COMPUTER USE AND SECURITY STATEMENT Sample Clauses

COMPUTER USE AND SECURITY STATEMENT. University equipment including computer hardware and software are valuable assets, and should be used for official University business only. Every effort is made to secure the privacy of each authorized user although messages or files stored or transmitted on the computer or system network should not be considered private or secure. Under the Georgia Open Records Act, it is possible that information, which is stored on a computer system, including electronic mail, would be available for inspection. Further, the University reserves the right to have access to any information stored or transmitted on a University owned computer or network. Under no circumstance may software be copied or installed on any Xxxxxxx State University computer if such copying or installation would violate any copyright or licensing agreement. All system users are expected to follow the guidelines expressed. Any employee in violation may be subject to disciplinary action, up to and including termination, as well as possible legal action.
AutoNDA by SimpleDocs

Related to COMPUTER USE AND SECURITY STATEMENT

  • PERSONAL INFORMATION PRIVACY AND SECURITY CONTRACT 11 Any reference to statutory, regulatory, or contractual language herein shall be to such language as in 12 effect or as amended.

  • Information Integrity and Security Contractor shall immediately notify County of any known or suspected breach of personal, sensitive and confidential information related to Contractor’s work under this Agreement.

  • ACCESS TO SECURITY LOGS AND REPORTS Upon request, the Contractor shall provide access to security logs and reports to the State or Authorized User in a format as specified in the Authorized User Agreement.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • DATA HANDLING AND SECURITY It will always be the responsibility of the selected Contractor to manage data transfer and to secure all data appropriately during the project to prevent unauthorized access to all data, products, and deliverables.

  • Data and Security If Contractor is granted access to Court Data, Confidential Information or Court Work Locations in the performance of the Work;

  • Operator’s Security Contact Information Xxxxxxx X. Xxxxxxx Named Security Contact xxxxxxxx@xxxxxxxxx.xxx Email of Security Contact (000) 000-0000 Phone Number of Security Contact

  • Background Screening and Security 14 These General Contract Conditions supersede and replace in their entirety all General Contract Conditions, Form PUR 1000, which is incorporated by reference in Rule 60A-1.002, Florida Administrative Code (F.A.C.)

  • Privacy and Security (a) The Service Provider shall not transmit or store any AHS data outside the borders of Canada, nor transmit any AHS data in Canada to any party not specifically contemplated in this Agreement, without AHS’s prior written consent to each such data transmittal, which consent may be arbitrarily and unreasonably withheld.

  • Collection and Use of Your Information You acknowledge that when you download, install, or use the Application, Company may use automatic means (including, for example, cookies and web beacons) to collect information about your Mobile Device and about your use of the Application. You also may be required to provide certain information about yourself as a condition to downloading, installing, or using the Application or certain of its features or functionality, and the Application may provide you with opportunities to share information about yourself with others. All information we collect through or in connection with this Application is subject to our Privacy Policy. By downloading, installing, using, and providing information to or through this Application, you consent to all actions taken by us with respect to your information in compliance with the Privacy Policy.

Time is Money Join Law Insider Premium to draft better contracts faster.