Downloading Programs & Personalizing the Computer Sample Clauses

Downloading Programs & Personalizing the Computer.  Only the Technology Director in the school can download programs to the student computers.  All students will be able to personalize their computer through the legal downloading of music from iTunes and other approved methods, although some specific sites such as "limewire" and other music sites will not be accessible to students. In addition, screen savers, wallpaper and other pictures may be placed on the computer. All items must be appropriate and not violate any school policies.  Students will not be allowed to stream videos or download audio files during the school day unless directed by a teacher to do so. Live streaming impacts the limited bandwidth that we have available.  Stickers and other markings on the outside of the computer will not be allowed. Each computer is easily identified by a specific numbering system ("Asset Tag") that is placed on the computer by the District.  District protective coverings may be purchased if students wish to place them on the computer.
AutoNDA by SimpleDocs
Downloading Programs & Personalizing the Computer. All students will be able to personalize their computer through the legal downloading of music from iTunes and other similar methods, although files xxxxxx sites will not be accessible to students. In addition, screen savers, wallpaper and other pictures may be placed on the computer. All items must be appropriate and not violate and school policies. • Students will not be allowed to stream videos or download audio files during the school day unless directed by a teacher to do so. Live streaming impacts the limited bandwidth that the District has available. • Stickers and other markings on the outside of the computer will not be allowed. Each computer is easily identified by a specific numbering system (“Asset tag” that is placed on the computer by the District. • Protective coverings or cases may be purchased if students wish to place them on the computer.

Related to Downloading Programs & Personalizing the Computer

  • Access to Personal Information by Subcontractors Supplier agrees to require any subcontractors or agents to which it discloses Personal Information under this Agreement or under any SOW to provide reasonable assurance, evidenced by written contract, that they will comply with the same or substantially similar confidentiality, privacy and security obligations with respect to such Personal Information as apply to Supplier under this Agreement or any SOW. Supplier shall confirm in writing to DXC that such contract is in place as a condition to DXC’s approval of use of a subcontractor in connection with any SOW. Upon request of DXC, Supplier will provide to DXC a copy of the subcontract or an extract of the relevant clauses. Supplier shall ensure that any failure on the part of any subcontractor or agent to comply with the Supplier obligations under this Agreement or any SOW shall be grounds to promptly terminate such subcontractor or agent. If during the term of this Agreement or any SOW, DXC determines, in its exclusive discretion, that any Supplier subcontractor or agent cannot comply with the Supplier obligations under this Agreement or with any SOW, then DXC may terminate this Agreement in whole or in part (with respect to any SOW for which such subcontractor or agent is providing services), if not cured by Supplier within the time prescribed in the notice of such deficiency.

  • Access to Personal File Upon written request from an employee, he or she and/or his or her Union representative shall have access to his or her official personal file in the presence of an authorized representative of the Corporation. The file should be made available within twenty-four (24) hours following the day of the written request, providing such file is available locally and, in all cases, within five (5) calendar days after the request. Where an employee's file is available for review and/or examination, reports as described in paragraph 10.02(c) are to be removed prior to such review and/or examination.

  • Access to Software Access Rights to Software which is Results shall comprise: Access to the Object Code; and, where normal use of such an Object Code requires an Application Programming Interface (hereafter API), Access to the Object Code and such an API; and, if a Party can show that the execution of its tasks under the Project or the Exploitation of its own Results is technically or legally impossible without Access to the Source Code, Access to the Source Code to the extent necessary. Background shall only be provided in Object Code unless otherwise agreed between the Parties concerned.

  • HOW WE MAY USE YOUR PERSONAL INFORMATION 8.1 We will use the personal information You provide to Us to:

  • PROHIBITION ON CERTAIN TELECOMMUNICATIONS AND VIDEO SURVEILLANCE SERVICES OR EQUIPMENT To the extent applicable, Supplier certifies that during the term of this Contract it will comply with applicable requirements of 2 C.F.R. § 200.216.

  • Processing Personal Data 40.1. The Company is the data controller in the relevant jurisdiction. You hereby acknowledge and agree to the collection and processing of personal data provided by you in connection with the opening of a trading account for the purpose of performing our obligations under these Terms and Conditions and for administering the relationship between you and us.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Access to Personnel File Each employee shall have reasonable access to his/her personnel file for the purpose of reviewing any evaluations or formal disciplinary notations contained therein, in the presence of the Director of Personnel or designate. An employee has the right to request copies of any evaluations in this file.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • Access to Personnel Files All employees shall be allowed access to their personnel files during normal working hours for inspection and/or copies of documents which will be provided by the Employer. Such inspection shall be made subject to prior arrangement with the Employer.

Time is Money Join Law Insider Premium to draft better contracts faster.