Use of Technology. Participants are subject to all existing laws (federal and state) and University regulations and policies on use of technology, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct such as: • UC Electronic Communications Policy: xxxx://xxx.xxxx.xxx/ucophome/policies/ec/ • UCLA E-mail Policy and Guidelines: xxxx://xxx.xxxxxxxxxxxxx.xxxx.xxx/app/Default.aspx?&id=455 • IT Services Acceptable Use Policy: xxxx://xxx.xxx.xxxx.xxx/policies/aupdetail.html • The UC Policy on Copyright Ownership: xxxx://xxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx.xxx/resources/copyright-ownership.html • Bruin OnLine Service Level Agreement: xxxx://xxx.xxx.xxxx.xxx/policies/BOL_SLA.pdf Any violation may result in technology related privileges being restricted or revoked and may also result in The University undertaking disciplinary action. If the violation constitutes a criminal offense, appropriate legal action may be taken.
Use of Technology a. When teachers are tasked with creating and maintaining teacher websites and/or other technology tools, parameters will be defined and teachers will be provided both training and a reasonable period of time to develop them.
Use of Technology. The Employer may offer work assignments to all eligible employees on the call-in lists by use of technology, such as text messaging and electronic scheduling programs that allow for automation and/or for all employees on call-in lists to be contacted at the same time. The Employer will discuss their intention to introduce technology for call-in procedures with the Union. To support the transition to using a new process or to introduce technology, the Employer will clearly outline the process with employees prior to implementation. To the extent necessary, the parties will meet to negotiate amendments to the local issues MOA to achieve consistency in terms with newly introduced technologies.
Use of Technology. Technology was available: Yes No Available technology was used: to fullest advantage to partial advantage not at all available technology was not appropriate to the class
Use of Technology. 17.2.1 All Grades: Post attendance daily to Infinite Campus.
Use of Technology. The Participant is subject to all existing laws (federal and state) and University regulations and policies on use of technology, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct such as:
Use of Technology. The Technology shall be used for commercial and/or civilian purposes only. LICENSEE shall ensure that it complies with all applicable laws, rules and regulations governing the use, export and disposal of the Technology and the Licensed Products. ************************************************
Use of Technology. 13.11 When a meeting is required under this article, such meeting can occur over a telecommunication medium when agreed by both parties
Use of Technology. The Company agrees to protect, defend, indemnify and hold Baylor, its Affiliates and their respective officers, trustees, directors, employees, agents and representatives harmless from and against, and to pay any and all amounts arising out of any and all losses, liabilities, claims, demands, causes of action, lawsuits or other proceedings (whether in contract, tort, strict liability or otherwise), fines, assessments, damages or any other amounts of whatever nature which Baylor, its Affiliates or their respective officers, trustees, directors, employees, agents or representatives may sustain or incur, of any claims or demands of any third party (including, but not limited to, the officers, directors, employees, agents, consultants, representatives or servants of the Company) arising from the use, testing, operation, sale, lease or manufacture of the Technology or any Improvement or products and services (including without limitation thereto, Licensed Patented Products and Licensed Products) using the Technology or any Improvement (including those resulting in whole or in part from the negligence of any of such indemnified Persons conducted under the direct supervision of the Company, Xxxxxxxx or Yip, but not otherwise), provided, however, that the Company shall not be required to indemnify and hold such indemnified Persons harmless from and against losses, liabilities, claims, demands, causes of action, lawsuits or other proceedings, fines, assessments, damages or any other amounts of whatever nature which such indemnified Persons may sustain or incur as a result of the use, testing, sale or manufacture of the Technology or any Improvement prior to the Effective Date, or the use, testing, sale or manufacture of the Technology or any Improvement by Baylor its Affiliates and their respective officers, trustees, directors, employees, agents and representatives arising out of the gross negligence or willful misconduct of such indemnified Persons or the negligence of such indemnified Persons not conducted under the direct supervision of the Company, Xxxxxxxx or Xxx.
Use of Technology. With respect to each item of Intellectual Property listed in Section 3.7 of the Inovio Disclosure Letter which consists of a computer program, software, electronic process or related process, procedure or technology, (i) Inovio maintains machine-readable master-reproducible copies, source code listings, technical documentation and user manuals, to the extent applicable, for the most current releases or versions thereof and for all earlier releases or versions thereof currently being, or which by contract for the benefit of any customer is to be, supported by each of them; (ii) in each case, the machine-readable copy substantially conforms to the corresponding source code listing; (iii) it is written in the language set forth in Section 3.7 of the Inovio Disclosure Letter for use on the hardware set forth in Section 3.7 of the Inovio Disclosure Letter or with standard operating systems; (iv) it can be maintained and modified by reasonably competent programmers familiar with such language, hardware and operating systems without incurring material costs, disbursements, and person hours; and (v) in each case, it operates in accordance with the user manual therefore without material operating defects or known, reproducible errors. Except with respect to demonstration or trial copies, no portion of any Inovio Intellectual Property contains any "back door," "time bomb," "Trojan horse," "worm," "drop dead device," "virus" or other software routines or hardware components designed to permit unauthorized access or to disable or erase software, hardware, or data without the consent of the user.