Access to Office Technology Sample Clauses

Access to Office Technology. In the course of responding to incident requests or as part of regular maintenance work on technology equipment, Helpdesk staff may be required to enter staff offices and access equipment or infrastructure. When such access is necessary, the following guidelines are to be followed:  When possible, advance notice to individuals or departments/areas will be given that an IT Helpdesk staff will be entering a space to perform a necessary job function related to technology support.  The expectation of advance notice should be directly correlated to the impact level and response time of an issue and may not be possible in the case of emergency or high level support needs.  IT Helpdesk staff are required to carry and provide identification upon request. Failure to provide valid identification should result in immediate notification to the IT main phone line for confirmation of work authorization and employment.  In the case of student workers employed by the IT department, no student worker should have access to an individual or area offices without being accompanied by a full- time IT Helpdesk staff member.  Independent contractors employed by the District to install or provide service to technology within individual offices should be accompanied by IT Helpdesk staff to gain initial access and should provide advance notice similar to or via IT Helpdesk staff.
AutoNDA by SimpleDocs
Access to Office Technology. In the course of responding to incident requests or as part of regular maintenance work on technology equipment, Helpdesk staff may be required to enter staff offices and access equipment or infrastructure. When such access is necessary, the following guidelines are to be followed:  When possible, advance notice to individuals or departments/areas will be given that an IT Helpdesk staff will be entering a space to perform a necessary job function related to technology support. Deleted: , Deleted: , Deleted: ,  The expectation of advance notice should be directly correlated to the impact level and response time of an issue and may not be possible in the case of emergency or high level support needs.  IT Helpdesk staff are required to carry and provide identification upon request. Failure to provide valid identification should result in immediate notification to the IT main phone line for confirmation of work authorization and employment.  In the case of student workers employed by the IT department, no student worker should have access to an individual or area offices without being accompanied by a full‐ time IT Helpdesk staff member.  Independent contractors employed by the District to install or provide service to technology within individual offices should be accompanied by IT Helpdesk staff to gain initial access and should provide advance notice similar to or via IT Helpdesk staff.

Related to Access to Office Technology

  • Technology Access A. Contractor expressly acknowledges that state funds may not be expended in connection with the purchase of an automated information system unless that system meets certain statutory requirements relating to accessibility by persons with visual impairments. Accordingly, Contractor represents and warrants to System Agency that the technology provided to System Agency for purchase (if applicable under this Contract or any related Solicitation) is capable, either by virtue of features included within the technology or because it is readily adaptable by use with other technology, of:

  • Access to Services 1. Subject to DHCS provider enrollment certification requirements, the Contractor shall maintain continuous availability and accessibility of covered services and facilities, service sites, and personnel to provide the covered services through use of DMC certified providers. Such services shall not be limited due to budgetary constraints.

  • FOREIGN ACCESS TO TECHNOLOGY This Article shall remain in effect during the term of the Agreement and for (INSERT NUMBER OF YEARS) ( ) years thereafter.

  • Access to Software Access Rights to Software which is Results shall comprise: Access to the Object Code; and, where normal use of such an Object Code requires an Application Programming Interface (hereafter API), Access to the Object Code and such an API; and, if a Party can show that the execution of its tasks under the Project or the Exploitation of its own Results is technically or legally impossible without Access to the Source Code, Access to the Source Code to the extent necessary. Background shall only be provided in Object Code unless otherwise agreed between the Parties concerned.

  • Access to PHI Business Associate shall provide access to PHI in a Designated Record Set to Covered Entity or as directed by Covered Entity to an Individual to meet the requirements under 45 CFR § 164.524. Business Associate shall provide such access in the time and manner reasonably designated by Covered Entity. Within three (3) business days, Business Associate shall forward to Covered Entity for handling any request for access to PHI that Business Associate directly receives from an Individual.

  • Access to NID 2.17.3.1 TWTC may access the customer’s premises wiring by any of the following means and TWTC shall not disturb the existing form of electrical protection and shall maintain the physical integrity of the NID:

  • Research, Science and Technology Cooperation 1. The aims of cooperation in research, science and technology, carried out in the mutual interest of the Parties and in compliance with their policies, will be: (a) to build on existing agreements already in place for cooperation on research, science and technology; (b) to encourage, where appropriate, government agencies, research institutions, universities, private companies and other research organizations in the Parties to conclude direct arrangements in support of cooperative activities, programs or projects within the framework of this Agreement, specially related to trade and commerce; and (c) to focus cooperative activities towards sectors where mutual and complementary interests exist, with special emphasis on information and communication technologies and software development to facilitate trade between the Parties. 2. The Parties will encourage and facilitate, as appropriate, the following activities including, but not limited to:

  • Access to Worksite 9.4.1 Authorized representatives of the Association shall have the right to transact official Association business on school property during regular school business hours provided that such activities or use do not interfere with classroom instruction or interrupt normal operations.

  • Access to System If Business Associate needs access to a Covered Entity Information Technology system to comply with its obligations under the Contract or this Agreement, Business Associate shall request, review, and comply with any and all policies applicable to Covered Entity regarding such system including, but not limited to, any policies promulgated by the Office of Information Technology and available at xxxx://xxx.xxxxx.xx.xx/about/policies.

  • Research Use The Requester agrees that if access is approved, (1) the PI named in the DAR and (2) those named in the “Senior/Key Person Profile” section of the DAR, including the Information Technology Director and any trainee, employee, or contractor1 working on the proposed research project under the direct oversight of these individuals, shall become Approved Users of the requested dataset(s). Research use will occur solely in connection with the approved research project described in the DAR, which includes a 1-2 paragraph description of the proposed research (i.e., a Research Use Statement). Investigators interested in using Cloud Computing for data storage and analysis must request permission to use Cloud Computing in the DAR and identify the Cloud Service Provider (CSP) or providers and/or Private Cloud System (PCS) that they propose to use. They must also submit a Cloud Computing Use Statement as part of the DAR that describes the type of service and how it will be used to carry out the proposed research as described in the Research Use Statement. If the Approved Users plan to collaborate with investigators outside the Requester, the investigators at each external site must submit an independent DAR using the same project title and Research Use Statement, and if using the cloud, Cloud Computing Use Statement. New uses of these data outside those described in the DAR will require submission of a new DAR; modifications to the research project will require submission of an amendment to this application (e.g., adding or deleting Requester Collaborators from the Requester, adding datasets to an approved project). Access to the requested dataset(s) is granted for a period of one (1) year, with the option to renew access or close-out a project at the end of that year. Submitting Investigator(s), or their collaborators, who provided the data or samples used to generate controlled-access datasets subject to the NIH GDS Policy and who have Institutional Review Board (IRB) approval and who meet any other study specific terms of access, are exempt from the limitation on the scope of the research use as defined in the DAR.

Time is Money Join Law Insider Premium to draft better contracts faster.