General Use and Ownership Sample Clauses

General Use and Ownership. 1. Authorized users should be aware that the data they create on systems remains the property of the Diocesan entity. Because of the need to protect the network, management cannot guarantee the confidentiality of information stored on any network device belonging to a Diocesan entity.
AutoNDA by SimpleDocs
General Use and Ownership. A. Department, Agency, and NJOIT:
General Use and Ownership. 1. PrimeGov proprietary information stored on electronic and computing devices whether owned or leased by XxxxxXxx, the employee or a third party, remains the sole property of XxxxxXxx. You must ensure through legal or technical means that proprietary information is protected.
General Use and Ownership. 4.1.1. Users will have no expectation of privacy with any GRMC computing resource.
General Use and Ownership. 1. While City of Durango’s network administration desires to provide a reasonable level of privacy, users should be aware that the data they create on city systems remains the property of the City of Durango. The City of Durango reserves the right to audit networks and systems on a periodic basis to ensure compliance with this policy. General Security Acceptable Use
General Use and Ownership. 1. While Allscripts network administration desires to provide a reasonable level of privacy, users should be aware that the data they create on the corporate systems remains the property of Allscripts. Because of the need to protect Allscripts’ network, management cannot guarantee the confidentiality of information stored on any network device belonging to Allscripts.
General Use and Ownership. IT resources are the property of MAC Inc. Authorized Users may use IT resources for incidental personal use and in support of the business and academic mission of MAC Inc. It is the responsibility of each Authorized User to know and comply with this agreement and security standards published by IT. This responsibility includes protecting the privacy and security of passwords, and using IT resources solely for their intended purposes. Authorized Users are solely responsible for their use of IT resources, and may not represent or imply that their associated use constitutes the views or policies of MAC Inc. Communications originating from the Authorized User are identified as such and the Authorized User assumes responsibility for all communication originating from equipment or accounts assigned to that User. In the event of a security breach related to User accounts or equipment, the User shall immediately report and correct the situation. Authorized MAC Inc. IT officials may monitor and access systems, network traffic and Electronic Equipment for maintenance, operation, security, quality of service, business related purposes (such as audits), to investigate an alleged violation of this agreement, and for agreement or legal compliance. An Authorized User’s privacy will be preserved to the extent possible, subject to MAC Inc.’s administrative, business and legal obligations. There should be no expectation of privacy in the material sent or received when using IT resources or third-party vendor applications provided by MAC Inc.
AutoNDA by SimpleDocs
General Use and Ownership. 1. While University of Louisiana at Lafayette's Information Technology Divisions desire to provide a reasonable level of privacy, users should be aware that the data they create on the university systems remains the property of University of Louisiana at Lafayette. Because of the need to protect University of Louisiana at Lafayette's network, management cannot guarantee the confidentiality of information stored on any device that is owned or leased or under direct control of the University of Louisiana at Lafayette.
General Use and Ownership. 4.1.1 Labster proprietary information stored on electronic and computing devices whether owned or leased by Labster, the employee or a third party, remains the sole property of Labster. You must ensure through legal or technical means that proprietary information is protected in accordance with the Password Protection Policy.
General Use and Ownership. 1. Users should be aware that the data they create on the corporate systems remains the property of Xxxxxxxx Central School Corporation. Because of the need to protect Xxxxxxxx Central School Corporation 's network, Xxxxxxxx Central School Corporation does not and will not guarantee the confidentiality of information stored on any network device belonging to Xxxxxxxx Central School Corporation .
Time is Money Join Law Insider Premium to draft better contracts faster.