Workplace Technology Sample Clauses

Workplace Technology. SECTION 1. The parties recognize that workplace technology is a critical tool for performing the work of NOAA-GC, and that without adequate, functioning technology, the office cannot carry out its mission to provide timely legal services to NOAA clients. The parties recognize that technology used by attorneys in the bargaining unit is a significant supplement to the available services of paralegals, secretaries, and other support personnel. Office technology allows the attorneys to perform many support tasks associated with their work, create their own work product, and produce far more work than they could otherwise do. Management agrees to make best efforts to provide employees with necessary and appropriate workplace technology, including ergonomically sound equipment that takes account of individual needs.
AutoNDA by SimpleDocs
Workplace Technology. Workplace technology is electronic equipment and associated software and internet-based and computer systems that relate to an employee's methods and means of performing work.
Workplace Technology. As used in this Article, workplace technology means government furnished electronic equipment and associated software, tools, applications, and cloud/internet-based computer systems that relate to an employee's methods and means of performing work. Core USDA workplace technology is workplace technology acquired, installed, and maintained Department wide by Office of the Chief Information Officer/Client Experience Center (OCIO/CEC). Employees are not permitted to furnish their own workplace technology (including electronic equipment) for government use.
Workplace Technology. Procurement of County-owned workstations and devices Configuration of workstations to a standard specification Installation and configuration of standard and approved workstation software products and tools Administration, configuration and support of standard windows operating environments including Internet browsers Remote and onsite maintenance and support of standard workstation and desktop phone equipment Administration and support of enterprise productivity and collaboration tools such as email, the MS Office client suite, and the Office 365 online product suite Email account provisioning and administration including spam filtering and email encryption Administration and management of County user login credentials including Seamless Sign-On (SSO) to cloud based applications Provisioning and maintenance of virus and malware protection for a secure workstation computing environment Full lifecycle management of standard workstations including scheduled replacement Connectivity to County resources and the Internet through County wired and wireless network and remote access solutions Technical Support IT Service Desk support - 8:00 a.m. to 5:00 p.m. PST business days, excluding County holidays Network printer/print queue support Escalated IT support to Tier 2 / Tier 3 as part of Enterprise Technology, Enterprise Applications, and/or Application Support services Desktop Telephone Delivery and support of Unified Communications infrastructure UC features and functions including voicemail, messaging, presence indicators and conferencing (audio and video) Support of desktop telephones and equipment Local and long distance dialing Enterprise Infrastructure Technology Infrastructure and Integrity Server infrastructure Enterprise network infrastructure Cloud services ITIL change management process System backup and recovery Platform Services Office 365 management Cloud services integration Cloud services incident response processes Telephony Infrastructure and Call Tier Administration SIP infrastructure maintenance and support Long distance service E-911 services for emergency responders Fax / alarm lines Enterprise Cybersecurity Security infrastructure monitoring, reporting and alerting Regulatory compliance (CJIS, HIPAA, PCI) Cyber threat incident response planning Cyber threat predictive monitoring and analytics Data Storage High speed database storage Unstructured data storage (office files/images) Data backup services Networks and Connectivity Local Area Net...
Workplace Technology. The Employer shall not install or use software on employee’s computers, personal devices, or other Employer-issued devices for the purpose of observing an employee. Observation includes: ● Monitoring of employee keystroke or keystroke logging; ● Monitoring an employee’s location; ● Monitoring an employee through their computer’s camera or microphone; and/or ● Keeping track of the amount of time spent away from, or idle, at a computer. NYLAG shall not search through any employee’s personal technological devices that they bring onto NYLAG’s premises, except to enforce the policies set forth in (a) below, with advance notice when practicable. NYLAG may require employees to use NYLAG issued devices such as laptops/desktop computers for performing their job duties. For all other types of devices, employees shall be permitted to use their personal device to perform their job duties. Any work- related content on any such personal devices remains property of NYLAG. Nothing contained in this Article is intended to (a) supersede any of NYLAG’s policies, including but not limited to, the Anti-Harassment and Anti-Discrimination Policy, the Computer, Internet Email & Voicemail Usage policy, or any other NYLAG policy protecting NYLAG’s confidential information and property or to (b) prevent NYLAG from utilizing its case management, Go-To meeting, HRMS, or development systems (or similar type/replacement systems).
Workplace Technology 

Related to Workplace Technology

  • New Technology When new or updated technology is introduced into a workplace, it will be the responsibility of the employer to provide appropriate and, if necessary, ongoing training to the employees directly affected. Such training will include any health and safety implications or information that will enable employees to operate the equipment without discomfort and will help maintain their general well-being.

  • Technology Discoveries, innovations, Know-How and inventions, whether patentable or not, including computer software, recognized under U.S. law as intellectual creations to which rights of ownership accrue, including, but not limited to, patents, trade secrets, maskworks and copyrights developed under this Agreement.

  • Research Use The Requester agrees that if access is approved, (1) the PI named in the DAR and (2) those named in the “Senior/Key Person Profile” section of the DAR, including the Information Technology Director and any trainee, employee, or contractor1 working on the proposed research project under the direct oversight of these individuals, shall become Approved Users of the requested dataset(s). Research use will occur solely in connection with the approved research project described in the DAR, which includes a 1-2 paragraph description of the proposed research (i.e., a Research Use Statement). Investigators interested in using Cloud Computing for data storage and analysis must request permission to use Cloud Computing in the DAR and identify the Cloud Service Provider (CSP) or providers and/or Private Cloud System (PCS) that they propose to use. They must also submit a Cloud Computing Use Statement as part of the DAR that describes the type of service and how it will be used to carry out the proposed research as described in the Research Use Statement. If the Approved Users plan to collaborate with investigators outside the Requester, the investigators at each external site must submit an independent DAR using the same project title and Research Use Statement, and if using the cloud, Cloud Computing Use Statement. New uses of these data outside those described in the DAR will require submission of a new DAR; modifications to the research project will require submission of an amendment to this application (e.g., adding or deleting Requester Collaborators from the Requester, adding datasets to an approved project). Access to the requested dataset(s) is granted for a period of one (1) year, with the option to renew access or close-out a project at the end of that year. Submitting Investigator(s), or their collaborators, who provided the data or samples used to generate controlled-access datasets subject to the NIH GDS Policy and who have Institutional Review Board (IRB) approval and who meet any other study specific terms of access, are exempt from the limitation on the scope of the research use as defined in the DAR.

  • Third Party Technology Customer is hereby notified that third parties have licensed certain technology to Company, which is contained in the Software. Notwithstanding anything herein to the contrary, Customer hereby consents to the disclosure of Customer’s identity, and such other terms of this Agreement as necessary, to such third party licensors for the purpose of enabling Company to comply with the terms and conditions of such third party licenses. Any such Customer information will be provided pursuant to an obligation of confidentiality and nondisclosure at least as stringent as that imposed by this Agreement.

  • Background Technology List here prior contracts to assign Inventions that are now in existence between any other person or entity and you. [ ] List here previous Inventions which you desire to have specifically excluded from the operation of this Agreement. Continue on reverse side if necessary.

  • Licensed Technology The term “Licensed Technology” shall mean the Licensed Patent Rights, Licensed Know-How and Licensed Biological Materials.

  • Manufacturing Technology Transfer With respect to each Technology Transfer Product, upon AbbVie’s written request after the Inclusion Date for the Included Target to which such Technology Transfer Product is Directed, Morphic shall effect a full transfer to AbbVie or its designee (which designee may be an Affiliate or a Third Party manufacturer) of all Morphic Know-How and Joint Know-How relating to the then-current process for the Manufacture of such Technology Transfer Product (the “Manufacturing Process”) and to implement the Manufacturing Process at facilities designated by AbbVie (such transfer and implementation, as more fully described in this Section 5.3, the “Manufacturing Technology Transfer”). To assist with the Manufacturing Technology Transfer, Morphic will make its personnel reasonably available to AbbVie during normal business hours for up to [***] FTE hours with respect to each Included Target (in each case, free of charge to AbbVie) to transfer and implement the Manufacturing Process under this Section 5.3. Thereafter, if requested by AbbVie, Morphic shall continue to perform such obligations; provided, that AbbVie will reimburse Morphic for its full-time equivalent (FTE) costs (for clarity, in excess of [***] FTE hours) and any reasonable and verifiable out-of-pocket costs incurred in providing such assistance. CERTAIN CONFIDENTIAL INFORMATION CONTAINED IN THIS DOCUMENT, MARKED BY [***], HAS BEEN OMITTED BECAUSE IT IS NOT MATERIAL AND WOULD LIKELY CAUSE COMPETITIVE HARM TO THE COMPANY IF PUBLICLY DISCLOSED.

  • INTELLECTUAL PROPERTY RIGHTS - INVENTION AND PATENT RIGHTS Unless otherwise agreed upon by NASA and AFRL, custody and administration of inventions made (conceived or first actually reduced to practice) under this IAA will remain with the respective inventing Party. In the event an invention is made jointly by employees of the Parties (including by employees of a Party's contractors or subcontractors for which the U.S. Government has ownership), the Parties will consult and agree as to future actions toward establishment of patent protection for the invention.

  • Technology Access A. Contractor expressly acknowledges that state funds may not be expended in connection with the purchase of an automated information system unless that system meets certain statutory requirements relating to accessibility by persons with visual impairments. Accordingly, Contractor represents and warrants to System Agency that the technology provided to System Agency for purchase (if applicable under this Contract or any related Solicitation) is capable, either by virtue of features included within the technology or because it is readily adaptable by use with other technology, of:

  • Use of Technology Participants are subject to all existing laws (federal and state) and University regulations and policies on use of technology, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct such as:  UC Electronic Communications Policy: xxxx://xxxxxx.xxxx.xxx/doc/7000470/ElectronicCommunications  UCLA E-mail Policy and Guidelines: xxxx://xxx.xxxxxxxxxxxxx.xxxx.xxx/app/Default.aspx?&id=455  IT Services Acceptable Use Policy: xxxx://xxx.xxx.xxxx.xxx/policies/aupdetail.html  The UC Policy on Copyright Ownership: xxxx://xxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx.xxx/resources/copyright-ownership.html  Bruin OnLine Service Level Agreement: xxxx://xxx.xxx.xxxx.xxx/policies/BOL_SLA.pdf Any violation may result in technology related privileges being restricted or revoked and may also result in The University undertaking disciplinary or civil action. If the violation constitutes a criminal offense, appropriate legal action may be taken.

Time is Money Join Law Insider Premium to draft better contracts faster.