User Tasks Sample Clauses

User Tasks. Table 2 then identifies key tasks for the main user types. Listed tasks represent some of the main activities engaged in by producers and consumers of paths in each of the four domains. These are generalised tasks, and used are for example purposes only; they are not intended to be a comprehensive list at this stage. Some tasks may involve both producers and consumers working together, for example a teacher directing students in a learning activity that involves the creation of a path. Other tasks are undertaken solely by a producer or a consumer, although it is likely that most producers have one or more consumer groups in mind. Some tasks may be undertaken collaboratively; for example, students may be required to work together on a learning exercise, and designing an exhibition may primarily be the task of a curator, but they may receive input from their educator and marketing colleagues. Further details of user tasks are extrapolated from the interview data in Sections 5 and 6, and then developed into use cases in Section 8.  Curator  General  School  Learners  „Culture  Producer‟s  Tourism  Service users  Librarian / visitors teacher  Producer vulture‟ social  Creative – general archivist  Family  University groups in the  Creative network industries  Service users  Education visitors teacher Education hobbyist (e.g. (known)  Publisher –professional officer  Tourist  Other teacher domain photographer  Other general  Librarian /  Producer‟s  Outreach visitors  Learners  Producer‟s / artist) users archivist professional  Marketing /  Education (directed by professional  Lifelong (unknown)  Professional network PR visitors teacher) network learner  Producer creative (e.g.  Producer  Community  Researcher  Genealogist groups from photographer groups from groups  Librarian /  Amateur the General / designer / all other  Producer‟s archivist historian domain journalist) domains professional  Tourist  Consumer network groups from  Producer and all other Consumers domains from all other domains The primary producer types have been highlighted and classified by their primary task. Those producer categories that are not highlighted are seen as secondary users of PATHS at the present time. Creative Teaching Research Information Hybrid Producers Consumers Producers Consumers Producers Consumers Producers Consumers     Create an exhibition Create a learning resource or trail Promote the collections / exhibitions Showcase a...
AutoNDA by SimpleDocs

Related to User Tasks

  • Programming Phase Schematic Design Phase: 2.2.1.3. Design Development Phase:

  • Random Drug Testing All employees covered by this Agreement shall be subject to random drug testing in accordance with Appendix D.

  • Drug Testing (A) The state and the PBA agree to drug testing of employees in accordance with section 112.0455, F.S., the Drug-Free Workplace Act. (B) All classes covered by this Agreement are designated special risk classes for drug testing purposes. Special risk means employees who are required as a condition of employment to be certified under Chapter 633 or Chapter 943, F.S. (C) An employee shall have the right to grieve any disciplinary action taken under section 112.0455, the Drug-Free Workplace Act, subject to the limitations on the grievability of disciplinary actions in Article 10. If an employee is not disciplined but is denied a demotion, reassignment, or promotion as a result of a positive confirmed drug test, the employee shall have the right to grieve such action in accordance with Article 6.

  • Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • User Content You retain your rights in Your Content, subject to the rights granted below and our rights in Our Property (as defined below). You hereby grant and agree to grant us a worldwide, non-exclusive, perpetual, irrevocable, royalty-free, fully-paid, transferable license, with the right to sublicense through multiple tiers, to copy, edit, modify, adapt, publish, transmit, distribute, prepare derivative works, perform, display and to otherwise use in any manner, Your Content in connection with operation and promotion of the Service and any other purposes reasonably related to the Service or our business. To the extent reasonably necessary or appropriate to effect or support the license granted by you above, you hereby waive and agree to waive (or if not waivable, agree not to assert) any rights of privacy or publicity, or any moral rights or other similar rights, with respect to Your Content. You agree that we are not responsible for any use or disclosure of Your Content by other Users or any third party who gains access to it through the Service (which may include unintended activities by third parties, such as by hackers). You represent and warrant that you own all proprietary rights in Your Content or, with respect to any of Your Content you do not own, that you have the full authority and right to create, upload, store and/or transmit Your Content, and to grant the licenses and rights you have granted in this Agreement, and that your creation, uploading, storage and/or transmission of Your Content, and the exercise by us and other Users of the licenses and rights granted by you herein, shall not infringe any third party intellectual property or proprietary rights, nor violate any rights of privacy or publicity. We do not control User Content, and we are not responsible for its content, accuracy or reliability. We are under no obligation to edit or control User Content, although we reserve the right to review, and take certain actions with respect to, User Content in accordance with this Agreement, including the Privacy Policy (as defined below). In the event that we deem, in our sole discretion, any User Content to be inconsistent with the terms of this Agreement, the Privacy Policy, or any other rules or policies we may publish from time to time, we may remove such User Content from the Service, including incomplete posts, duplicate posts, or any other User Content we deem, in our sole discretion, to be misleading or otherwise inappropriate. On termination of your account, or this Agreement, we have no obligation to return any User Content to you, so you should retain copies of all of Your Content. In addition to and without limiting any other rights herein (including in the Privacy Policy), you also grant us the rights to (i) de-identify Your Content (i.e., to remove your name and other identifying characteristics, consistent with applicable laws and regulations), (ii) use or disclose de-identified data for any purpose, and (iii) share de- identified data with third parties.

  • Trunk Group Architecture and Traffic Routing 5.2.1 The Parties shall jointly establish Access Toll Connecting Trunks between CLEC and CBT by which they will jointly provide Tandem-transported Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic from and to CLEC's Customers. 5.2.2 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access and non-translated Toll Free traffic (e.g., 800/888) to allow CLEC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier that is connected to the CBT access Tandem. 5.2.3 The Access Toll Connecting Trunks shall be one-way or two-way trunks, as mutually agreed, connecting an End Office Switch that CLEC utilizes to provide Telephone Exchange Service and Switched Exchange Access Service in the given LATA to an access Tandem Switch CBT utilizes to provide Exchange Access in the LATA.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • Interconnection Customer Drawings Within one hundred twenty (120) days after the date of Initial Operation, unless the Interconnection Parties agree on another mutually acceptable deadline, the Interconnection Customer shall deliver to the Transmission Provider and the Interconnected Transmission Owner final, “as-built” drawings, information and documents regarding the Customer Interconnection Facilities, including, as and to the extent applicable: a one-line diagram, a site plan showing the Customer Facility and the Customer Interconnection Facilities, plan and elevation drawings showing the layout of the Customer Interconnection Facilities, a relay functional diagram, relaying AC and DC schematic wiring diagrams and relay settings for all facilities associated with the Interconnection Customer's step-up transformers, the facilities connecting the Customer Facility to the step-up transformers and the Customer Interconnection Facilities, and the impedances (determined by factory tests) for the associated step-up transformers and the Customer Facility. As applicable, the Interconnection Customer shall provide Transmission Provider and the Interconnected Transmission Owner specifications for the excitation system, automatic voltage regulator, Customer Facility control and protection settings, transformer tap settings, and communications.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!