USE OF GOVERNMENT-FURNISHED COMPUTERS Sample Clauses

USE OF GOVERNMENT-FURNISHED COMPUTERS a. Computers furnished under this contract shall be used for official business only. Contractor personnel shall not use computers furnished under this contract for any use other than to perform the requirements of this contract. Contractor personnel shall not install any software on Government furnished computers unless consent is obtained from the KO or Contracting Officer's Representative (COR).
AutoNDA by SimpleDocs
USE OF GOVERNMENT-FURNISHED COMPUTERS. Computers furnished under this contract shall be used for official business only. Contractor personnel shall not use computers furnished under this contract for any use other than to perform the requirements of this contract. Contractor personnel shall not install any software on Government furnished computers unless consent is obtained from the KO or COR. Information services available on the Government furnished computers shall only be used for official business only. Examples of information services include DISA network (DISANet), Internet, Intranet, World Wide Web, and electronic mail. Access to Government information services is granted as a privilege, and use of such services constitutes consent to monitoring. Information services use will be monitored to ensure the protection of DoD networks and information and to verify and enforce compliance with this contractual requirement. In the event Contractor personnel use Government furnished computers and/or information services for other than official business, the Contractor shall be required to provide the Government with monetary consideration in the form of credits against the contract as determined by the KO. In addition, if requested by the KO, the Contractor shall be required to replace the individual who misused the Government furnished computers and/or information services within 10 working days. The following are examples of misuse of information services: Illegal, fraudulent, or malicious activities. Partisan political activity, political or religious lobbying or advocacy, or activities on behalf of organizations having no affiliation with DISA or DoD. Activities whose purposes are for personal or commercial financial gain. These activities may include chain letters, solicitation of business or services, sales of personal property. Unauthorized fundraising or similar activities, whether for commercial, personal, or charitable purposes. Accessing, storing, processing, displaying or distributing offensive or obscene material such as pornography and hate literature. Annoying or harassing another person, e.g., by sending or displaying uninvited e-mail of a personal nature or by using lewd or offensive language in an e-mail message. Using another person's account or identity without his or her explicit permission, e.g., by forging e-mail. Viewing, damaging, or deleting files or communications belonging to others without appropriate authorization or permission. Permitting any unauthorized person to ...

Related to USE OF GOVERNMENT-FURNISHED COMPUTERS

  • Level of Government Central Government Measures: Foreign Exchange and Foreign Trade Law (Law No. 228 of 1949), Article 27 Cabinet Order on Foreign Direct Investment (Cabinet Order No. 261 of 1980), Article 3 Civil Aeronautics Law (Law No. 231 of 1952), Chapters 7 and 8 Description:

  • U.S. Government End Users The Software is a "commercial item," as that term is defined in 48 C.F.R. 2.101 (Oct. 1995), consisting of "commercial computer software" and "commercial computer software documentation," as such terms are used in 48 C.F.R. 12.212 (Sept. 1995). Consistent with 48 C.F.R. 12.212 and 48 C.F.R. 227.7202-1 through 227.7202-4 (June 1995), all U.S. Government End Users acquire the Software with only those rights set forth herein.

  • Use of Customer Data Verizon, Verizon Affiliates and their respective agents, may use, process and/or transfer Customer Data (including intra-group transfers and transfers to entities in countries that do not provide statutory protections for personal information) as set forth in the Privacy Policy and as necessary:

  • USE OF CONTRACT BY OTHER GOVERNMENT AGENCIES At the option of the Contractor, the use of the contract resulting from this solicitation may be extended to other governmental agencies, including the State of Florida, its agencies, political subdivisions, counties, and cities. Each governmental agency allowed by the Contractor to use this contract shall do so independent of any other governmental entity. Each agency shall be responsible for its own purchases and shall be liable only for goods or services ordered, received and accepted. No agency receives any liability by virtue of this bid and subsequent contract award.

  • Use of Customer Statements The Contractor shall not use any statement attributable to the Customer or its employees for the Contractor’s promotions, press releases, publicity releases, marketing, corporate communications, or other similar communications, without first notifying the Customer’s Contract Manager and securing the Customer’s prior written consent.

  • GOVERNMENT-FURNISHED PROPERTY (1) The Government shall deliver to the Contractor the Government-furnished property described in this contract. The Government shall furnish related data and information needed for the intended use of the property. The warranties of suitability of use and timely delivery of Government-furnished property do not apply to property acquired or fabricated by the Contractor as contractor-acquired property and subsequently transferred to another contract with this Contractor.

Time is Money Join Law Insider Premium to draft better contracts faster.