Workspaces Sample Clauses

Workspaces. Each employee will be entitled to her own workspace, which may be shared depending on the nature of the employees work and the space available in NYLAG’s offices. Nothing herein precludes NYLAG from moving to “hot desking” or “non-reservation-based hoteling” for certain workspaces, should circumstances warrant.
AutoNDA by SimpleDocs
Workspaces. Memberships include the hours stated for each level. When booking a whole day, this is counted as 7.5hours, however the desk is yours for the day.
Workspaces. − There is a dedicated volunteer room for you to use that has desks, a computer, phone, etc. Please ask the VC for logins and passwords to any protected accounts or websites that you need to use. − Please do not use staff offices. The staff often have confidential material on their desks or computers, so for privacy and compliance with our confidentiality policies, do not use their desks or offices. − There is a computer and desk set up in the upper offices that is available if you are working on anything confidential. Please check with the VC to make sure no one else is using it, as it is a shared workspace. − The volunteer room is stocked with supplies. If there are supplies you need that are not in the room, please replenish from the supply closet upstairs. Let the VC know if you can’t find what you need.
Workspaces. A. Specialist/ESA/Itinerant. The physical working space of any specialist/ESA/itinerant staff person in a school building will be of the appropriate size to provide quality in-person instruction and services to the students they are assigned to. Any assigned room will be in accordance with the agreements stipulated in the CBA.
Workspaces jsp – this page lists the workspaces that users have created within the Dicode workbench.
Workspaces. Clicking on the “workspaces” option from the menu box, users obtain the list of the workspaces available in the system. This list is presented as in Figure 4.20.
Workspaces 
AutoNDA by SimpleDocs

Related to Workspaces

  • Workspace Whenever an academic or student union building is planned for construction or renovation, there shall be consideration of the needs for office space of graduate student employees in relevant departments. The University shall provide to all graduate student employees an on-campus mailbox. With approval of their department chair, graduate student employees shall be given key access into the buildings in which their offices or labs are housed for the purpose of performing assistantship work in said office or lab which is permitted by the department chair to be done outside of regular business hours. Department chairs may deny key access into buildings and/or offices/labs in order to minimize access to confidential materials or to minimize the risk of theft, fire/explosion hazards, personal harm, and other security/safety issues. Denial shall not be arbitrary or capricious. If key access is denied, the reason will be provided to the graduate student employee(s) involved. All departmental policies related to the issuance of keys to TOs shall apply equally to TOs in the Division of Continuing Education. Graduate student employees shall have reasonable access to photocopiers for copying related to their employment within departmental guidelines for usage. The parties agree to the creation of a joint committee, composed of equal numbers of representatives of the Union and the University, that will attempt to develop a plan to provide appropriate telephone access for bargaining unit members in connection with their employment responsibilities. The University will provide to this committee a report on the offices assigned to bargaining unit members during the 2005-2006 academic year and the proximity of those offices to a University telephone available for use by the respective bargaining unit member.

  • Servers Marco backs up the following servers only: Windows Servers, SQL servers, Exchange server, and Virtual Machines images running VMWare or Hyper V.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store County PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Security Office.

  • Internet Use 7.1. Customer is prohibited from posting or transmitting unlawful material on or via the Internet or the World Wide Web.

  • Internet Access Data and information may be made electronically accessible to the Company through Internet access to one or more links provided by the Administrator or a sub-administrator (“Web Link”). All rights in Web Link (including text and “look and feel” attributes) are owned by the sub-administrator. Any commercial use of the content or any other aspect of Web Link requires the written permission of the sub-administrator. Use of the Web Link by the Company will be subject to any terms of use set forth on the web site. Web Link and the information (including text, graphics and functionality) in the Web Link is presented “As Is” and “As Available” without express or implied warranties including, but not limited to, implied warranties of non-infringement, merchantability and fitness for a particular purpose. The sub-administrator neither warrants that the Web Link will be uninterrupted or error free, nor guarantees the accessibility, reliability, performance, timeliness, sequence, or completeness of information provided on the Web Link.

Time is Money Join Law Insider Premium to draft better contracts faster.