Access to Internet Material Sample Clauses

Access to Internet Material. In accordance with the “Children’s Internet Protection Act” (CIPA), The Washington County Department of Education will use appropriate filtering measures to limit the exposure of the student to indecent or objectionable material on the internet while the device is connected to the school network. Furthermore, District staff will monitor student use of the device while on campus and provide guidance in the appropriate use of the device and the access to the global Internet. Parents/guardians understand that district Internet filters are not in place for the Chromebook when used at home, agree to monitor the student use of the device while off campus, and are encouraged to establish rules of usage with the student. ● Data Security/Intellectual Property/Academic Integrity: Students are responsible for the security of the data stored on his or her district assigned device. No passwords or login information should be shared with any classmate. The student recognizes that all content created on a district device and using a district Google account is not subject to intellectual property claims. The student further recognizes that all activity should follow the expectations for Academic Integrity. To accept a Washington County Department of Education Chromebook and accessories, I/WE acknowledge the following: STUDENT ● I have read and understand the information and terms outlined in the Washington County Department of Education 1:1 Chromebook Parent/Student Agreement Form and its referenced district policies. ● I will abide by the policies of the Washington County Department of Education as well as abide by all local, state, and federal laws. ● I understand that the Chromebook is the property of the Washington County Department of Education provided as part of my educational tool set. School personnel may request access to the device anytime, and I, the user, should assume no privacy. ● I understand that I am responsible for the care of this device. I will take the necessary precautions to keep the device in good condition. I will not attempt to repair the Chromebook or take it somewhere else to be repaired. I will report any problems that I encounter and submit it to the Technology Department for review and repair. ● I accept responsibility, up to and including, the cost of replacing the equipment if the device is lost or intentionally damaged. ● I will not let anyone other than myself use the device and will not share my username and/or passwords with anyone. ●...
AutoNDA by SimpleDocs
Access to Internet Material. In accordance with the “Children’s Internet Protection Act” (CIPA), Passaic County Technical Institute will use appropriate filtering measures to limit the exposure of students to indecent or objectionable material on the Internet while the device is connected to the school network. Furthermore, District staff will monitor student use of the device while on campus and provide guidance in the appropriate use of the device and the access to the global Internet. Parents/guardians agree to monitor the student use of the device while off campus and are encouraged to establish rules of usage with the student.
Access to Internet Material. In accordance with the “Children’s Internet Protection Act” (CIPA), the North Hunterdon­Voorhees Regional High School District will use appropriate filtering measures to limit the exposure of students to indecent or objectionable material on the Internet while the student’s personal device is connected to the school network. The North Hunterdon­Voorhees District might not filter the student’s personal device while connected to other networks.
Access to Internet Material. In accordance with the “Children’s Internet Protection Act” (CIPA), Hillsdale Public Schools will use appropriate filtering measures to limit the exposure of students to indecent or objectionable material on the Internet while the device is connected to the school network. Furthermore, district staff will monitor student use of the device while in school and provide guidance in the appropriate use of the device and the access to the global Internet. Parents/guardians understand that district Internet filters are in place for the Chromebook when used at home, agree to monitor the student use of the device while not in school, and are encouraged to establish rules of usage with the student. Data Security / Intellectual Property / Academic Integrity: Students are responsible for the security of the data stored on their district assigned device. Passwords or login information should never be shared. Students recognize that all content created on a district device while using a district Google account is not subject to intellectual property claims. Students further recognize that all activity shall follow the expectations for academic integrity as described in their student handbooks.
Access to Internet Material. In accordance with the "Children's Internet Protection Act" (CIPA), Closter Public Schools will use appropriate filtering measures to limit the exposure of students to indecent or objectionable material on the internet while the device is connected to the school network. Furthermore, district staff will monitor student use of the device while in school and provide guidance in the appropriate use of the device and the access to the global Internet. Parents/guardians understand that district internet filters are in place for the Chromebook when used at home, agree to monitor the student use of the device while not in school, and are encouraged to establish rules of usage with the student. Data Security/lntellectual Property/Academic Integrity: Students are responsible for the security of the data stored on their district assigned device. Passwords or login information should never be shared. Students recognize that all content created on a district device while using a district Google account is not subject to intellectual property claims. Students further recognize that all activity shall follow the expectations for academic integrity as described in their student handbooks. Grade: 5 6 7 8 (Circle One) CLOSTER PUBLIC SCHOOLS TMS CHROMEBOOK AGREEMENT PLEASE COMPLETE THIS SHEET PRIOR TO RECEIPT OF THE CHROMEBOOK.
Access to Internet Material. In accordance with the “Children’s Internet Protection Act” (CIPA), Passaic County Technical Institute will use appropriate filtering measures to limit the exposure of students to indecent or objectionable material on the Internet while the device is connected to the school network. Furthermore, District staff will monitor student use of the device while on campus and provide guidance in the appropriate use of the device and the access to the global Internet. Parents/guardians agree to monitor the student use of the device while off campus and are encouraged to establish rules of usage with the student. Data Security - Students are responsible for the security of the data stored on their district assigned device. Students are required to establish a lock-screen mechanism in their assigned device. In addition, students are encouraged to take additional measures to secure Passaic County Technical Institute data while such data remains in the student assigned device. Examples of data security practices that the student can take include regular backups, data encryption and password protection of personal information. Geolocation, Remote Wipe, Remote Lock, Remote Ring - The District reserves the right to utilize the geolocation capabilities of the device to determine its geographical location on a map. The District reserves the right to remotely wipe any and all data stored in the device. The District reserves the right to lock the device remotely. The District reserves the right to make the device emit a continuous or beeping sound to the effect of localizing the device.
Access to Internet Material. Guardian(s) agree to monitor student’s use of the Device and are encouraged to establish rules of home use with the student. Geolocation, Remote Wipe, Remote Lock, Remote Ring The District reserves the right to utilize the geolocation capabilities of the Device to determine its geographical location on a map. The District reserves the right to remotely wipe any and all data stored in the Device. The District reserves the right to lock the Device remotely. The District reserves the right to make the Device emit a sound for the purpose of localizing the Device.
AutoNDA by SimpleDocs

Related to Access to Internet Material

  • Access to Internet Grantee must have Internet access. Internet access may be either dial-up or high-speed. Grantee must maintain, at a minimum, one business e-mail address that will be the primary receiving point for all e-mail correspondence from Grantor. Grantee may list additional e-mail addresses at any time during the Term of this Agreement. The additional addresses may be for a specific department or division of Grantee or for specific employees of Grantee. Grantee must notify Grantor of any e-mail address changes within five (5) business days from the effective date of the change.

  • Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.

  • Access to Software Access Rights to Software which is Results shall comprise: Access to the Object Code; and, where normal use of such an Object Code requires an Application Programming Interface (hereafter API), Access to the Object Code and such an API; and, if a Party can show that the execution of its tasks under the Project or the Exploitation of its own Results is technically or legally impossible without Access to the Source Code, Access to the Source Code to the extent necessary. Background shall only be provided in Object Code unless otherwise agreed between the Parties concerned.

  • Access to Information Such Purchaser acknowledges that it has had the opportunity to review the Transaction Documents (including all exhibits and schedules thereto) and the SEC Reports and has been afforded, (i) the opportunity to ask such questions as it has deemed necessary of, and to receive answers from, representatives of the Company concerning the terms and conditions of the offering of the Securities and the merits and risks of investing in the Securities; (ii) access to information about the Company and its financial condition, results of operations, business, properties, management and prospects sufficient to enable it to evaluate its investment; and (iii) the opportunity to obtain such additional information that the Company possesses or can acquire without unreasonable effort or expense that is necessary to make an informed investment decision with respect to the investment. Such Purchaser acknowledges and agrees that neither the Placement Agent nor any Affiliate of the Placement Agent has provided such Purchaser with any information or advice with respect to the Securities nor is such information or advice necessary or desired. Neither the Placement Agent nor any Affiliate has made or makes any representation as to the Company or the quality of the Securities and the Placement Agent and any Affiliate may have acquired non-public information with respect to the Company which such Purchaser agrees need not be provided to it. In connection with the issuance of the Securities to such Purchaser, neither the Placement Agent nor any of its Affiliates has acted as a financial advisor or fiduciary to such Purchaser.

  • Access to Data Operator shall make Data in the possession of the Operator available to the LEA within five (5) business days of a request by the LEA.

  • Access to NID 2.17.3.1 TWTC may access the customer’s premises wiring by any of the following means and TWTC shall not disturb the existing form of electrical protection and shall maintain the physical integrity of the NID:

  • Access to PHI Business Associate shall provide access to PHI in a Designated Record Set to Covered Entity or as directed by Covered Entity to an Individual to meet the requirements under 45 CFR § 164.524. Business Associate shall provide such access in the time and manner reasonably designated by Covered Entity. Within three (3) business days, Business Associate shall forward to Covered Entity for handling any request for access to PHI that Business Associate directly receives from an Individual.

  • Access to Site 3.05.1 Contractor may enter and leave the premises at all reasonable times without charge. Contractor and its employees may use the common areas and roadways of the premises where it is to perform the services together with all facilities, equipment, improvements, and services provided in connection with the premises for common use. This excludes parking for Contractor’s personnel. Contractor shall repair any damage caused by it or its employees as a result of its use of the common areas.

  • Access to System If Business Associate needs access to a Covered Entity Information Technology system to comply with its obligations under the Contract or this Agreement, Business Associate shall request, review, and comply with any and all policies applicable to Covered Entity regarding such system including, but not limited to, any policies promulgated by the Office of Information Technology and available at xxxx://xxx.xxxxx.xx.xx/about/policies.

  • Use of information, data and software In the event that you receive any data, information or software via the Trading Platform other than that which you are entitled to receive pursuant to this Client Agreement, you will immediately notify us and will not use, in any way whatsoever, such data, information or software.

Time is Money Join Law Insider Premium to draft better contracts faster.