VIRUS INFECTIONS AND HACKED COMPUTERS Sample Clauses

VIRUS INFECTIONS AND HACKED COMPUTERS. Computers that become infected by a virus or have been hacked often contribute to network and Internet congestion. They also cause infections and problems with other U of M computers. Residents who have a hacked or virus infected computer will have their Internet connection suspended immediately upon detection. After the student’s Internet connection has been suspended, Student Residences will attempt to contact and inform the resident about the situation. The resident’s Internet connection will be restored when the Student Residences IT Administrator or IT Coordinator is confident that the resident’s computer no longer poses a risk to the U of M network, nor to the U of M faculty/staff/students.
AutoNDA by SimpleDocs

Related to VIRUS INFECTIONS AND HACKED COMPUTERS

  • Infectious Diseases The Employer and the Union desire to arrest the spread of infectious diseases in the nursing home. To achieve this objective, the Joint Health and Safety Committee may review and offer input into infection control programs and protocols including surveillance, outbreak control, isolation, precautions, worker education and training, and personal protective equipment. The Employer will provide training and ongoing education in communicable disease recognition, use of personal protective equipment, decontamination of equipment, and disposal of hazardous waste.

  • Demographic, Classification and Wage Information XXXXXX agrees to coordinate the accumulation and distribution of demographic, classification and wage data, as specified in the Letter of Understanding dated December 14, 2011, to CUPE on behalf of Boards of Education. The data currently housed in the Employment Data and Analysis Systems (EDAS) will be the source of the requested information.

  • Infectious Disease Where an employee produces documentary evidence that:

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Virus detection You will be responsible for the installation and proper use of any virus detection/scanning program we require from time to time.

  • Geological and Archeological Specimens If, during the execution of the Work, the Contractor, any Subcontractor, or any servant, employee, or agent of either should uncover any valuable material or materials, such as, but not limited to, treasure trove, geological specimens, archival material, archeological specimens, or ore, the Contractor acknowledges that title to the foregoing is vested in the Owner. The Contractor shall notify the Owner upon the discovery of any of the foregoing, shall take reasonable steps to safeguard it, and seek further instruction from the Design Professional. Any additional cost incurred by the Contractor shall be addressed under the provision for changed conditions. The Contractor agrees that the Geological and Water Resources Division and the Historic Preservation Division of the Georgia Department of Natural Resources may inspect the Work at reasonable times.

Time is Money Join Law Insider Premium to draft better contracts faster.