Use of CCTV Sample Clauses

Use of CCTV. 6.1.7. Fire detection and protection systems;
AutoNDA by SimpleDocs
Use of CCTV. Consistent with our school’s obligations set out above, Edgars Creek Secondary College may use CCTV cameras to: • prevent and verify incidents involving o criminal behaviour – of anyone on school grounds o staff misconduct o other inappropriate behaviour – including of students, staff, visitors or members of the public. For example, this means the school may use CCTV footage of incidents to help inform decisions about student management • verify other incidents – involving students, staff and visitors (e.g. incidents in which a person has sustained injury, loss or damage on school premises) • to provide the Principal with visual coverage during emergencies Student Declaration: When I use digital technologies and the internet, I agree to be a safe, responsible and ethical user at all times, by: • Respecting others and communicating with them in a supportive manner; never writing or participating in online bullying (e.g. forwarding messages and supporting others in harmful, inappropriate or hurtful online behaviours) • Protecting my privacy; not giving out personal details, including my full name, telephone number, address, passwords and images • Protecting the privacy of others; never posting or forwarding their personal details or images without their consent • Talking to a teacher or a trusted adult if I personally feel uncomfortable or unsafe online • Talking to a teacher or a trusted adult if I see others participating in unsafe, inappropriate or hurtful online behaviours • Carefully considering the content that I upload or post online; knowing that this is a personal reflection of who I am and what people think of me • Investigating the terms and conditions of use (e.g. age restrictions, parental consent requirements) and if my understanding is unclear seeking further explanation from a trusted adult • Confirming that I meet the stated terms and conditions and completing the required registration processes • Handling ICT devices with care and notifying a teacher of any damage or required attention • Abiding by copyright and intellectual property regulations; requesting permission to use images, text, audio and video and cite references where necessary • Not downloading unauthorised programs, including games • Not interfering with network systems and security, the data of another user or attempting to log into the network with a user name or password of another student. • Not deliberately bypassing the eduSTAR network via any method, e.g. using a VPN or...
Use of CCTV. 0.0.0.Xxxx detection and protection systems; 4.1.8.Power back-up and redundancy systems; and 4.1.9.Climate control systems.

Related to Use of CCTV

  • Use of Data by User Registry Operator will permit user to use the zone file for lawful purposes; provided that (a) user takes all reasonable steps to protect against unauthorized access to and use and disclosure of the data and (b) under no circumstances will Registry Operator be required or permitted to allow user to use the data to, (i) allow, enable, or otherwise support the transmission by email, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than user’s own existing customers, or (ii) enable high volume, automated, electronic processes that send queries or data to the systems of Registry Operator or any ICANN-­‐accredited registrar.

  • Use of Data (a) In connection with the provision of the services and the discharge of its other obligations under this Agreement, State Street (which term for purposes of this Section XXIX includes each of its parent company, branches and affiliates (''Affiliates")) may collect and store information regarding a Trust and share such information with its Affiliates, agents and service providers in order and to the extent reasonably necessary (i) to carry out the provision of services contemplated under this Agreement and other agreements between the Trusts and State Street or any of its Affiliates and (ii) to carry out management of its businesses, including, but not limited to, financial and operational management and reporting, risk management, legal and regulatory compliance and client service management.

  • Use of Software Any software that is available on the Services ("Software") is the copyrighted work of Red Hat and/or its licensors. Copying or reproducing the Software to any other server or location for further reproduction or redistribution is strictly prohibited, unless such reproduction or redistribution is permitted by a license agreement accompanying such Software. You may not create derivative works of the Software, or attempt to decompile or reverse-engineer the Software unless otherwise permitted by law. Use of the Software is subject to the license terms of any license agreement that may accompany or is provided with the Software. You may not download any Software until you have read and accepted the terms of the accompanying software license. WITHOUT LIMITING THE FOREGOING, THE SOFTWARE IS WARRANTED, IF AT ALL, ONLY ACCORDING TO THE TERMS OF THE SEPARATE LICENSE AGREEMENT ACCOMPANYING THE SOFTWARE. EXCEPT AS WARRANTED IN SUCH LICENSE AGREEMENT, RED HAT, ITS PARENT, SUBSIDIARY, AND AFFILIATE COMPANIES, AND ITS LICENSORS DISCLAIM ALL WARRANTIES AND CONDITIONS WITH REGARD TO THE SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT, TO THE MAXIMUM EXTENT PERMITTED BY LAW.

  • Use of Customer Data Verizon, Verizon Affiliates and their respective agents, may use, process and/or transfer Customer Data (including intra-group transfers and transfers to entities in countries that do not provide statutory protections for personal information) as set forth in the Privacy Policy and as necessary:

Time is Money Join Law Insider Premium to draft better contracts faster.