Storing Your iPad Sample Clauses

Storing Your iPad. When students are not using their iPads, they should be stored in their locked lockers. Nothing should be placed on top of the iPad, when stored in the locker. Students will take their iPads home every day after school unless alternative arrangements have been made. iPads should not be stored in a student’s vehicle at school or at home. If a student needs a secure place to store their iPad, they may check it in for storage with the main office in their school.
AutoNDA by SimpleDocs
Storing Your iPad. When you are not using your iPad, it should be stored in a secure location. Take your iPad home every day after school unless alternative arrangements have been made with your school. iPads should not be stored in a student’s vehicle at school or at home. iPads must never be left in a location susceptible to extreme cold or hot weather. iPads left in Unsupervised Areas Under no circumstances should iPads be left in unsupervised areas. Unsupervised areas include the school grounds and campus, lunchroom, computer lab, locker rooms, library, unlocked classrooms, gymnasiums, auditorium, and hallways as well as off-campus locations. Any iPad left in these areas is in danger of being stolen. If an iPad is found in an unsupervised area, it will be taken to the school office. iPad Identification Student iPads can be identified in the following ways: ● Student name visible on the iPad login screen ● Record of serial number ● Enrollment of iPads within the district Mobile Device Management system. ● The district purchased iPad case has a detachable keyboard. Each keyboard has its own unique serial number and should be kept with the protective case that it was originally distributed with. You are responsible for keeping track of the keyboard that comes with your iPad case.
Storing Your iPad. When students are not using their iPads, they should be stored in their lockers, which must be locked.
Storing Your iPad. When students are not using their iPads, nothing should be placed on top of the iPad. Students should take his/her iPads home every day after school, regardless of whether or not they are needed. iPads should not be stored in a vehicle for an extended period of time, especially in warm weather.
Storing Your iPad. When you are not using your iPad, it should be stored in a secure location. iPads should not be stored in a student’s vehicle. iPads must never be left in a location susceptible to extreme cold or hot weather.

Related to Storing Your iPad

  • Updating Your Information You must provide updated information to any person to whom you claimed to be an exempt payee if you are no longer an exempt payee and anticipate receiving reportable payments in the future from this person. For example, you may need to provide updated information if you are a C corporation that elects to be an S corporation, or if you no longer are tax exempt. In addition, you must furnish a new Form W-9 if the name or TIN changes for the account, for example, if the grantor of a grantor trust dies. Penalties Failure to furnish TIN. If you fail to furnish your correct TIN to a requester, you are subject to a penalty of $50 for each such failure unless your failure is due to reasonable cause and not to willful neglect. Civil penalty for false information with respect to withholding. If you make a false statement with no reasonable basis that results in no backup withholding, you are subject to a $500 penalty. Criminal penalty for falsifying information. Willfully falsifying certifications or affirmations may subject you to criminal penalties including fines and/or imprisonment.

  • Loading Your Card You may add funds to your Card, called "value loading", at any time. Value will be "loaded" or added to the Card after it has been activated and the authenticity of the Card and/or "load" instruction has been verified. You can add ("reload") additional value to your Card in any of the following ways: (a) making a payment at your local Xxxxxxx Federal Credit Union branch; (b) direct deposit to the Card through an Automated Clearing House (“ACH”) funds transfer and receive the funds up to 2 days early dependent on the timing of payer’s submission of ach deposit versus the scheduled payment date; (c) visiting xxx.xxxx.xxx or calling 866-901- 8090 to initiate an ACH funds transfer from your designated funding account; d) transfer funds to your Card from an eligible checking or savings account held by you at a U.S. financial institution by means of using the Bank’s online banking system; or e) visit participating Visa ReadyLink merchants to reload, merchants reserve the right to charge a fee. Find a Visa ReadyLink merchant at: xxxxx://xxx.xxxx.xxx/pay-with-visa/cards/services-locator.html. A load or reload fee may apply for each load or reload. The minimum amount of the initial load and each reload transaction load is $10.00. The maximum amount of the initial cash load and each cash reload is $2500.00 per transaction, with a total cumulative cash load/reload limit of $2500.00 per day. The maximum amount of value that can reside on the Card at any time is $2500.00. The number of loads on a Non-Personalized Card is limited to four (4) including the initial load. Personalized Cards have unlimited reload capabilities. We may increase or decrease these limits from time to time in our sole discretion without prior notice to you. We will limit the number of Cards provided to you. We reserve the right to accept or reject any request to load or reload value to the Card at our sole discretion. With the exception of reloads performed through direct deposit, the Card may only be reloaded by the Cardholder. AN UNAUTHORIZED USER MAY NOT RELOAD FUNDS TO THE CARD. You can receive Automated Clearing House (“ACH”) direct deposits. You may provide your Card Account number for these deposits, but you agree not to provide your Card Account number to third parties to withdraw funds. If you are a party to an ACH entry, you agree to be bound by the rules and regulations of the National Automated Clearing House Association ("NACHA") Operating Rules and Guidelines (collectively, the “NACHA Rules”), the rules of any local ACH, and the rules of any other system through which the entry is made. Provisional Payment. Credit we give you with respect to an ACH credit entry is provisional until we receive final settlement for that entry through a Federal Reserve Bank. If we do not receive final settlement, you agree that we are entitled to a refund of the amount credited to you in connection with the entry, and the party making the payment to you via such entry (i.e., the originator of the entry) shall not be deemed to have paid you in the amount of such entry. Notice of Receipt. Under the NACHA Rules, which are applicable to ACH transactions involving your Card Account, we are not required to give next day notice to you of receipt of ACH item and we will not do so. However, we will continue to notify you of the receipt of payments in the account transaction history made available to you. You may also use the Mobile Cashed Check Load service offered by Ingo Money, Inc. (a third-party service provider) to load funds from eligible cashed checks to your Card using your mobile device. Even though we may allow use of the Mobile Cashed Check Load service to add money to your Card, we do not provide this service and are not responsible for any service-related issues. To use this service, you must agree to the terms and conditions the service provider establishes from time to time. Although we do not charge any fees in connection with Mobile Cashed Check Loads, the service provider providing such service may charge a fee depending on the funding option you select. The terms and conditions, including the applicable fees, will be provided to you at the time you sign up for the service. You can sign up for this service by visiting xxxxx://xxx.xxxxxxxxx.xxx. The service provider should notify you about any fees for a particular load before you authorize the load. Generally, you will not have access to the money you load via the Mobile Cashed Check Load service until your check clears (this can take up to ten (10) business days). The service provider may offer immediate funds availability for a fee. See the Ingo Money Service Terms and Conditions at xxxxx://xxxxxxxxx.xxx/terms- conditions.html for limitations and complete details. Currently, these are the only methods that you can load your Card by check or money order.

  • HOW WE MAY USE YOUR PERSONAL INFORMATION 8.1 We will use the personal information You provide to Us to:

  • Using Your Card You understand that the use of your credit card or credit card account will constitute acknowledgement of receipt and agreement to the terms of the Credit Card Agreement and Credit Card Account Opening Disclosure (Disclosure). You may use your card to make purchases from merchants and others who accept your card. The credit union is not responsible for the refusal of any merchant or financial institution to honor your card. If you wish to pay for goods or services over the Internet, you may be required to provide card number security information before you will be permitted to complete the transaction. In addition, you may obtain cash advances from the Credit Union, from other financial institutions that accept your card, and from some automated teller machines (ATMs). (Not all ATMs accept your card.) If the credit union authorizes ATM transactions with your card, it will issue you a personal identification number (PIN). To obtain cash advances from an ATM, you must use the PIN issued to you for use with your card. You agree that you will not use your card for any transaction that is illegal under applicable federal, state, or local law. Even if you use your card for an illegal transaction, you will be responsible for all amounts and charges incurred in connection with the transaction. If you are permitted to obtain cash advances on your account, you may also use your card to purchase instruments and engage in transactions that we consider the equivalent of cash. Such transactions will be posted to your account as cash advances and include, but are not limited to, wire transfers, money orders, bets, lottery tickets, and casino gaming chips, as applicable. This paragraph shall not be interpreted as permitting or authorizing any transaction that is illegal.

  • Protecting Your Personal Information In addition to protecting your access codes, you should also take precautions to protect your personal identification information, such as your driver’s license, Social Security number, or tax identification number. This information by itself or together with account information may allow unauthorized access to your accounts. You should treat personal information with the same level of care that you would for your account information. You should also protect and secure all information and data stored in any personal computer or other equipment you use to access our Online Banking service.

  • Information About You and Your Visits to the Website All information we collect on this Website is subject to our Privacy Policy. By using the Website, you consent to all actions taken by us with respect to your information in compliance with the Privacy Policy.

  • Collection and Use of Your Information You acknowledge that when you download, install, or use the Application, Company may use automatic means (including, for example, cookies and web beacons) to collect information about your Mobile Device and about your use of the Application. You also may be required to provide certain information about yourself as a condition to downloading, installing, or using the Application or certain of its features or functionality, and the Application may provide you with opportunities to share information about yourself with others. All information we collect through or in connection with this Application is subject to our Privacy Policy. By downloading, installing, using, and providing information to or through this Application, you consent to all actions taken by us with respect to your information in compliance with the Privacy Policy.

  • Use of Your Information 6.1 We will use the information we have about you and your use of the Services for marketing purposes. However, we will not do so if you ask us not to.

  • PROTECTION OF YOUR CONTENT 5.1 In order to protect Your Content provided to Oracle as part of the provision of the Services, Oracle will comply with the applicable administrative, physical, technical and other safeguards, and other applicable aspects of system and content management, available at xxxx://xxx.xxxxxx.xxx/us/corporate/contracts/cloud-services/index.html.

  • Secure Your Tax Records from Identity Theft Identity theft occurs when someone uses your personal information such as your name, SSN, or other identifying information, without your permission, to commit fraud or other crimes. An identity thief may use your SSN to get a job or may file a tax return using your SSN to receive a refund. To reduce your risk: • Protect your SSN, • Ensure your employer is protecting your SSN, and • Be careful when choosing a tax preparer. If your tax records are affected by identity theft and you receive a notice from the IRS, respond right away to the name and phone number printed on the IRS notice or letter. If your tax records are not currently affected by identity theft but you think you are at risk due to a lost or stolen purse or wallet, questionable credit card activity or credit report, contact the IRS Identity Theft Hotline at 1-800-908-4490 or submit Form 14039. For more information, see Publication 4535, Identity Theft Prevention and Victim Assistance. Victims of identity theft who are experiencing economic harm or a system problem, or are seeking help in resolving tax problems that have not been resolved through normal channels, may be eligible for Taxpayer Advocate Service (TAS) assistance. You can reach TAS by calling the TAS toll-free case intake line at 1-877-777-4778 or TTY/TDD 1-800-829-4059. Protect yourself from suspicious emails or phishing schemes. Phishing is the creation and use of email and websites designed to mimic legitimate business emails and websites. The most common act is sending an email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The IRS does not initiate contacts with taxpayers via emails. Also, the IRS does not request personal detailed information through email or ask taxpayers for the PIN numbers, passwords, or similar secret access information for their credit card, bank, or other financial accounts. If you receive an unsolicited email claiming to be from the IRS, forward this message to xxxxxxxx@xxx.xxx. You may also report misuse of the IRS name, logo, or other IRS property to the Treasury Inspector General for Tax Administration (TIGTA) at 1-800-366-4484. You can forward suspicious emails to the Federal Trade Commission at: xxxx@xxx.xxx or contact them at xxx.xxx.xxx/xxxxxxx or 1-877-IDTHEFT (1-877-438-4338). Visit XXX.xxx to learn more about identity theft and how to reduce your risk.

Time is Money Join Law Insider Premium to draft better contracts faster.