Laptops Sample Clauses

POPULAR SAMPLE Copied 3 times
Laptops. 8.1 Laptops holding any supplied or contractor generated Sensitive Information are to be encrypted using a Foundation Grade product or equivalent. For the avoidance of doubt, the use of BitLocker is acceptable provided that it is configured to the National Cyber Security Centre (NCSC) guidelines. 8.2 Unencrypted laptops not on a secure site are to be recalled and only used or stored in an appropriately secure location until further notice or until approved full encryption is installed. Where the encryption policy cannot be met, a Risk Balance Case that fully explains why the policy cannot be complied with and the mitigation plan, which should explain any limitations on the use of the system, is to be submitted to the SSRO for consideration. 8.3 Unencrypted laptops and drives containing personal data or Sensitive Information are not to be taken outside of secure sites. For the avoidance of doubt the term “drives” includes all removable, recordable media (e.g. memory sticks, compact flash, recordable optical media (e.g. CDs and DVDs), floppy discs and external hard drives. 8.4 Any token, touch memory device or password(s) associated with the encryption package is to be kept separate from the machine whenever the machine is not in use, left unattended or in transit. 8.5 Portable Communication and Information Systems (CIS) devices are not to be left unattended in any public location. They are not to be left unattended in any motor vehicles either in view or in the boot or luggage compartment at any time. When the vehicle is being driven the CIS is to be secured out of sight to deter opportunist theft.
Laptops. An employee can elect to sacrifice the purchase of a laptop as per the ATO rulings. Variations to this general policy may be negotiated by the CEO and will need to be reflected in the total remuneration package value.
Laptops. Laptops are a great convenience. They also come with many risks including ease of theft, operation in unsecured environments, and easily intercepted wireless communications. In order to protect our valuable information; laptop users must follow these rules of use: • Only Brunswick approved laptops may be used to access Brunswick information resources. • Laptops are subject to the same Brunswick controls as workstations, including patch requirements, malware protection, firewall rules, screen saver timeouts, etc. • Laptops must be full disk encrypted. • Laptops must be physically secured at all times. • The theft or loss of a laptop must be reported to ▇▇▇▇▇▇▇@▇▇▇▇▇▇▇▇▇▇▇.▇▇▇ immediately. • Protected and/or Confidential organizational data cannot be stored on laptops unless specifically authorized by the IT Director.
Laptops. Laptops are a great convenience. They also come with many risks including ease of theft, operation in unsecured environments, and easily intercepted wireless communications. In order to protect our valuable information; laptop users must follow these rules of use: • Only City approved laptops may be used to access City information resources. • Laptops are subject to the same City controls as workstations, including patch requirements, malware protection, firewall rules, screen saver timeouts, etc. • Laptops must be full disk encrypted. • Laptops must be physically secured at all times. • The theft or loss of a laptop must be reported to the IT Department immediately. • Protected and/or Confidential company data cannot be stored on laptops unless specifically authorized by the IT Department. REMOTE ACCESS This section applies to all users who have been granted permission to access the Organization’s internal computing resources from a remote location. REMOTE ACCESS POLICY • Remote access to the City’s network will be provided to users authorized by the IT Department. • Any devices used for remote connectivity to the City’s network must conform to the City remote access standards. • Termination of an authorized user’s Remote Access is handled through the standard employee termination process upon employee termination or at management’s request. REMOTE ACCESS SYSTEM Users must review this Acceptable Use Agreement and acknowledge they understand their requirements in respect to remote access. • City information WILL NOT be stored on / saved to the remote workstation unless authorized by the IT Department. • Remote access connections must use the authorized remote access solution, Windows Virtual Desktop or Remote Desktop with SSLVPN (NetExtender). • Remote access connections require two factor authentication where possible. • The remote workstation will: o Be kept physically secure and not be used by anyone other than a City workforce member. o Have security controls in place: ▪ Antivirus Software installed and virus definition files updated. ▪ Desktop Firewall Software. ▪ Updated and current with operating system and application patches. ▪ No critical vulnerabilities or malware are present that could negatively affect the health of the City network. PHYSICAL ACCESS The section applies to all facilities operated by the City and all workforce members and any other person who may come in physical contact with resources that affect the City’s information assets o...
Laptops. Students are required to bring their school assigned laptop to class every day. The expectation is that laptops will be charged, but if not, students will be able to utilize the plugs on their desks to charge their laptops. For students to be successful this academic year, laptops are vital to the success. Without having a laptop, students will not be able to participate fully in lessons, assignments, quizzes, exams, or any other work in this class. Paper copies will not be provided as an option to not bringing your laptop. Paper copies will typically only be provided if there is a special circumstance or if there is no wifi during class time. Students will not be permitted to use their cell phones to complete class work in lieu of their computer. Students should not expect this to be done as an exception at any time unless an assignment warrants the use of the student’s cell phones. Please see the cell phone policy below.
Laptops. Managers will be entitled to the use of a laptop (not older than 4 years), for business and private use.
Laptops. The Government will procure laptops as Government Furnished Equipment (GFE) and will issue to the contractor. Laptops will be Government property and will be identified on the contractor's hand receipt.
Laptops. 2.1.1. Students have one-to-one access to individually assigned laptops which they can use in class and at home to support their learning. 2.1.2. In specialist learning areas, like AV Studies, Music and Art, students have access to dedicated desktop computers to support their classroom learning. 2.1.3. Student access to a variety of mobile digital devices, such as iPads, tablets and ActivExpression devices, is available according to learning activities managed by staff.
Laptops. Feature Technical Specs Met Not Met General Technical Features
Laptops. The Font Software may be installed and used on a laptop as a secondary and alternate use computer.