Rules for the use of the University computing facilities Clause Samples

Rules for the use of the University computing facilities a. Access to University computing facilities is normally granted by the issue of an individual username and initial password. The individual concerned is solely responsible for work undertaken from any username issued. Users must only use their own username when accessing the University network. Users are responsible for the security of their passwords. Passwords should never be divulged to anyone and should be regularly changed, whilst ensuring that strong passwords are chosen. Users should be particularly wary of phishing attacks that appear to be official request for your University username and password, or other personal data, as these may be used for identity theft. b. Access to University computing facilities is given and allocations of resources are made for purpose of the University, as approved by the departmental/school, and for the operations and management of the Universi ty. c. Users must not damage University computer equipment or interfere with systems or any other user software housed on the University computer systems, e.g. by introducing viruses. d. Users must not use or attempt to use any network from the University for unauthorised purposes. In particular, the ▇▇▇▇▇ network is subjected to the ▇▇▇▇▇ Acceptable Use Policy and the campus Internet link is subject to the local ISP terms and conditions. e. Users must not use or attempt to use any networked service (e.g.
Rules for the use of the University computing facilities a. Access to University computing facilities is normally granted by the issue of an individual username and initial password. The individual concerned is solely responsible for work undertaken from any username issued. Users must only use their own username when accessing the University network. Users are responsible for the security of their passwords. Passwords should never be divulged to anyone and should be regularly changed, whilst ensuring that strong passwords are chosen. Users should be particularly wary of phishing attacks that appear to be official request for your University username and password, or other personal data, as these may be used for identity theft. b. Access to University computing facilities is given and allocations of resources are made for purpose of the University, as approved by the departmental/school, and for the operations and management of the University. c. Users must not damage University computer equipment or interfere with systems or any other user software housed on the University computer systems, e.g. by introducing viruses. d. Users must not use or attempt to use any network from the University for unauthorised purposes. In particular, the ▇▇▇▇▇ network is subjected to the ▇▇▇▇▇ Acceptable Use Policy and the campus Internet link is subject to the local ISP terms and conditions. e. Users must not use or attempt to use any networked service (e.g. BIDS, Edina etc.) accessed from the University for unauthorised purposes. Use of licensed services must comply with the license conditions. In particular, use of software/datasets licensed through CHEST must comply with the CHEST Code of Conduct and its associated Copyright Acknowledgement. f. All software used on University IT equipment must be appropriately licensed, and proof of such licenses must be made available on request. g. Information issued by Information Services in official notices, circulars and instructions, and verbal advice given to users is not confidential except where it is stated to be so. However, users are warned to follow strictly any instructions issued regarding the use of proprietary software and any other confidential information. It is strongly emphasised that no such confidential information may be copied, modified or disseminated without the consent of the Head of Information Services or the Head of Department/School, as appropriate. h. Users must not access, transmit, store, print, promote or display offensive, obscene or indecent material (for...

Related to Rules for the use of the University computing facilities

  • Use of Interconnection Facilities by Third Parties 494950 9.9.1 Purpose of Interconnection Facilities 494950 9.9.2 Third Party Users. 50 9.10 Disturbance Analysis Data Exchange. 50 ARTICLE 10. MAINTENANCE 50 10.1 Participating TO Obligations. 50 10.2 Interconnection Customer Obligations. 50 10.3 Coordination 505051

  • Use of Basement and Service Areas The basement(s) and service areas, if any, as located within the

  • Geographic Area and Sector Specific Allowances, Conditions and Exceptions The following allowances and conditions shall apply where relevant. Where the Employer does work which falls under the following headings, the Employer agrees to pay and observe the relevant respective conditions and/or exceptions set out below in each case.

  • PREVAILING WAGE RATES - PUBLIC WORKS AND BUILDING SERVICES CONTRACTS If any portion of work being Bid is subject to the prevailing wage rate provisions of the Labor Law, the following shall apply:

  • Preservation, Maintenance, and Protection of the Property Inspections. Borrower will not destroy, damage, or impair the Property, allow the Property to deteriorate, or commit waste on the Property. Whether or not Borrower is residing in the Property, Borrower must maintain the Property in order to prevent the Property from deteriorating or decreasing in value due to its condition. Unless Lender determines pursuant to Section 5 that repair or restoration is not economically feasible, Borrower will promptly repair the Property if damaged to avoid further deterioration or damage. If insurance or condemnation proceeds are paid to Lender in connection with damage to, or the taking of, the Property, Borrower will be responsible for repairing or restoring the Property only if ▇▇▇▇▇▇ has released proceeds for such purposes. Lender may disburse proceeds for the repairs and restoration in a single payment or in a series of progress payments as the work is completed, depending on the size of the repair or restoration, the terms of the repair agreement, and whether Borrower is in Default on the Loan. Lender may make such disbursements directly to Borrower, to the person repairing or restoring the Property, or payable jointly to both. If the insurance or condemnation proceeds are not sufficient to repair or restore the Property, Borrower remains obligated to complete such repair or restoration. Lender may make reasonable entries upon and inspections of the Property. If Lender has reasonable cause, ▇▇▇▇▇▇ may inspect the interior of the improvements on the Property. Lender will give Borrower notice at the time of or prior to such an interior inspection specifying such reasonable cause.