– VIDEO CAMERAS, AUDIO RECORDINGS, AND GPS UNITS Sample Clauses

– VIDEO CAMERAS, AUDIO RECORDINGS, AND GPS UNITS. This section does not pertain to criminal or professional misconduct investigations. The District and the Union agree the purpose of video cameras, audio recordings and GPS units is to provide the District a tool to maximize efficiency. Video, audio and GPS may be used like any other evidence in cases involving safety concerns or allegations of employee misconduct but shall not be used to monitor employee performance. Video evidence can be used to confirm or deny specific allegations that could result in employee discipline. Employees may view records of their travels upon request to their supervisor. Video, audio and GPS will be viewed only by supervisory employees or designee.
AutoNDA by SimpleDocs

Related to – VIDEO CAMERAS, AUDIO RECORDINGS, AND GPS UNITS

  • Video recording During the Construction Period, the Contractor shall provide to the Authority for every calendar quarter, a video recording, which will be compiled into a 3 (three)- hour compact disc or digital video disc, as the case may be, covering the status and progress of Works in that quarter. The video recording shall be provided to the Authority no later than 15 (fifteen) days after the close of each quarter after the Appointed Date.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • Personally Owned Professional Material The employer shall reimburse an employee to a maximum of $150 for loss, damage or personal insurance deductible to personally owned professional material brought to the employee’s workplace to assist in the execution of the employee’s duties, provided that:

  • Evaluation Software If the Software is an evaluation version or is provided to You for evaluation purposes, then, unless otherwise approved in writing by an authorized representative of Licensor, Your license to use the Software is limited solely for internal evaluation purposes in non-production use and in accordance with the terms of the evaluation offering under which You received the Software, and expires 90 days from installation (or such other period as may be indicated within the Software). Upon expiration of the evaluation period, You must discontinue use of the Software, return to an original state any actions performed by the Software, and delete the Software entirely from Your system and You may not download the Software again unless approved in writing by an authorized representative of Licensor. The Software may contain an automatic disabling mechanism that prevents its use after a certain period of time. RESTRICTIONS

  • Workstation/Laptop encryption All workstations and laptops that process and/or store County PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Security Office.

  • ACCESS TO SECURITY LOGS AND REPORTS Upon request, the Contractor shall provide access to security logs and reports to the State or Authorized User in a format as specified in the Authorized User Agreement.

Time is Money Join Law Insider Premium to draft better contracts faster.