Electronic Information Resources Sample Clauses

Electronic Information Resources. If the College is considering any change to Policy 1760, the Association will be invited to participate in those discussions. The Association shall have the right to use bulletin boards or display spaces in buildings housing four (4) or more faculty.
AutoNDA by SimpleDocs
Electronic Information Resources. Introduction: Electronic information resources are available to qualifying School Board Members in the Wrangell Public School District. These resources include access to the Internet and other network files or accounts. Our goal in providing electronic services to staff is to promote educational excellence by facilitating resource sharing, innovation, and communication. To obtain an electronic mail account and Internet access, all School Board Members must return this form to the school office. Worldwide access to computers and people may involve the availability of materials considered to be inappropriate, illegal, or of no educational value. However, through an electronic filtering and monitoring system the District will be taking precautions to restrict access to inappropriate materials. Users that access, publish or attempt to access or publish inappropriate materials or illegal Internet sites will be subject to discipline. Board Member usage of computers will be monitored through means and methods determined appropriate by the district.
Electronic Information Resources. The Board of Directors of the Xxxxxxx City Community School District is committed to making available to students and staff members access to a wide range of electronic information resources, equipment, and software, including computers, a wide area network, local area network, and the internet. The goal in providing this technology and access is to support the educational objectives and mission of the Xxxxxxx City Community School District and to promote resource sharing, innovation, problem solving, and communication. The District’s computers, network, and/or internet connection is not a public access service or a public forum. The District has the right to place reasonable restrictions on the material created, accessed, transmitted, and/or posted through the use of its computers, network, and/or internet connection. The District’s computers, network, and/or internet connection are the property of the District and no student or staff member shall have any expectation of privacy in any materials therein. Access to the District’s computers, network, and the internet shall be available to all students and staff within the District. However, access is a privilege, not a right. Each student and staff member must have an acceptable use agreement on file prior to having access to using the District’s computers, network, and the internet. The amount of time and type of access available for each student and staff member may be limited by the District’s technology and the demands for the use of the District’s technology. Even if students have not been given access to and/or use of the District’s computers, network, and the internet, they may still be exposed to information from the District’s computers, network, and/or the internet in guided curricular activities at the discretion of their teachers. Every computer in the District having internet access shall not be operated unless internet access from the computer is subject to a technology protection measure (i.e. filtering software). The technology protection measure employed by the District shall be designed and operated with the intent to ensure that users are not accessing inappropriate sites, as required by the Children’s Internet Protection Act, that have visual depictions that include obscenity, child pornography or, with respect to student users, are otherwise harmful to minors. The technology protection measure may only be disabled for an adult’s use if such use is for bona fide research or other lawful ...

Related to Electronic Information Resources

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • - CLEC INFORMATION CLEC agrees to work with Qwest in good faith to promptly complete or update, as applicable, Qwest’s “New Customer Questionnaire” to the extent that CLEC has not already done so, and CLEC shall hold Qwest harmless for any damages to or claims from CLEC caused by CLEC’s failure to promptly complete or update the questionnaire.

  • Basic Information The Agent will thoroughly familiarize itself with the character, location, construction, layout, plan and operation of the Project, and especially the electrical, plumbing, air-conditioning and ventilating systems, the elevators and all other mechanical equipment.

  • Electronic Access Access by the Customer to certain systems, applications or products of Bank shall be governed by this Agreement and the terms and conditions set forth in Annex A Electronic Access.

  • Confidentiality and Safeguarding of University Records; Press Releases; Public Information Under this Agreement, Contractor may (1) create, (2) receive from or on behalf of University, or (3) have access to, records or record systems (collectively, University Records). Among other things, University Records may contain social security numbers, credit card numbers, or data protected or made confidential or sensitive by Applicable Laws. [Option (Include if University Records are subject to FERPA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Family Educational Rights and Privacy Act, 20 United States Code (USC) §1232g (FERPA) are addressed in Section 12.41.] [Option (Include if University is a HIPAA Covered Entity and University Records are subject to HIPAA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Health Insurance Portability and Accountability Act and 45 Code of Federal Regulations (CFR) Part 160 and subparts A and E of Part 164 (collectively, HIPAA) are addressed in Section 12.26.] Contractor represents, warrants, and agrees that it will: (1) hold University Records in strict confidence and will not use or disclose University Records except as (a) permitted or required by this Agreement, (b) required by Applicable Laws, or (c) otherwise authorized by University in writing; (2) safeguard University Records according to reasonable administrative, physical and technical standards (such as standards established by the National Institute of Standards and Technology and the Center for Internet Security [Option (Include if Section 12.39 related to Payment Card Industry Data Security Standards is not include in this Agreement.):, as well as the Payment Card Industry Data Security Standards]) that are no less rigorous than the standards by which Contractor protects its own confidential information; (3) continually monitor its operations and take any action necessary to assure that University Records are safeguarded and the confidentiality of University Records is maintained in accordance with all Applicable Laws and the terms of this Agreement; and (4) comply with University Rules regarding access to and use of University’s computer systems, including UTS165 at xxxx://xxx.xxxxxxxx.xxx/board-of-regents/policy-library/policies/uts165-information-resources-use-and-security-policy. At the request of University, Contractor agrees to provide University with a written summary of the procedures Contractor uses to safeguard and maintain the confidentiality of University Records.

  • Patient Information Each Party agrees to abide by all laws, rules, regulations, and orders of all applicable supranational, national, federal, state, provincial, and local governmental entities concerning the confidentiality or protection of patient identifiable information and/or patients’ protected health information, as defined by any other applicable legislation in the course of their performance under this Agreement.

  • Information Safeguards Business Associate will develop, document, implement, maintain and use appropriate administrative, technical and physical safeguards to preserve the integrity and confidentiality of and to prevent non-permitted use or disclosure of PHI created for or received from Recipient or its Subsidiaries. These safeguards must be appropriate to the size and complexity of Business Associate’s operations and the nature and scope of its activities. Business Associate agrees that these safeguards will meet any applicable requirements set forth by the U.S. Department of Health and Human Services, including (as of the effective date or as of the compliance date, whichever is applicable) any requirements set forth in the final HIPAA security regulations. Business Associate agrees to mitigate, to the extent practicable, any harmful effect that is known to Business Associate resulting from a use or disclosure of PHI by Business Associate in violation of the requirements of this Addendum.

  • Alert Information As Alerts delivered via SMS, email and push notifications are not encrypted, we will never include your passcode or full account number. You acknowledge and agree that Alerts may not be encrypted and may include your name and some information about your accounts, and anyone with access to your Alerts will be able to view the contents of these messages.

  • Contact Information for Privacy and Security Officers and Reports 2.1 Business Associate shall provide, within ten (10) days of the execution of this Agreement, written notice to the Contract or Grant manager the names and contact information of both the HIPAA Privacy Officer and HIPAA Security Officer of the Business Associate. This information must be updated by Business Associate any time these contacts change.

  • Personal Data, Confidentiality, Recording of Telephone Calls and Records 22.1. The Company may collect client information directly from the Client (in his completed Account Opening Application Form or otherwise) or from other persons including, for example, the credit reference agencies, fraud prevention agencies, banks, other financial institutions, third authentication service providers and the providers of public registers.

Time is Money Join Law Insider Premium to draft better contracts faster.