Using Technology Sample Clauses

Using Technology. The student identifies and applies appropriate technologies.  Adapt to new technology  Understand new technology-related vocabulary  Use a computer
AutoNDA by SimpleDocs
Using Technology. The student identifies and applies appropriate technologies.
Using Technology. Students will use their device to access electronic resources (including the internet) at school. Parents/carers should be aware that the nature of the internet means that full protection from inappropriate content can never be fully guaranteed. The school uses two layers of filtering to ensure inappropriate content isn’t accessible, the schools own firewall along with the Department’s firewall.
Using Technology. I understand that the school will monitor use of equipment my use of the school systems, email and other digital communications by using software and CCTV. • I understand that the rules set out in this agreement also apply to use of school systems (e.g. laptops, email) out of school, and to the transfer of personal data (digital or paper based) out of school (personal data including academic data and contact information relating to any adult or student a the school). • I understand that the school systems are intended for educational use, and should be used in accordance with this AUP and the school e-safety policy. • I will not access, copy, remove or otherwise alter any other user’s files. If for any reason I need to access a student’s files, such as coursework, then I will speak to my manager, and then ask an IT technician to assist me. • When I use my devices (desktops / laptops / tablets / Smartphone / USB devices etc.) in school, or at home, to access the schools cloud/remote computing platform, I will follow the rules set out in this agreement, in the same way as if I was using school equipment. I will ensure that any such devices are protected by up-to-date software, firmware, anti-virus software, operating system, and free from viruses. I will also follow any additional rules set by the school about such use, including encryption. I will log out of the schools’ cloud / remote user computing platform when I have finished using it, to prevent un-authorised access. • I will not use my personal Apple account on school owned Apple devices.

Related to Using Technology

  • Joint Technology The Parties agree that, in order to effectuate the provisions of Section 4.4.2, subject to any exclusive licenses granted hereunder, (a) the non-use provisions of this Article 9 shall not apply to each Party’s use of Joint Technology, and (b) each Party may disclose the Joint Technology to Third Parties who are under terms of confidentiality no less strict than those contained in this Agreement.

  • Patent Rights The State and the U. S. Department of Transportation shall have the royalty free, nonexclusive and irrevocable right to use and to authorize others to use any patents developed by the Engineer under this contract.

  • New Technology When new or updated technology is introduced into a workplace, it will be the responsibility of the employer to provide appropriate and, if necessary, ongoing training to the employees directly affected. Such training will include any health and safety implications or information that will enable employees to operate the equipment without discomfort and will help maintain their general well-being.

  • Background Technology List here prior contracts to assign Inventions that are now in existence between any other person or entity and you.

  • Licensed Technology (a) LICENSOR is not aware of any interference, infringement, misappropriation, or other conflict with any intellectual property rights of third parties, and LICENSOR has never received any charge, complaint, claim, demand, or notice alleging any such interference, infringement, misappropriation, or violation (including any claim that LICENSOR must license or refrain from using any intellectual property rights of any third party). To the knowledge of LICENSOR, no third party has interfered with, infringed upon, misappropriated, or otherwise come into conflict with any of the LICENSED TECHNOLOGY. (b) Exhibit A identifies each patent or registration which has been issued to LICENSOR with respect to any of the LICENSED TECHNOLOGY and identifies each pending patent application or application for registration which LICENSOR has made with respect to any of the LICENSED TECHNOLOGY. LICENSEE acknowledges that LICENSOR has previously made available to LICENSEE correct and complete copies of all such patents, registrations and applications (as amended to-date) in LICENSOR’s possession and has made available to LICENSEE correct and complete copies of all other written documentation in LICENSOR’s possession evidencing ownership and prosecution (if applicable) of each such item. (c) Exhibit A identifies each item of LICENSED TECHNOLOGY that is assigned to LICENSOR or that LICENSOR uses pursuant to license, sublicense, agreement, or permission. LICENSOR has made available to LICENSEE correct and complete copies of all such licenses, sublicenses, agreements, patent prosecution files and permissions (as amended to-date) in LICENSOR’s possession. With respect to each item of LICENSED TECHNOLOGY required to be identified in Exhibit A and to the knowledge of LICENSOR: (i) the license, sublicense, agreement, or permission covering the item is legal, valid, binding, enforceable, and in full force and effect; (ii) the license, sublicense, agreement, or permission will continue to be legal, valid, binding, enforceable, and in full force and effect on identical terms following the consummation of the transactions contemplated hereby; (iii) no Party to the license, sublicense, agreement, or permission is in breach or default, and no event has occurred which with notice or lapse of time would constitute a breach or default or permit termination, modification, or acceleration thereunder; (iv) no party to the license, sublicense, agreement, or permission has repudiated any provision thereof; (v) the underlying item of LICENSED TECHNOLOGY is not subject to any outstanding lien or encumbrance, injunction, judgment, order, decree, ruling, or charge; (vi) no action, suit, proceeding, hearing, investigation, charge, complaint, claim, or demand is pending or is threatened which challenges the legality, validity, or enforceability of the underlying item of LICENSED TECHNOLOGY; and (vii) except as provided in Exhibit A, LICENSOR has not granted any license or similar right to the LICENSED TECHNOLOGY within the GENERAL FIELD or PARTHENOGENESIS FIELD.

  • Technology Discoveries, innovations, Know-How and inventions, whether patentable or not, including computer software, recognized under U.S. law as intellectual creations to which rights of ownership accrue, including, but not limited to, patents, trade secrets, maskworks and copyrights developed under this Agreement.

  • INTELLECTUAL PROPERTY RIGHTS - INVENTION AND PATENT RIGHTS A. General 1. NASA has determined that 51 U.S.C. § 20135(b) does not apply to this Agreement. Therefore, title to inventions made (conceived or first actually reduced to practice) under this Agreement remain with the respective inventing party(ies). No invention or patent rights are exchanged or granted under this Agreement, except as provided herein.

  • Use of Technology Participants are subject to all existing laws (federal and state) and University regulations and policies on use of technology, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct such as: • UC Electronic Communications Policy: xxxx://xxx.xxxx.xxx/ucophome/policies/ec/ • UCLA E-mail Policy and Guidelines: xxxx://xxx.xxxxxxxxxxxxx.xxxx.xxx/app/Default.aspx?&id=455 • IT Services Acceptable Use Policy: xxxx://xxx.xxx.xxxx.xxx/policies/aupdetail.html • The UC Policy on Copyright Ownership: xxxx://xxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx.xxx/resources/copyright-ownership.html • Bruin OnLine Service Level Agreement: xxxx://xxx.xxx.xxxx.xxx/policies/BOL_SLA.pdf Any violation may result in technology related privileges being restricted or revoked and may also result in The University undertaking disciplinary action. If the violation constitutes a criminal offense, appropriate legal action may be taken.

  • Third Party Technology The Company makes use of third party technology to collect information required for traffic measurement, research, and analytics. Use of third party technology entails data collection. We therefore would like to inform clients the Company enables third parties to place or read cookies located on the browsers of users entering the Company’s domain. Said third parties may also use web beacons to collect information through advertising located on the Company’s web site. Please note that you may change your browser settings to refuse or disable Local Shared Objects and similar technologies; however, by doing so you may be disabling some of the functionality of Company’s services.

  • Licensed Patent Rights The term “Licensed Patent Rights” shall mean rights arising out of or resulting from:

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!