Usage Policies Sample Clauses

Usage Policies. 10.1. Customer and Authorized Users shall not: (i) make Service Offerings available to any third party not authorized or as otherwise contemplated by this Agreement; (ii) send or store code that can harm or result in damage to the Services (including but not limited to malicious code and malware); (iii) willfully interfere with or disrupt the integrity of the Services or the data contained therein;
AutoNDA by SimpleDocs
Usage Policies. Company shall comply with any and all ACT terms and conditions, privacy policies and security policies that are made available to Company by ACT through postings to the Website or otherwise, as such terms and conditions and policies may be amended from time to time (collectively, the “Usage Policies”).
Usage Policies. Ordering Activity and its Named Users must comply with all usage terms set forth herein, the applicable Order, and with any manuals, training materials, guides, specifications and associated support materials provided by the Service Providers in connection with the Service Offering, regardless of format.
Usage Policies. Our Fair Use Policy and Acceptable Use Policies form part of this Agreement and are published on our Website.
Usage Policies. All technologies provided by the District are intended for educational purposes. All users are expected to use good judgment and to follow the specifics of this document and spirit of this document: be safe, appropriate, careful and kind; don’t try to get around technological protection measures; use good common sense; and ask if you do not know how to use a certain device or what is proper Web behavior.
Usage Policies. All technologies provided by CBNA are intended for educational purposes at all times. All users are expected to use good judgment and to follow the specifics of this document as well as the spirit of it: be safe, appropriate, careful and kind; do not try to get around technological protection measures; use good common sense; and ask if you do not know. Network Access CBNA provides its students with access to the Internet, including web sites, resources, content, and online tools. That access will be restricted in compliance with CIPA regulations and school policies. Web browsing may be monitored and web activity records may be retained indefinitely. Internet access to visual depictions that are obscene, violent, pornographic or are of a harmful nature to minors are filtered or blocked. Students shall not intentionally access or attempt to access these sites. Users are expected to respect that the web filter is a safety precaution and should not try to circumvent it when browsing the Web. If a site is blocked and a user believes it shouldn’t be, the user should follow protocol to alert an IT staff member or submit the site for review. Always log out of the network so that your file, password, and network access is protected from abuse by others. Students are ultimately responsible for backing up their data. CBNA-provided storage space should not be considered secure or permanent. CBNA is not responsible for any data loss. Email CBNA will provide current students with email accounts for the purpose of school-related communication. Availability and use may be restricted based on school policies. School-provided student email accounts should be used with care. Users should not send personal information, attempt to open files or follow links from unknown or untrusted origin, and should use appropriate language and only communicate with other people as allowed by the school policy or the teacher. Users are expected to communicate with the same appropriate, safe, mindful, courteous conduct online as offline. Email usage may be monitored and archived. Social / Tools & Apps / Collaborative Content Recognizing that collaboration is essential to education, CBNA will provide students with access to web sites or tools that allow communication, collaboration, sharing and messaging among users. Users are expected to communicate with the same appropriate, safe, mindful, courteous conduct online as offline. Posts, chats, sharing, and messaging may be monitored. Users shoul...
Usage Policies. Individual programs may adopt vacation approval policies with the Union's concurrence, providing that seniority is recognized in vacation selection, and that each worker has access to winter holiday leave as possible.
AutoNDA by SimpleDocs
Usage Policies. Tenant Change If you change your Tenant you must contact us on 00000 000000. You will need to have the existing SmartLink Customer Portal account cancelled and start a new account covering the new details. ……………………………………………………………………… ……………………………………………………………………… Signed Date
Usage Policies. It is further agreed and understood that all of the Facility Usage Policies including all addenda published by the date of this Agreement are hereby incorporated as part of this contract and the Licensee has received a copy of the Indiana University Auditorium Facility and General Information. Please initial here: Sound System If sound equipment is carried by the performing company, artist, or conference, the Indiana University Auditorium Production Stage Manager, after consultation with representatives of the company, may permit use of the company's equipment in conjunction with the house system. If Licensee is to mix sound system from the road sound mixing position, mixing stacks and/or equipment to be no higher than 48 (forty-eight) inches from the floor. Front Lighting There are no balcony rail house lighting positions in the Indiana University Auditorium.
Usage Policies. Usage policies govern who may use the system, what information may be stored, and what uses of the system are permitted. All users must comply with appropriate IQSS usage policies as defined at xxxxx://xxx.xx.xxxxxxx.xxx/policies including storage of confidential information and classified information; privacy; proper use of Harvard resources; and dissemination of copyrighted information. High Risk Confidential Information (HRCI) may not be stored or processed on IQSS systems without prior written approval from IQSS. Harvard Confidential Information (HCI) may be stored on IQSS file servers. Lab systems may be used to access HCI stored in IQSS file services. Lab systems may be used to remotely access restricted systems, when an encrypted network connection, such as Secure Socket Layer (SSL) or Secure Shell (SSH), is used. Neither HCI nor HRCI may be stored on the local drives of lab systems. If you require assistance with usage policies and their proper usage, please contact us at xxxxxxxx@xxxxxxx.xxx.
Time is Money Join Law Insider Premium to draft better contracts faster.