COMPUTER WORKSTATIONS Sample Clauses

COMPUTER WORKSTATIONS. Section 1. The university will make a good-faith effort to create and maintain safe computer workstations.
AutoNDA by SimpleDocs
COMPUTER WORKSTATIONS. Work stations within the Bloustein School and Heldrich Center are secured using hardened baseline images, multiple endpoint security programs (Symantec Endpoint Protection and Malwarebytes) with console based monitoring solutions along with limited rights policies that prevent end users from making changes on the systems. These systems are also scanned regularly for sensitive data to ensure that secure data is not being saved locally. This scanning is currently being upgraded to an agent based solution to improve Data Loss Prevention efforts.
COMPUTER WORKSTATIONS. The Employer shall give consideration to appropriate NIOSH recommendations specific to the purchase, installation and operation of computer workstations. The Employer agrees to comply with all state and federal regulations related to the installation and utilization of computer workstations.
COMPUTER WORKSTATIONS. Participating Partner shall have or retain sole ownership of computer workstations and other infrastructure utilized pursuant to this Agreement.
COMPUTER WORKSTATIONS. 65 10 ARTICLE 47: EDUCATION, TRAINING, AND DEVELOPMENT ...................................................................... 65 11 ARTICLE 48: UNIFORMS, PROTECTIVE CLOTHING, FOOTWEAR AND TOOLS ........................................ 66 12 ARTICLE 49:

Related to COMPUTER WORKSTATIONS

  • COMPUTER SOFTWARE The Grantee certifies that it has appropriate systems and controls in place to ensure that state funds will not be used in the performance of this Grant Agreement for the acquisition, operation, or maintenance of computer software in violation of copyright laws.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Computer Equipment No computers and/or personal electronic devices, such as tablets and laptop computers, or any component thereof, may be purchased with funds provided under this Contract, regardless of purchase price, without prior written approval of ADMINISTRATOR. Any such purchase shall be in accordance with specifications provided by ADMINISTRATOR, be subject to the same inventory control conditions specified above in Subparagraphs 18.1.1 to 18.1.4, and, at the sole discretion of ADMINISTRATOR, become the property of COUNTY upon termination of this Contract.

  • COMMERCIAL COMPUTER SOFTWARE If performance involves acquisition of existing computer software, the following Company Exhibit is incorporated by reference: CCS Commercial Computer Software License (Company – July 2010).

  • Software Title and ownership to Existing Software Product(s) delivered by Contractor under the Contract that is normally commercially distributed on a license basis by the Contractor or other independent software vendor proprietary owner (“Existing Licensed Product”), embedded in the Custom Products, shall remain with Contractor or the proprietary owner of other independent software vendor(s) (ISV). Effective upon acceptance, such Product shall be licensed to Authorized User in accordance with the Contractor or ISV owner’s standard license agreement, provided, however, that such standard license, must, at a minimum: (a) grant Authorized User a non-exclusive, perpetual license to use, execute, reproduce, display, perform, adapt (unless Contractor advises Authorized User as part of Contractor’s proposal that adaptation will violate existing agreements or statutes and Contractor demonstrates such to the Authorized User’s satisfaction) and distribute Existing Licensed Product to the Authorized User up to the license capacity stated in the Purchase Order or work order with all license rights necessary to fully effect the general business purpose(s) stated in the Bid or Authorized User’s Purchase Order or work order, including the financing assignment rights set forth in paragraph (c) below; and (b) recognize the State of New York as the licensee where the Authorized User is a state agency, department, board, commission, office or institution. Where these rights are not otherwise covered by the ISV’s owner’s standard license agreement, the Contractor shall be responsible for obtaining these rights at its sole cost and expense. The Authorized User shall reproduce all copyright notices and any other legend of ownership on any copies authorized under this clause. Open source software is developed independently of Contractor and may be governed by a separate license (“open source software”). If the open source software is governed by a separate License and provided under this Contract, Contractor shall provide a copy of that license in the applicable Documentation and the Authorized User's license rights and obligations with respect to that open source software shall be defined by those separate license terms and subject to the conditions, if any, therein. Nothing in this Contract shall restrict, limit, or otherwise affect any rights or obligations the Authorized User may have, or conditions to which the Authorized User may be subject, under such separate open source license terms.

Time is Money Join Law Insider Premium to draft better contracts faster.