Workstation Observation Sample Clauses

Workstation Observation. There will be a minimum of three (3) direct workstation observations by members of a tenure-track faculty review team (faculty plus Area Xxxx or appropriate administrator). Whenever possible, observations should include different course preparations. A minimum of one (1) workstation observation must be completed before the mid-semester review meeting.
AutoNDA by SimpleDocs
Workstation Observation. A minimum of three (3) workstation observations will be conducted by members of the team.
Workstation Observation. Does not occur in Procedure B.
Workstation Observation. A workstation observation will occur in a minimum of one
Workstation Observation. A workstation observation will occur in a minimum of one (1) course preparation. The faculty member on the review team is required to do a workstation observation. The Area Xxxx and the ex-officio Department Chair have the option of performing a workstation observation. After consultation with the Area Xxxx and Department Chair, and approval of the Academic Senate President (or designee), a workstation observation may be carried out by a faculty member who is not on the peer review team.
Workstation Observation. There will be a minimum of three (3) direct workstation observations by members of a tenure-track faculty review team Deleted: This reflection is intended to xxxxxx a conversation and to facilitate discussion among colleagues that reflects on how faculty can individually and collectively work to improve student outcomes for historically under-represented groups and disproportionately impacted populations. The reflection should be used to help advance individual professional development and institutional dialogue on change. Deleted: The reflection document must not be used as evidence to support a less than satisfactory rating; however, nothing in the reflection process shall limit a performance review team's ability to address a faculty member's less than satisfactory performance issues utilizing evidence or information consistent with Section 8.15.1.2.¶

Related to Workstation Observation

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.

  • XXX Hosting 10.1 XXX Hosting is not required for resale in the BellSouth region.

  • Evaluation Software If the Software is an evaluation version or is provided to You for evaluation purposes, then, unless otherwise approved in writing by an authorized representative of Licensor, Your license to use the Software is limited solely for internal evaluation purposes in non-production use and in accordance with the terms of the evaluation offering under which You received the Software, and expires 90 days from installation (or such other period as may be indicated within the Software). Upon expiration of the evaluation period, You must discontinue use of the Software, return to an original state any actions performed by the Software, and delete the Software entirely from Your system and You may not download the Software again unless approved in writing by an authorized representative of Licensor. The Software may contain an automatic disabling mechanism that prevents its use after a certain period of time. RESTRICTIONS

  • Servers Marco backs up the following servers only: Windows Servers, SQL servers, Exchange server, and Virtual Machines images running VMWare or Hyper V.

  • Physical Fitness Program 42.1 The Joint Labor/Management Physical Fitness Committee consisting of four (4) members, two (2) appointed by the Chief of Department and two (2) appointed by the Union shall develop a physical fitness program for the Department to maintain and improve the health and fitness of members and reduce injuries. The employees appointed by the Union shall receive reasonable time off without loss of compensation or other benefits for the purpose of participating in meetings of the Joint Labor/Management Physical Fitness Committee.

  • Cell Phones The College follows the State’s Cell Phone Policy. Employees who receive cell phones from the College shall also abide by this Policy. The College shall provide the Policy to any employee who is given a cell phone. Employees are responsible for the cost of all personal calls. While the College anticipates some incidental personal use of cell phones, it is also expected that such use is infrequent.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

Time is Money Join Law Insider Premium to draft better contracts faster.