Laptops Left at Home Sample Clauses

The "Laptops Left at Home" clause establishes the rules and responsibilities regarding company-issued laptops that employees leave at their residences rather than bringing to the workplace. Typically, this clause outlines whether employees are permitted to keep laptops at home, any security measures they must follow, and the procedures for reporting loss or damage that occurs while the device is offsite. Its core function is to clarify liability and set expectations for safeguarding company property, thereby reducing the risk of data breaches or equipment loss when devices are not on company premises.
Laptops Left at Home. If students leave their laptop at home, they must immediately make arrangements to retrieve the laptop before the school day begins. Repeat violations of this policy will result in disciplinary action.
Laptops Left at Home. If a student leaves her laptop at home, she must immediately notify her parents to bring the laptop to school. Loaner laptops will not be available for laptops left at home. Work may be printed from the student’s Google Drive or from a USB drive on another school computer with permission from the student’s teacher if the work is due before the laptop is delivered.

Related to Laptops Left at Home

  • Workstation/Laptop encryption All workstations and laptops that process and/or store County PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Security Office.

  • Computers All computers, hardware, software, computer upgrades and maintenance in connection therewith shall be at Owner's expense.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • Searchability Offering searchability capabilities on the Directory Services is optional but if offered by the Registry Operator it shall comply with the specification described in this section. 1.10.1 Registry Operator will offer searchability on the web-­‐based Directory Service. 1.10.2 Registry Operator will offer partial match capabilities, at least, on the following fields: domain name, contacts and registrant’s name, and contact and registrant’s postal address, including all the sub-­‐fields described in EPP (e.g., street, city, state or province, etc.). 1.10.3 Registry Operator will offer exact-­‐match capabilities, at least, on the following fields: registrar id, name server name, and name server’s IP address (only applies to IP addresses stored by the registry, i.e., glue records). 1.10.4 Registry Operator will offer Boolean search capabilities supporting, at least, the following logical operators to join a set of search criteria: AND, OR, NOT. 1.10.5 Search results will include domain names matching the search criteria. 1.10.6 Registry Operator will: 1) implement appropriate measures to avoid abuse of this feature (e.g., permitting access only to legitimate authorized users); and 2) ensure the feature is in compliance with any applicable privacy laws or policies.