Network Policies Sample Clauses

Network Policies. All users must abide by rules of network etiquette which include:
AutoNDA by SimpleDocs
Network Policies. Anonymous connections must be disabled. Network listening services not provided by software on the approved list must be stopped or uninstalled. Minimum session security for NTLM SSP based (including secure RPC) clients: • Require message integrity • Require message confidentiality • Require NTLMv2 session security • Require 128-bit encryption
Network Policies. All users must abide by rules of network etiquette which include: Use appropriate language. Do not use profanity, obscenity or other language which may be offensive to other users. Illegal activities are strictly forbidden. Do not reveal your personal home address or phone number or any personally identifiable information (including educational records) of students or colleagues. Note that electronic mail (e-mail) is not guaranteed to be private. The Technology Director has access to all messages. Any messages regarding illegal activities will be reported to authorities. Use of the computer and/or network is not for financial gain or for any commercial or illegal activity. The network should not be used in such a way that it disrupts the use of the network by others. All communications and information accessible via the network should be assumed to be property of the District. Rules and regulations of online etiquette are subject to change by the administration and will be published accordingly. The user in whose name an online service account is issued is responsible for its proper use at all times. Users shall keep personal account numbers and passwords private. They shall use this system only under the account numbers issued by the District unless authorized by the Building Principal, Technology Director, Superintendent, or Supervisor. The system shall be used only for purposes related to education or administration. Commercial, political and/or personal use of the system is strictly prohibited. The administration reserves the right to monitor any computer activity and online communications for improper use. Users shall not use the system to encourage the use of drugs, alcohol or tobacco nor shall they promote unethical practices or any activity prohibited by law or Board policy. Users shall not view, download or transmit material that is threatening, obscene, disruptive or sexually explicit or that could be construed as harassment, bullying or disparagement of others based on their race, color, national origin, citizenship status, sex, sexual orientation, age, disability, religion, economic status, military status, political beliefs or any other personal or physical characteristics. Copyrighted material may not be placed on the system without the author’s permission. Vandalism results in the cancellation of user privileges. Vandalism includes uploading/downloading any inappropriate material, creating computer viruses and/or any malicious attempt to har...
Network Policies. As part of the implementation of the Transition Plan, Network Operator shall in consultation with MassTech review and update existing Network Policies, and where necessary, develop new ones. Except as provided in Section 4.6, within one hundred and twenty (120) Days after the Effective Date, Network Operator shall propose new or revised Network Policies to MassTech for approval, which shall go into effect as of the Commencement Date. The Network Policies shall reflect and be consistent with the requirements and policy objectives of the RFP and MassTech. The updated and approved Network Policies shall be compiled and set out in Exhibit J.

Related to Network Policies

  • Personnel Policies The School shall adopt, update, and adhere to personnel policies. These policies must be made readily accessible from the School’s website or school office, as described in Section 11.4.1. If the policy is not available from the School’s website, the School shall submit the current policy to the Commission.

  • SECURITY POLICIES AND NOTIFICATIONS State Security Policies and Procedures The Contractor and its personnel shall review and be familiar with all State security policies, procedures and directives currently existing or implemented during the term of the Contract, including ITS Policy NYS-P03-002 Information Security Policy (or successor policy). Security Incidents Contractor shall address any Security Incidents in the manner prescribed in ITS Policy NYS-P03-002 Information Security Policy (or successor policy), including the New York State Cyber Incident Reporting Procedures incorporated therein or in such successor policy.

  • Privacy Policies Each party will make available a Privacy Policy that complies with Law. Xxxxxx’s Privacy Policy explains how and for what purposes Stripe collects, uses, retains, discloses and safeguards the Personal Data you provide to Stripe.

  • Personnel Policy Employees of the Parties to this Agreement shall be subject to the personnel rules, laws and regulations of their respective agencies, unless they are employed temporarily by another Party to this Agreement and the authority under which such temporary employment is authorized provides that such employees shall be subject to the employing Party’s personnel laws and regulations.

  • Overpayment Policies and Procedures Within 90 days after the Effective Date, Xxxxx shall develop and implement written policies and procedures regarding the identification, quantification and repayment of Overpayments received from any Federal health care program.

  • Policies and Procedures i) The policies and procedures of the designated employer apply to the employee while working at both sites.

  • SPAM POLICY You are strictly prohibited from using the Website or any of the Company's Services for illegal spam activities, including gathering email addresses and personal information from others or sending any mass commercial emails.

  • Consensus Policies (i) At all times during the term of this Agreement and subject to the terms hereof, Registry Operator will fully comply with and implement all Consensus Policies found at xxxx://xxx.xxxxx.xxx/general/consensus- policies.htm, as of the Effective Date and as may in the future be developed and adopted in accordance with ICANN’s Bylaws and as set forth below.

  • University Policies Contractor shall, at no additional cost to the University, comply with all policies and procedures of the University. Current policies are available at xxxx://xxxxxx.xxxxx.xxx/ and include without limitation, the University’s smoking policy available at xxxx://xxxxxx.xxxxx.xxx/2011/06/02/smoking/. In the event the University establishes new policies or procedures following execution of the contract, or makes modifications to policies or procedures in existence at the time of contract execution, Contractor shall comply with such new or modified policies or procedures upon written notice.

  • Umbrella Policies Contractor may satisfy basic coverage limits through any combination of basic coverage and umbrella insurance.

Time is Money Join Law Insider Premium to draft better contracts faster.