Systems Monitoring Sample Clauses

Systems Monitoring. The Town has the right to, and will, monitor employee electronic communications and usage. Employees must have no expectation of privacy in anything they create, store, send or receive on the Town' s computer systems. Your electronic communications can be monitored without prior notification if the Town deems this necessary in its sole discretion. All incoming and outgoing voice and email messages and attachments are subject to access, review and disclosure in the ordinary course of administering the systems, including communications that are password protected. Similarly, Internet web sites visited and files downloaded will be evident to those employees responsible for administering that system. Additionally, the Town uses automated monitoring tools ton continuously detect, block and/or quarantine files that may violate our policies or threaten the integrity of our systems. Employees responsible for administering the systems are required to report any abuses of the systems to the Town's managers. Indeed, certain illegal uses of the Town' s systems are required by law to be reported to law enforcement authorities. Violations of any part of the Electronic Communications Policy may result in disciplinary action, which, depending upon their severity or frequency may range from warning or suspension of privileges to possible discharge from employment.
AutoNDA by SimpleDocs
Systems Monitoring. During the life of this agreement, the parties may, through mutual agreement achieved in meetings of the Employee Relations Committee, alter or further refine the procedures outlined above, in 15.01 (g) and (h).
Systems Monitoring. In accordance with the federal Childhood Internet Protection Act <CIPA>, Internet access is filtered for all users. The use of technology resources may be monitored by district, school and network administrators and their authorized employees to protect the integrity of district technological resources as well as individual compliance with this policy. Administrators may examine and use data in disciplinary actions; evidence of crime will be provided to law enforcement officials.‌
Systems Monitoring. Ellucian will monitor the Cloud Environment on a 24x7x365 basis.
Systems Monitoring. In accordance with the federal Childhood Internet Protection Act (CIPA), Internet access at MLSD is filtered. The use of technology resources may be monitored by authorized employees to protect the integrity of district technological resources as well as individual compliance with this policy. Administrators may examine and use data in disciplinary actions; evidence of crime will be provided to law enforcement officials.
Systems Monitoring. Z.6.10.1
Systems Monitoring. FluidStack may monitor, collect, store and use information on the use and performance of the Cloud Infrastructure and the Platform to detect threats or errors to the Platform and/or FluidStack’s operations and for the purposes of the further development and improvement of FluidStack's services, provided that such activities at all times comply the Privacy Policy, the latest version is available at the FluidStack website.
AutoNDA by SimpleDocs
Systems Monitoring. The Town has the right to, and will, monitor any and all employee, and/or town hall personnel electronic communications and usage on Town of Ayer computer equipment. Employees and town personnel must have no expectation of privacy in anything they create, store, send or receive on the Town’s computer Systems. Your electronic communications can be monitored without prior notification if the Town deems this necessary, in its sole discretion. All incoming and outgoing voice and messages and attachments are subject to access, review and disclosure in the ordinary course of administering the Systems, including communications that are password protected. Similarly, Internet web sites visited, private email systems and online email accounts and files downloaded will be evident to those employees responsible for administering that system. Additionally, the Town uses automated monitoring tools to continuously detect, block and/or quarantine files that may violate our policies or threaten the integrity of our Systems. Employees responsible for administering the Systems are required to report any abuses of the Systems to the Town’s IT Director and/or Town Manager. Certain illegal and unethical uses of the Town’s Systems are subject by law to be reported to the proper local, state, and/or federal authorities. Violations of any part of the Electronic Communications Policy may result in disciplinary action, which, depending upon their severity or frequency may range from warning, suspension of privileges to possible discharge from employment with the Town of Ayer. All e-mail created or received by an employee of the Town of Ayer is a public record. All Town Employees and Special Town Employees (i.e. appointed and elected board/commission/committee members; volunteers; etc.) MUST use an official Town- issued E-mail (in the form @xxxx.xx.xx) for all Town-related business. Using your personal E- Mail to conduct Town business is strictly prohibited and may be subject to disciplinary action and/or personal systems at risk for subpoena or discovery. ALL electronic communications are Public Records.

Related to Systems Monitoring

  • System Monitoring to ensure safe and continuous operation, the Customer must monitor key services and resource use as recommended by Deswik, and provide Deswik with details of monitoring and any relevant alerts as needed. Services to be monitors include, without limitation, disk space, CPU usage, memory usage, database connectivity, and network utilization.

  • Service Monitoring Customer gives express consent for Vodafone to monitor Customer’s use of the Service (and disclose and otherwise use the information obtained) only to: (a) the extent allowed by Applicable Law; (b) comply with Applicable Law; (c) protect the Network from misuse; (d) protect the integrity of the public internet and/or Vodafone’s systems and Networks; (e) the extent necessary to determine if Customer has breached any conditions or restrictions on use of the Service; (f) provide the Service; and/or (g) take other actions agreed or requested by Customer.

  • Program Monitoring The Contractor will make all records and documents required under this Agreement as outlined here, in OEC Policies and NHECC Policies available to the SRO or its designee, the SR Fiscal Officer or their designee and the OEC. Scheduled monitoring visits will take place twice a year. The SRO and OEC reserve the right to make unannounced visits.

  • Call monitoring We may occasionally monitor and record calls made to or by us relating to customer services and telemarketing calls made by us, for the purpose of training and improving customer care services, including complaint handling. We and/or our suppliers may also record 999 and 112 calls.

  • Supply Chain Monitoring A copy of the supply chain monitoring process, which should include details of the process for monitoring the financial viability of the supply chain (including timing), together with any known risks to supply chain stability and material changes to the supply chain. This should include extracts from Board level meetings, risk registers etc where any of the above items have been discussed. Annex 1 1 Information from Contractors who are not required to submit form AR01 to Companies House

  • Infrastructure (a) The Borrower has and will maintain a sufficient infrastructure to conduct its business as presently conducted and as contemplated to be conducted following its execution of this Agreement.

  • Monitoring In each case in which the Foreign Custody Manager maintains Foreign Assets with an Eligible Foreign Custodian selected by the Foreign Custody Manager, the Foreign Custody Manager shall establish a system to monitor (i) the appropriateness of maintaining the Foreign Assets with such Eligible Foreign Custodian and (ii) the contract governing the custody arrangements established by the Foreign Custody Manager with the Eligible Foreign Custodian. In the event the Foreign Custody Manager determines that the custody arrangements with an Eligible Foreign Custodian it has selected are no longer appropriate, the Foreign Custody Manager shall notify the Board in accordance with Section 3.2.5 hereunder.

  • External monitoring The external monitoring and audit referred to in Articles 11.1, 11.2, 11.3 and 11.4 of the Regulation shall not in any way relieve the National Focal Point or the Programme Operator of their obligations under the legal framework regarding monitoring of the Programme and/or its projects, financial control and audit.

  • Systems The details of any systems work will be determined after a thorough business analysis. System's work will be billed on a time and material basis. Investors Bank provides an allowance of 10 systems hours for data extract set up and reporting extract set up. Additional hours will be billed on a time and material basis.

  • Contract Monitoring The criminal background checks required by this rule shall be national in scope, and must be conducted at least once every three (3) years. Contractor shall make the criminal background checks required by Paragraph IV.G.1 available for inspection and copying by DRS personnel upon request of DRS.

Time is Money Join Law Insider Premium to draft better contracts faster.