TO BE BOUND BY ITS TERMS. Participant’s Signature: (Over 18 years of age) Date: PARENT OR GUARDIAN’S ADDITIONAL INDEMNIFICATION (MUST BE COMPLETED FOR PARTICIPANTS UNDER THE AGE OF 18) I, (parent/guardian name), the parent/guardian of (Xxxxx’s name) whose date of birth is / / give permission for my child to participate in the activities and utilize the equipment and facilities provided by EMPOWER. I have reviewed the terms of the above Agreement and, as parent/guardian, accept its terms. I have discussed the terms of the above Agreement with my child and am assured by my child that he/she understands the Agreement and has also freely accepted its terms. I agree to fully release, indemnify and hold harmless the Released Parties from any claims which I may have and, to the fullest extent allowed by law, to release the Released Parties on behalf of my child for any claim(s) that my child may have. I further agree to indemnify and hold harmless the Released Parties from any and all claims which are brought by, or on behalf of the above stated minor and which are in any way connected with such use or participation by the above stated minor. I HAVE HAD THE SUFFICIENT OPPORTUNITY TO READ THIS ENTIRE DOCUMENT. I HAVE READ AND UNDERSTOOD IT AND AGREE THAT MYSELF AND MY MINOR CHILD ARE TO BE BOUND BY ITS TERMS. Parent/Guardian’s Signature: Date:

  • Use of Cookies 5.1 We use cookies to ensure that our website works effectively and to support your trading activities. Cookies are small text files sent from our web server to your computer. Our cookies do not contain any personal data, account numbers, or passwords.

  • Use of Content The content on the App is provided to you “as is” for your personal use only and may not be used, copied, distributed, transmitted, broadcast, displayed, sold, licensed, de-compiled, or otherwise exploited for any other purposes whatsoever without our prior written consent. If you download or print a copy of the content you must retain all copyright and other proprietary notices contained therein.

  • Use of Software Any software that is available on the Services ("Software") is the copyrighted work of Red Hat and/or its licensors. Copying or reproducing the Software to any other server or location for further reproduction or redistribution is strictly prohibited, unless such reproduction or redistribution is permitted by a license agreement accompanying such Software. You may not create derivative works of the Software, or attempt to decompile or reverse-engineer the Software unless otherwise permitted by law. Use of the Software is subject to the license terms of any license agreement that may accompany or is provided with the Software. You may not download any Software until you have read and accepted the terms of the accompanying software license. WITHOUT LIMITING THE FOREGOING, THE SOFTWARE IS WARRANTED, IF AT ALL, ONLY ACCORDING TO THE TERMS OF THE SEPARATE LICENSE AGREEMENT ACCOMPANYING THE SOFTWARE. EXCEPT AS WARRANTED IN SUCH LICENSE AGREEMENT, RED HAT, ITS PARENT, SUBSIDIARY, AND AFFILIATE COMPANIES, AND ITS LICENSORS DISCLAIM ALL WARRANTIES AND CONDITIONS WITH REGARD TO THE SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT, TO THE MAXIMUM EXTENT PERMITTED BY LAW.

  • Use of Vehicles Use or authorize the Vehicles to be used in any manner (i) that would make such Vehicles that are Program Vehicles ineligible for repurchase or sale under the applicable Eligible Vehicle Disposition Program, (ii) for any illegal purposes or (iii) that could subject the Vehicles to confiscation.

  • Use of the Software licensed hereunder may require third party software or hardware (including but limited to databases, operating systems and servers). Unless specifically licensed in the Master Agreement, this Agreement does not contain a license to use such additional materials.

  • Use of Likeness As part of the consideration for this Housing Agreement, Resident authorizes Owner and its affiliates to make photographs and video recordings of Resident in community and resident amenity areas, and irrevocably grants Owner and its affiliates a royalty-free license to use Resident’s image and likeness for all lawful purposes, including promotional purposes in advertising, video, web, social media and other formats.

  • Use of Leave An employee does not need to use this leave entitlement in one block. Leave can be taken intermittently or on a reduced leave schedule when medically necessary. Employees must make reasonable efforts to schedule leave for planned medical treatment so as not to unduly disrupt the employer’s operations. Leave due to qualifying exigencies may also be taken on an intermittent basis.

  • Use of PTO 10.5.1 PTO may be used as soon as it is earned, up to the amount accrued in the pay period immediately preceding the time off, in accordance with the provisions of this Article. PTO may not be used in advance of its accrual, on regularly scheduled days off, or to claim pay for time lost due to tardiness.

  • Use of Data by User Registry Operator will permit user to use the zone file for lawful purposes; provided that (a) user takes all reasonable steps to protect against unauthorized access to and use and disclosure of the data and (b) under no circumstances will Registry Operator be required or permitted to allow user to use the data to, (i) allow, enable, or otherwise support the transmission by email, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than user’s own existing customers, or (ii) enable high volume, automated, electronic processes that send queries or data to the systems of Registry Operator or any ICANN-­‐accredited registrar.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!