COMPUTER USE AND CONDUCT POLICY AGREEMENT Sample Clauses

COMPUTER USE AND CONDUCT POLICY AGREEMENT. The primary goal of RSSD’s available technology is to enrich the learning that takes place in and out of classrooms. In particular, technology offers opportunities for exploration and analysis of academic subjects in ways that traditional instruction cannot replicate. However, certain legal and ethical restrictions apply. Also, the limited supply of both hardware and software requires us to set priorities for use. Academic work for courses always takes priority over any other use of the computer equipment. The IMC equipment is reserved exclusively for academic use. The following is a list of rules and guidelines, which govern the use of RSSD devices and network resources. Network resources refers to all aspects of RSSD’s owned and leased equipment, including computers, printers, scanners, and other peripherals, as well as email, Internet services, servers, network files and folders, and all other technology-related equipment and services. These rules apply to any use of RSSD’s network resources whether this access occurs while on or off campus.
AutoNDA by SimpleDocs
COMPUTER USE AND CONDUCT POLICY AGREEMENT. The primary goal of LCSD’s available technology is to enrich the learning that takes place in and out of classrooms. In particular, technology offers opportunities for exploration and analysis of academic subjects in ways that traditional instruction cannot replicate. However, certain legal and ethical restrictions apply. Also, the limited supply of both hardware and software requires us to set priorities for use. Academic work for courses always takes priority over any other use of the computer equipment. Library and Media Lab equipment are reserved exclusively for academic use. The following is a list of rules and guidelines which govern the use of LCSD computers and network resources. Network Resources refers to all aspects of LCSD’s owned or leased equipment, including computers, printers, scanners and other peripherals, as well as email, Internet services, servers, network files and folders, and all other technology-related equipment and services. These rules apply to any use of LCSD’s network resources whether this access occurs while on or off campus.
COMPUTER USE AND CONDUCT POLICY AGREEMENT. The primary goal of CDCSD’s available technology is to enrich the learning that takes place in and out of classrooms. In particular, technology offers opportunities for exploration and analysis of academic subjects in ways that traditional instruction cannot replicate. However, certain legal and ethical restrictions apply. Also, the limited supply of both hardware and software requires us to set priorities for use. Academic work for courses always takes priority over any other use of the computer equipment. Library and Media Lab equipment are reserved exclusively for academic use. The following is a list of rules and guidelines which govern the use of CDCSD computers and network resources. Network Resources refers to all aspects of CDCSD’s owned or leased equipment, including computers, printers, scanners and other peripherals, as well as email, Internet services, servers, network files and folders, and all other technology-related equipment and services. These rules apply to any use of CDCSD’s network resources whether this access occurs while on or off campus.

Related to COMPUTER USE AND CONDUCT POLICY AGREEMENT

  • Changes to Privacy Policy Agreement Xxxxx Xxxxxxxx Designs reserves the right to update and/or change the terms of our privacy policy, and as such we will post those change to our website homepage at xxxxxxxxxxxxxxxxxxxx.xxx, so that our users and/or visitors are always aware of the type of information we collect, how it will be used, and under what circumstances, if any, we may disclose such information. If at any point in time Xxxxx Xxxxxxxx Designs decides to make use of any personally identifiable information on file, in a manner vastly different from that which was stated when this information was initially collected, the user or users shall be promptly notified by email. Users at that time shall have the option as to whether or not to permit the use of their information in this separate manner.

  • General Guidelines 1. Conduct yourself in a responsible manner at all times in the laboratory.

  • Violence Policies and Procedures The Employer agrees to have in place explicit policies and procedures to deal with violence. The policy will address the prevention of violence, the management of violent situations, provision of legal counsel and support to employees who have faced violence. The policies and procedures shall be part of the employee's health and safety policy and written copies shall be provided to each employee. Prior to implementing any changes to these policies, the employer agrees to consult with the Association.

  • Procurement and Consultant Guidelines All goods, works and services required for the Project and to be financed out of the proceeds of the Grant shall be procured in accordance with the requirements set forth or referred to in:

  • Summary of Policy and Prohibitions on Procurement Lobbying Pursuant to State Finance Law §139-j and §139-k, this Contract includes and imposes certain restrictions on communications between OGS and a Vendor during the procurement process. A Vendor is restricted from making contacts from the earliest notice of intent to solicit offers/bids through final award and approval of the Procurement Contract by OGS and, if applicable, the Office of the State Comptroller (“restricted period”) to other than designated staff unless it is a contact that is included among certain statutory exceptions set forth in State Finance Law §139-j(3)(a). Designated staff, as of the date hereof, is identified in Appendix G, Contractor and OGS Information, or as otherwise indicated by OGS. OGS employees are also required to obtain certain information when contacted during the restricted period and make a determination of the responsibility of the Vendor pursuant to these two statutes. Certain findings of non-responsibility can result in rejection for contract award and in the event of two findings within a four-year period; the Vendor is debarred from obtaining governmental Procurement Contracts. Further information about these requirements can be found on the OGS website: xxxx://xxx.xxx.xx.xxx/aboutOgs/regulations/defaultSFL_139j-k.asp.

  • RECIPROCITY AND SANCTIONS PROVISIONS Bidders are hereby notified that if their principal place of business is located in a country, nation, province, state or political subdivision that penalizes New York State vendors, and if the goods or services they offer will be substantially produced or performed outside New York State, the Omnibus Procurement Xxx 0000 and 2000 amendments (Chapter 684 and Chapter 383, respectively) require that they be denied contracts which they would otherwise obtain. NOTE: As of May 15, 2002, the list of discriminatory jurisdictions subject to this provision includes the states of South Carolina, Alaska, West Virginia, Wyoming, Louisiana and Hawaii. Contact NYS Department of Economic Development for a current list of jurisdictions subject to this provision.

  • Pet Policy 🞎 Pets are prohibited 🞎 Up to pets are permitted The following pet requirements apply [insert requirements including type, size and quantity,ifapplicable: ] The above-described pet policy is a material provision of this Lease. Violation of the pet policy may lead to damages, deposit, and/or fees or additional rent assessed to Tenant and constitutes a default under this Lease.

  • Insurance Terms and Conditions Company must maintain the following limits and coverages uninterrupted or amended through the term of this Agreement. In the event Company becomes in default of the following requirements, Authority reserves the right to take whatever actions it deems necessary to protect its interests. Required liability policies other than Workers’ Compensation / Employer’s Liability will provide that Authority, members of Authority’s governing body, and Authority’s officers, volunteers and employees are included as additional insureds.

  • CONFIDENTIALITY AND PRIVACY POLICIES AND LAWS The Contractor shall comply to the extent applicable with all State and Authorized User policies regarding compliance with various confidentiality and privacy laws, rules and regulations, including but not limited to the IRS Publication 1075, Family Educational Rights and Privacy Act (FERPA), the Health Insurance and Portability Act of 1996 (HIPAA) and the Health Information Technology for Economic and Clinical Health Act (HITECH). Contractor shall cooperate in executing a written confidentiality agreement under FERPA and/or a Business Associate Agreement (HIPAA/HITECH) or other contractual provisions upon request by the State or any Authorized User.

  • SPAM POLICY You are strictly prohibited from using the Website or any of the Company's Services for illegal spam activities, including gathering email addresses and personal information from others or sending any mass commercial emails.

Time is Money Join Law Insider Premium to draft better contracts faster.