Webcams and Surveillance Cameras Sample Clauses

Webcams and Surveillance Cameras. The school uses surveillance cameras for security and safety. The only people with access to this are; • Mr X Xxxxxx (Headteacher) • Mr X Xxxxxxx, (Network Manager) • Mr X Xxxxx, Mr X Xxxxxxx (Deputy Headteachers) • Mr X Xxxxx (Assistant Headteacher) • Mrs X Xxxxxx-Tinworth (School Business Manager) • Mrs X Xxxxxxxxx (Senior Leadership team) • Mrs X Xxxxxxx (Senior Leadership team) • Mr X X’Xxxxxxxxx (Senior Leadership team) • Mrs X Xxxxxx (PALC) • Miss X Xxxxxxx (PALC) • Mr X Xxxxxxx (PALC) • Mr X Xxxxxx (PALC) • Mrs X Xxxxx (PALC) Notification of camera use is displayed at the front of the school. Please refer to the hyperlink below for further guidance xxxxx://xxx.xxx.xx/media/for- organisations/documents/1542/cctv-code-of-practice.pdf • We do not use publicly accessible webcams in school • Webcams will not be used for broadcast on the internet without prior parental consent • Misuse of the webcam by any member of the school community will result in sanctions (as listed under the ‘ inappropriate materials’ section of this document) • Webcams include any camera on an electronic device which is capable of producing video. School policy should be followed regarding the use of such personal devices For further information relating to webcams and surveillance cameras, please see xxxx://xxx.xxxxxxx.xxx.xx/schoolweb/safety/webcams.shtml
AutoNDA by SimpleDocs

Related to Webcams and Surveillance Cameras

  • Configuration Management The Contractor shall maintain a configuration management program, which shall provide for the administrative and functional systems necessary for configuration identification, control, status accounting and reporting, to ensure configuration identity with the UCEU and associated cables produced by the Contractor. The Contractor shall maintain a Contractor approved Configuration Management Plan that complies with ANSI/EIA-649 2011. Notwithstanding ANSI/EIA-649 2011, the Contractor’s configuration management program shall comply with the VLS Configuration Management Plans, TL130-AD-PLN-010-VLS, and shall comply with the following:

  • Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If ECI chooses to subtend a Verizon access Tandem, ECI’s NPA/NXX must be assigned by ECI to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 ECI shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from ECI’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office ECI utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow ECI’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • Interface A defined set of transmission facilities that separate Load Zones and that separate the NYCA from adjacent Control Areas. Investor-Owned Transmission Owners. A Transmission Owner that is owned by private investors. At the present time these include: Central Xxxxxx Gas & Electric Corporation, Consolidated Edison Company of New York, Inc., New York State Electric & Gas Corporation, Niagara Mohawk Power Corporation, Orange and Rockland Utilities, Inc., and Rochester Gas and Electric Corporation.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Network Interconnection Architecture Each Party will plan, design, construct and maintain the facilities within their respective systems as are necessary and proper for the provision of traffic covered by this Agreement. These facilities include but are not limited to, a sufficient number of trunks to the point of interconnection with the tandem company, and sufficient interoffice and interexchange facilities and trunks between its own central offices to adequately handle traffic between all central offices within the service areas at a P.01 grade of service or better. The provisioning and engineering of such services and facilities will comply with generally accepted industry methods and practices, and will observe the rules and regulations of the lawfully established tariffs applicable to the services provided.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Programming Phase Schematic Design Phase: 2.2.1.3. Design Development Phase:

  • Office and Support Staff During the Employment Period, the Executive shall be entitled to an office or offices of a size and with furnishings and other appointments, and to exclusive personal secretarial and other assistance, at least equal to the most favorable of the foregoing provided to the Executive by the Company and its affiliated companies at any time during the 120-day period immediately preceding the Effective Date or, if more favorable to the Executive, as provided generally at any time thereafter with respect to other peer executives of the Company and its affiliated companies.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!