Security and Protection Sample Clauses

Security and Protection. I agree to read and follow the district’s Acceptable Use Policy and all other district policies related to technology and information security. ● I understand my school issued device needs to be with me at work every day and connected to the district network. ● I understand I am permitted to take my school issued device home at the end of the workday, but it must return with me to work the following day. ● I will lock my school issued device in a safe place in my classroom or office when not in use. ● I understand leaving the school issued device in a car can promote theft and damage from temperature extremes, and I will protect my assigned school issued device from these dangers.
AutoNDA by SimpleDocs
Security and Protection. Particular care must be taken to ensure the comfort, safety and security of tenants and adjoining householders during Work activity. All necessary reasonable action will be required to ensure the well being of both the property worked on, and those adjoining. Specifically, operatives will be required to employ the use of dustsheets and protective coverings whenever dust, dirt, paint, mortar or similar nuisance is liable to foul surrounding property, fauna or flora. Particular care must be exercised when Work is carried out in the vicinity of small children, particularly with regard to sharp tools and toxic substances being kept well out of reach. Contractor must not enter houses where children under 16 are left unaccompanied. Care and consideration will be required when working in the home of elderly or disabled tenants including any communal area, particularly with regard to restricting or impending movement around the property, tools and materials lying on floors and maintaining acceptable levels of warmth and comfort. Any complaint arising from a dispute in any form, between tenant and Contractor must be referred immediately to the Compliance Coordinator. If for any reason a Contractor feels unable to undertake specified work on a property of the Employers, the Compliance Co-Coordinator must be informed immediately. In the interests of all concerned, whenever Contractors encounter a particular difficult or a potentially violent situation they must leave the site immediately and contact Employers staff as soon as possible.
Security and Protection. 16.1 The Service Provider shall:
Security and Protection. I agree to use company property for company use only. I understand that my laptop needs to be with me every day. I understand that I am permitted to take my laptop home at the end of the workday. I will secure my laptop in my office when not in use. I understand that leaving the laptop in a car can promote theft and damage from temperature extremes, and that I will be responsible to pay for loss or damage as a result of leaving the laptop in a car. I understand that I am expected to protect my laptop from damage, and that I will be responsible for the damage. I understand that if my laptop is lost or stolen, I will immediately notify Management and file a report with the police.
Security and Protection. I agree to use company property for company use only. ___ I understand that my equipment needs to be with me every day. ___ I understand that I am permitted to take my equipment home at the end of the workday. ___ I will secure my equipment in my office when not in use. ___ I understand that leaving the equipment in a car can promote theft and damage from temperature extremes, and that I will be responsible to pay for loss or damage as a result of leaving the equipment in a car. ___ I understand that I am expected to protect my equipment from damage, and that I will be responsible for the damage. ___ I understand that if my equipment is lost or stolen, I will immediately notify Management and file a report with the police.
Security and Protection. 1. The Office shall be responsible for security and maintenance of order within the Premises of the Office.
Security and Protection. Open Hours Friday 8:30am - 12:30pm and 2:15pm - 5:00pm Saturday 8:30am - 12:00pm KSTA and Eastern Kentucky University (EKU) will take every reasonable precaution to safeguard exhibitor property. However, KSTA and EKU will not assume liability for any exhibitor property or representative personal property loss or damage.
AutoNDA by SimpleDocs
Security and Protection. I agree to read and follow the district’s Acceptable Use Policy and all other district policies related to technology and information security. ● I understand my Chromebook needs to be with me at work every day and connected to the district network. ● I understand I am permitted to take my Chromebook home at the end of the workday, but it must return with me to work the following day. ● I will lock my Chromebook in a safe place in my classroom or office when not in use. ● I understand leaving the Chromebook in a car can promote theft and damage from temperature extremes, and I will protect my assigned Chromebook from these dangers. ● I understand I am expected to protect my Chromebook from misuse, damage and theft. ● I understand all student data is confidential and I will protect data that is accessible through district software and programs to avoid any data breach. I will report any suspected data breach immediately to my supervisor. ● I will not share any passwords related to my Chromebook or district owned software with anyone. ● I understand if my Chromebook is lost or stolen, I will immediately notify my supervisor and file a report with the police.
Security and Protection. For purposes Licensee safeguarding the Software, Licensee shall assign responsibility for security of Software, Documentation, and username(s) and password(s) required to operate the Software to the Licensee's representative selected by Licensee and such person will keep custody of the Software, Documentation, username(s) and password(s). Licensee agrees to secure and protect all original versions and copies of Software and Documentation in its possession in a manner consistent with the maintenance of Owner's rights therein, and to take appropriate action by instruction or agreement with all employees or any others who might obtain access to the Software, Documentation, username(s) and password(s). Licensee further agrees not to provide or otherwise make available the Software, Documentation, username(s) or password(s), in any form, to any other person without the express written consent of Owner. Licensee also understands and agrees that the Software is a trade secret and is the exclusive property of Owner. Licensee shall not sell, loan, give, or otherwise transfer the Software, Documentation, or username(s) and password(s) required for authentication of usage, to any third party (including a subcontractor performing work for the Licensee), without written consent from Owner. Licensee shall exercise due caution and use due care and diligence in protecting the Software so that unauthorized copies of the Software do not escape Licensee's control and Licensee shall treat the Software, Documentation, user name(s) and password(s) as confidential and protect same with the degree of care Licensee uses to protect its own confidential information which shall be not less than that of a reasonable business person. Violation of this provision shall be a material default of this XXXX and Owner may immediately terminate this XXXX without any notice to Licensee and without penalty to Owner, and Owner shall have all rights and remedies available under this XXXX and at law and in equity, including without limitation monetary damages, injunction, and specific performance. If security of the Software, username(s), password(s), or Documentation is compromised, Licensee must and shall give notice by email to Owner immediately so that new security procedures can be established. Owner may periodically require Licensee to change a password that associated with Software usage authentication.
Security and Protection. 8.1 Each Party will process data (whether Contract Data, Party Data or Services Data), which may include personal data (such as the personal data of end users or a Party's staff), for the purposes of performing its obligations and exercising its rights under or in connection with the DSC.
Time is Money Join Law Insider Premium to draft better contracts faster.