Computer Security Sample Clauses

Computer Security. During the Employee’s employment with the Company, the Employee agrees only to use Company’s and its Affiliate’s computer resources (both on and off the Company’s premises) for which the Employee has been authorized and granted access. The Employee agrees to comply with the Company’s policies and procedures concerning computer security.
AutoNDA by SimpleDocs
Computer Security. I will store all protected information on secured systems, encrypted mobile devices, or other secure media. • I will not change my UW computer configuration unless specifically approved to do so. • I will not disable or alter the anti-virus and/or firewall software on my UW computer. • I will log out or lock computer sessions prior to leaving a computer. • I will use only licensed and authorized software; o I will not download, install or run unlicensed or unauthorized software. • I will use administrative permissions only when I am approved to do so and when required by job function; o If I perform system administrator function(s) I must use designated administrative accounts only for system administrative activities and use non-administrative user accounts for all other purposes. • If I use a personally-owned computing device for UW Medicine business operations, I will not connect it to a UW Medicine network unless it meets the same security requirements as a UW Medicine-owned device. My responsibilities involving protected information continue even after my separation from UW Medicine and I understand that it is unlawful for former workforce members to use or disclose protected information for any unauthorized purpose. Failure to comply with this agreement may result in disciplinary action up to and including termination of my status as a workforce member. Additionally, there may be criminal or civil penalties for inappropriate uses or disclosures of certain protected information. By signing this Agreement, I understand and agree to abide by the conditions imposed above. Print Name: Department: School of Medicine Job Title: Visiting Medical Student Signature: Date: Copy provided on by Xxxxx Xxxxx Date Name supervisor, manager or designee Signature Provide copy of this Agreement to the workforce member. File original Agreement in departmental personnel or academic file. (All signed Agreements must be maintained for 6 years) Policies and Standards References:
Computer Security. The Employee agrees to comply with the Employer’s policies and procedures concerning computer security.
Computer Security. It is the policy of Cognos to adhere strictly to the licensing conditions of any software that it uses. You are required to comply with this policy. You will not copy or distribute for your own use or for the use of any other person or company any software used or developed by Cognos without (a) obtaining the authorization of your supervisor and (b) taking all reasonable precautions to ensure that your use of the software neither corrupts nor destroys any existing software or data.
Computer Security. Executive agrees that, during his employment with the Company, he will use computer resources (both on and off of the Company's premises) for which Executive has been granted access and then only to the extent authorized. Executive agrees to comply with the Company's policies and procedures concerning computer security. Executive further acknowledges that Executive will not alter, remove or destroy any Company Confidential Information or Third Party Information stored on any electronic storage devices, including, but not limited to, electronic media stored on servers, local hard drives, lap-tops, "PDAs" or any other similar devices except in accordance with the Company's record retention and destruction policy.
Computer Security. During the Executive’s employment with the Company, the Executive agrees only to use Company’s and its Affiliate’s computer resources (both on and off the Company’s premises) for which the Executive has been authorized and granted access. The Executive agrees to comply with the Company’s policies and procedures concerning computer security.
Computer Security. During my employment with Company, I agree to use only those Company computer resources (both on and off Company’s premises) for which I have been granted access and then only to the extent authorized. I agree to comply with Company’s policies and procedures concerning computer security.
AutoNDA by SimpleDocs
Computer Security. Contractor shall maintain computers that access Data by ensuring the operating system and software are updated and patched monthly, such that they remain secure from known vulnerabilities. Contractor computer device(s) must also be installed with an Anti-Malware solution and signatures updated no less than monthly.
Computer Security a. Minimum order. When the NRC requires services covered by this functional area in an amount of less than $5,000, the Contractor is not obligated to furnish those services under the BPA.
Computer Security. Consultant acknowledges that he, she or an employee of Consultant may use the Board’s computer or telecommunication resources to fulfill the terms of this Agreement. Consultant agrees that he, she or any of Consultant’s employees who are required to use such resources will abide by the Board’s policies and guidelines governing the use of these resources and will comply with the provisions of Exhibit C, entitled "Use of Denver Water Board Computer and Telecommunications Resources,” incorporated by reference.
Time is Money Join Law Insider Premium to draft better contracts faster.