Monitoring Usage Sample Clauses

Monitoring Usage. 7.1. Monitoring user activity is important for early detection of attacks and incidents, as well as inappropriate usage by pupils or staff.
AutoNDA by SimpleDocs
Monitoring Usage. You acknowledge and agree that StandardFusion may, from time to time, review and monitor use of the Services, including analysis of individual user behaviour, in order to test and evaluate the performance of the Services and to protect the operation and integrity of StandardFusion’s systems. StandardFusion may collect technical data and related account activity information, including, but not limited to, technical information about your use of the Services (for example: session length, device type, operating system), and use this information (other than User Data) for purposes of research, development, and service improvement. Such information does not include User Data and is data used by StandardFusion internally. The foregoing shall not in any way limit StandardFusion’s obligations under Sections 6 (Protection, Ownership, and Use of User Data) or 15 (Confidentiality) of this Agreement.
Monitoring Usage. The Student will provide access to the Student Laptop and any accessories assigned to them upon request by the school or district. Glassboro Public Schools District or its designees may search the Student Laptop and student files if there is suspicion that any policies, procedures, or guidelines have been violated. Glassboro Public Schools District technicians and personnel will be able to monitor the Student Laptop at any point during the day through remote transmission. Students may be randomly selected to provide the Student Laptop for inspection. Students with damaged Student Laptops who fail to report the damage will be subject to additional fines and disciplinary actions.
Monitoring Usage. NORC reserves the right to take measures to monitor Requestor's use of the Data to ensure that the Requestor complies with all terms of this Agreement. These measures include, without limitation:
Monitoring Usage. The Licensor reserves the right to monitor the Licensee’s use of the Products. If the Licensor shall have any questions about the Licensee’s use of the Products, the Licensor may raise these as issues with the Licensee. In any such case, the Licensee will investigate any such issues to endeavour to determine whether there has been a violation of the License Agreement, and will provide reasonable responses, including the results of its investigation, to the Licensor.
Monitoring Usage. We may monitor your use of the services and our network or that of our service provider partners, or conduct investigations with respect to such matters, including bandwidth consumption and its impact on the operation and efficiency of the network and services.
Monitoring Usage. 5.1 The Supplier reserves the right to use a security mechanism within the Software to monitor usage of the Software by Authorised Users (including tracking User Subscriptions if applicable) in order to establish that the Customer’s and Authorised Users’ use of the Software is in accordance with this Agreement. The Customer shall not engage in any activity designed to circumvent or obstruct, or which has the effect of circumventing or obstructing, the Software’s monitoring and/or tracking capabilities.
AutoNDA by SimpleDocs
Monitoring Usage. ● Student activity on the Chromebook, including browsing history, email and files, may be monitored by the school district. ● Students should never be left unsupervised while using Chromebooks or other computers. While at school, this is the responsibility of the school-district personnel. While at home, this is the responsibility of the parent and/or guardian. ● Students will provide access to the Chromebook and any accessories assigned to them upon request by the school or district. A search of the Chromebook and student files may be conducted if there is suspicion that any policies, procedures, or guidelines have been violated. ● School District personnel will be able to monitor student Chromebooks at any point during the day through remote monitoring software (there is no way to remotely access or view the camera on the device). Care must be taken with any application running that displays the camera on the screen as what is displayed on the screen can be seen remotely. ● Students may be randomly selected to provide the Chromebook for inspection. Students with damaged Chromebooks who fail to report the damage will be subject to additional fines and disciplinary actions. ● In the event of a Chromebook that is reported stolen, WCPS may take steps to locate the device including accessing files, logs, location data or screenshots from the Chromebook. Police reports will be filed for any stolen devices.
Monitoring Usage. Sphera may monitor the usage of SaaS and Sphera Property to ensure Client’s compliance with the authorization rights, limitations and restrictions described in this Section 3.

Related to Monitoring Usage

  • System Availability System Availability percentage is calculated as follows:  Total MinutesintheMonth −Downtime   System Availability%age =  Total MinutesintheMonth *100    System Availability SLA (“SLA”) 99.5% System Availability percentage during each Month for productive versions Credit 2% of Monthly Subscription Fees for each 1% below SLA, not to exceed 100% of Monthly Subscription Fees Excluded Downtime Total Minutes in the Month attributable to: (i) a Scheduled Downtime for which a Regular Maintenance Window is described in Section 4 below, or (ii) any other Scheduled Downtime according to Section 4 for which the customer has been notified at least five (5) business days prior to such Scheduled Downtime or (iii) unavailability caused by factors outside of SAP’s reasonable control, such as unpredictable and unforeseeable events that could not have been avoided even if reasonable care had been exercised. Scheduled Downtime Scheduled Downtime for the applicable Cloud Services to which customer has subscribed is set forth in Section 4 below entitled “Maintenance Windows for Cloud Services”.

  • High Availability Registry Operator will conduct its operations using network and geographically diverse, redundant servers (including network-­‐level redundancy, end-­‐node level redundancy and the implementation of a load balancing scheme where applicable) to ensure continued operation in the case of technical failure (widespread or local), or an extraordinary occurrence or circumstance beyond the control of the Registry Operator. Registry Operator’s emergency operations department shall be available at all times to respond to extraordinary occurrences.

  • DNS name server availability Refers to the ability of a public-­‐DNS registered “IP address” of a particular name server listed as authoritative for a domain name, to answer DNS queries from an Internet user. All the public DNS-­‐registered “IP address” of all name servers of the domain name being monitored shall be tested individually. If 51% or more of the DNS testing probes get undefined/unanswered results from “DNS tests” to a name server “IP address” during a given time, the name server “IP address” will be considered unavailable.

  • RDDS availability Refers to the ability of all the RDDS services for the TLD, to respond to queries from an Internet user with appropriate data from the relevant Registry System. If 51% or more of the RDDS testing probes see any of the RDDS services as unavailable during a given time, the RDDS will be considered unavailable.

Time is Money Join Law Insider Premium to draft better contracts faster.