Webcams and Surveillance Cameras Sample Clauses

Webcams and Surveillance Cameras. The school uses surveillance cameras for security and safety. The only people with access to this are; • Mr X Xxxxxx (Headteacher) • Mr X Xxxxxxx, (Network Manager) • Mr X Xxxxx, Mr X Xxxxxxx (Deputy Headteachers) • Mr X Xxxxx (Assistant Headteacher) • Mrs X Xxxxxx-Tinworth (School Business Manager) • Mrs X Xxxxxxxxx (Senior Leadership team) • Mrs X Xxxxxxx (Senior Leadership team) • Mr X X’Xxxxxxxxx (Senior Leadership team) • Mrs X Xxxxxx (PALC) • Miss X Xxxxxxx (PALC) • Mr X Xxxxxxx (PALC) • Mr X Xxxxxx (PALC) • Mrs X Xxxxx (PALC) Notification of camera use is displayed at the front of the school. Please refer to the hyperlink below for further guidance xxxxx://xxx.xxx.xx/media/for- organisations/documents/1542/cctv-code-of-practice.pdf • We do not use publicly accessible webcams in school • Webcams will not be used for broadcast on the internet without prior parental consent • Misuse of the webcam by any member of the school community will result in sanctions (as listed under the ‘ inappropriate materials’ section of this document) • Webcams include any camera on an electronic device which is capable of producing video. School policy should be followed regarding the use of such personal devices For further information relating to webcams and surveillance cameras, please see xxxx://xxx.xxxxxxx.xxx.xx/schoolweb/safety/webcams.shtml
AutoNDA by SimpleDocs

Related to Webcams and Surveillance Cameras

  • Configuration Management The Contractor shall maintain a configuration management program, which shall provide for the administrative and functional systems necessary for configuration identification, control, status accounting and reporting, to ensure configuration identity with the UCEU and associated cables produced by the Contractor. The Contractor shall maintain a Contractor approved Configuration Management Plan that complies with ANSI/EIA-649 2011. Notwithstanding ANSI/EIA-649 2011, the Contractor’s configuration management program shall comply with the VLS Configuration Management Plans, TL130-AD-PLN-010-VLS, and shall comply with the following:

  • Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • Interface A defined set of transmission facilities that separate Load Zones and that separate the NYCA from adjacent Control Areas. Investor-Owned Transmission Owners. A Transmission Owner that is owned by private investors. At the present time these include: Central Xxxxxx Gas & Electric Corporation, Consolidated Edison Company of New York, Inc., New York State Electric & Gas Corporation, Niagara Mohawk Power Corporation, Orange and Rockland Utilities, Inc., and Rochester Gas and Electric Corporation.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Internet Connectivity School must provide sufficient hardline internet connectivity and the required network configurations (provided in Exhibit A) for each Pixellot System to allow live broadcasts. PlayOn will provide the point-to-point wireless internet base station (“Point to Point”) when needed to deliver hardline internet connectivity to Pixellot Systems installed in outdoor venues; provided that PlayOn is able to select the make and model of the Point to Point system. In the event that School requests, or requires, a specific Point to Point system that is different from what is provided by PlayOn, then School must provide and install the Point to Point system at its own expense.

  • Network Interconnection Architecture Each Party will plan, design, construct and maintain the facilities within their respective systems as are necessary and proper for the provision of traffic covered by this Agreement. These facilities include but are not limited to, a sufficient number of trunks to the point of interconnection with the tandem company, and sufficient interoffice and interexchange facilities and trunks between its own central offices to adequately handle traffic between all central offices within the service areas at P.01 grade of service or better. The provisioning and engineering of such services and facilities will comply with generally accepted industry methods and practices, and will observe the rules and regulations of the lawfully established tariffs applicable to the services provided.

  • Network Connectivity Farmington Area Public Schools makes no guarantee that their network will be up and running 100% of the time. In the rare case that the network is down, the District will not be responsible for lost or missing data. Attribution 4*

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Programming Phase 2.2.1.2. Schematic Design Phase: 2.2.1.3. Design Development Phase:

Time is Money Join Law Insider Premium to draft better contracts faster.