Listening Devices Sample Clauses

Listening Devices. The District agrees that mechanical or electronic devices utilized in classrooms will be equipped with privacy controls operable at the teacher's discretion. Devices that are currently in use that do not have privacy controls shall be converted or their use discontinued as soon as practical.
AutoNDA by SimpleDocs
Listening Devices. No mechanical or electronic device may be used to listen to or record the procedures in any class without prior knowledge of the employee.

Related to Listening Devices

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

  • enabled This information is collected by Symantec for the purpose of providing protection and of evaluating and advising You regarding potential threats and risks that may be associated with a particular Web site before You view it. − Executable files and files that contain executable content that are identified as potential malware, including information on the actions taken by such files at the time of installation. These files are submitted to Symantec using the Software and Service’s automatic submission function. Such automatic submission function may be deactivated after installation by following the instructions in the Documentation for applicable products. The collected files could contain personally identifiable information that has been obtained by the malware without Your permission. Files of this type are being collected by Symantec only for the purpose of improving the ability of Symantec’s products to detect malicious behavior. − The name given to the Device during the initial setup of such Device. If collected, the name will be used by Symantec as an account name for the Device under which You may elect to receive additional services and/or under which You may use certain features of the Software and Services. You may change such account name at any time after installation of the Software and Services and it is recommended that You do so. − Status information regarding installation and operation of the Software and Services. This information indicates to Symantec whether installation of the Software and Services was successfully completed as well as whether the Software and Services has encountered an error. The status information could contain personally identifiable information only if such information is included in the name of the file or folder encountered by the Software and Services at the time of installation or error. The status information is collected by Symantec for the purpose of evaluating and improving Symantec’s product performance and installation success rate. Symantec may also use this information to optimize its web-pages. − Information contained in email messages that You send through the Software and Services to Symantec to report as spam or as incorrectly identified as spam. These email messages may contain personally identifiable information and will be sent to Symantec only with Your permission, and will not be sent automatically. If You send such messages to Symantec, Symantec will use them only for the purpose of improving the detection ability of Symantec’s antispam technology. Symantec will not correlate or match up these files with any other personally identifiable information. − Information contained in a report that You may choose to send through the Software and Services to Symantec when the Software and Services encounters a problem. The report includes information regarding the status of both the Software and Services and Your Device at the time that the Software and Services encountered the problem. The status information about Your Device may include the system language, country locale, and the operating system version for Your Device, as well as the processes running, their status and performance information, and data from files or folders that were open at the time the Software and Services encountered the problem. The information could contain personally identifiable information if such information is included in, or is a part of the name of the files or folders open at the time the Software and Services encountered the problem. This information will be sent to Symantec only with Your permission, and will not be sent automatically. The information is collected by Symantec for the purpose of correcting the encountered problem and improving Symantec’s product performance. This information will not be correlated or matched up with any personally identifiable information. − The Internet Protocol (IP) address and/or Media Access Control (MAC) address and the Machine ID of the Device on which the Software and Services is installed to enable the Software and Services to function and for license administration purposes. − Other general, statistical information used for product analysis, and for improving product functionality. Unless it is expressly defined as optional, the collected information as set out above is necessary for the purpose of the functionality of Symantec’s products. Information may be transferred to the Symantec group in the United States or other countries that may have less protective data protection laws than the region in which You are situated (including the European Union) and may be accessible by Symantec employees or contractors exclusively to be used in accordance with the purposes described above. For the same purposes the information may be shared with partners and vendors that process information on behalf of Symantec. Symantec has taken steps so that the collected information, if transferred, receives an adequate level of protection. Subject to applicable laws, Symantec reserves the right to cooperate with any legal process and any law enforcement or other government inquiry related to Your use of this Software and Services. This means that Symantec may provide documents and information relevant to a court subpoena or to a law enforcement or other government investigation. In order to promote awareness, detection and prevention of Internet security risks, Symantec may share certain information with research organizations and other security software vendors. Symantec may also use statistics derived from the information to track and publish reports on security risk trends. By using the Software and Services, You acknowledge and agree that Symantec may collect, transmit, store, disclose and analyze such information for these purposes.

  • Smoke Detectors At Owner's expense, smoke detectors will be installed on the Property in working condition in accordance with the law prior to the tenant's occupancy. During the occupancy, it shall be the tenant's responsibility to maintain all smoke detectors. Owner will replace smoke detector equipment as needed.

  • Signaling Each Party will provide the other Party with access to its databases and associated signaling necessary for the routing and completion of the other Party’s traffic in accordance with the provisions contained in the Unbundled Network Element Attachment or applicable access tariff.

  • Unbundled Network Element Combinations 4.1 For purposes of this Section, references to “Currently Combined” Network Elements shall mean that the particular Network Elements requested by NewPhone are in fact already combined by BellSouth in the BellSouth network. References to “

  • Evaluation Software If the Software is an evaluation version or is provided to You for evaluation purposes, then, unless otherwise approved in writing by an authorized representative of Licensor, Your license to use the Software is limited solely for internal evaluation purposes in non-production use and in accordance with the terms of the evaluation offering under which You received the Software, and expires 90 days from installation (or such other period as may be indicated within the Software). Upon expiration of the evaluation period, You must discontinue use of the Software, return to an original state any actions performed by the Software, and delete the Software entirely from Your system and You may not download the Software again unless approved in writing by an authorized representative of Licensor. The Software may contain an automatic disabling mechanism that prevents its use after a certain period of time. RESTRICTIONS

  • Problem Solving Employees and supervisors are encouraged to attempt to resolve on an informal basis, at the earliest opportunity, a problem that could lead to a grievance. If the matter is not resolved by informal discussion, or a problem-solving meeting does not occur, it may be settled in accordance with the grievance procedure. Unless mutually agreed between the Employer and the Union problem-solving discussions shall not extend the deadlines for filing a grievance. The Union Xxxxxxx or in their absence, the Local Union President, or Area Xxxxxxx, or Chief Xxxxxxx, either with the employee or alone, shall present to the appropriate supervisor a written request for a meeting. If the supervisor agrees to a problem- solving meeting, this meeting shall be held within fourteen (14) calendar days of receipt of the request. The supervisor, employee, Union Xxxxxxx, and up to one (1) other management person shall attempt to resolve the problem through direct and forthright communication. If another member of management is present that person will not be hearing the grievance at Step Two, should it progress to that Step. The employee, the Union Xxxxxxx or in their absence, the Local Union President, or Area Xxxxxxx, or Chief Xxxxxxx, may participate in problem-solving activities on paid time, in accordance with Article 31, Union Rights, Section 1H.

  • TREE TRIMMING The Licensee shall have authority to trim trees upon and overhanging public streets, alleys, sidewalks and ways and places of the Town so as to prevent the branches of such trees from coming in contact with the wires, cables and equipment of the Licensee, in accordance with applicable state law and any Town bylaws/ordinances and regulations.

  • Synchronization The Licensor hereby grants limited synchronization rights for One (1) music video streamed online (Youtube, Vimeo, etc..) for up to 500,000 non-monetized video streams on all total sites. A separate synchronisation license will need to be purchased for distribution of video to Television, Film or Video game.

Time is Money Join Law Insider Premium to draft better contracts faster.