Personalization of School Owned Devices and Cases Sample Clauses

Personalization of School Owned Devices and Cases. ● PERSONALIZATION OF LAPTOPS OR SCHOOL OWNED DEVICES: If a student purchases a skin or case to fit the outside of the laptop, they should check with their teacher to ensure it is approved to use. A student may personalize the case they purchased with graphics, stickers, and any other decorations that do not violate the Code of Conduct. ● LOCKSCREEN AND WALLPAPER: Inappropriate pictures may not be used as the Lock screen and Wallpaper. (See section 2.8 for definition of inappropriate pictures.)
AutoNDA by SimpleDocs

Related to Personalization of School Owned Devices and Cases

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • Internet Connectivity School must provide sufficient hardline internet connectivity and the required network configurations (provided in Exhibit A) for each Pixellot System to allow live broadcasts. PlayOn will provide the point-to-point wireless internet base station (“Point to Point”) when needed to deliver hardline internet connectivity to Pixellot Systems installed in outdoor venues; provided that PlayOn is able to select the make and model of the Point to Point system. In the event that School requests, or requires, a specific Point to Point system that is different from what is provided by PlayOn, then School must provide and install the Point to Point system at its own expense.

  • PROHIBITION ON CERTAIN TELECOMMUNICATIONS AND VIDEO SURVEILLANCE SERVICES OR EQUIPMENT To the extent applicable, Supplier certifies that during the term of this Contract it will comply with applicable requirements of 2 C.F.R. § 200.216.

  • Foreign-Owned Companies in Connection with Critical Infrastructure If Texas Government Code, Section 2274.0102(a)(1) (relating to prohibition on contracts with certain foreign-owned companies in connection with critical infrastructure) is applicable to this Contract, pursuant to Government Code Section 2274.0102, Contractor certifies that neither it nor its parent company, nor any affiliate of Contractor or its parent company, is: (1) majority owned or controlled by citizens or governmental entities of China, Iran, North Korea, Russia, or any other country designated by the Governor under Government Code Section 2274.0103, or (2) headquartered in any of those countries.

  • Internet Connection In order to ensure the proper functioning of the Production Monitor and the Consumption Monitor, if possible, you must provide the Solar System with continuous access to a functioning broadband internet connection with one (1) wired Ethernet port and standard electrical outlet, at your cost. If you are unable to provide the Solar System with an internet connection in accordance with the foregoing sentence, the Home must be located in an area with cellular service that is acceptable to us in our discretion.

  • Servers Marco backs up the following servers only: Windows Servers, SQL servers, Exchange server, and Virtual Machines images running VMWare or Hyper V.

  • Unbundled Channelization (Multiplexing) 5.7.1 To the extent NewPhone is purchasing DS1 or DS3 or STS-1 Dedicated Transport pursuant to this Agreement, Unbundled Channelization (UC) provides the optional multiplexing capability that will allow a DS1 (1.544 Mbps) or DS3 (44.736 Mbps) or STS-1 (51.84 Mbps) Network Elements to be multiplexed or channelized at a BellSouth central office. Channelization can be accomplished through the use of a multiplexer or a digital cross-connect system at the discretion of BellSouth. Once UC has been installed, NewPhone may request channel activation on a channelized facility and BellSouth shall connect the requested facilities via COCIs. The COCI must be compatible with the lower capacity facility and ordered with the lower capacity facility. This service is available as defined in NECA 4.

  • Caching The Participating Institutions and the Authorized Users are authorized in the course of an automatic process of an internet browser or any other software to make temporary local digital copies of the Licensed Materials in order to ensure proper operation and use of such internet browser or for proper functioning of such software. For the avoidance of doubt, the cached copy is not a derivative work.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Viewing By strict appointment through the selling Agents, JD Commercial, 00 Xxxxxxxx Xxxxx, Bideford, North Devon. EX39 1TW TEL: (01237) 424053 / 07868 846357 E-MAIL: xxxxx@xx-xxxxxxxxxx.xx.xx JD COMMERCIAL, 00 XXXXXXXX XXXXX, website : xxx.xx-xxxxxxxxxx.xx.xx BIDEFORD, NORTH DEVON, EX39 1TW email : xxxxx@xx-xxxxxxxxxx.xx.xx

Time is Money Join Law Insider Premium to draft better contracts faster.