Software and File Management General Information Clause Samples

The "Software and File Management General Information" clause outlines the basic rules and expectations regarding the handling, storage, and use of software and digital files within a particular context, such as a workplace or project. It typically covers aspects like authorized software usage, file organization standards, and responsibilities for maintaining data integrity and security. By establishing these guidelines, the clause helps ensure that all parties manage digital resources consistently and securely, reducing the risk of data loss, unauthorized access, or operational inefficiencies.
Software and File Management General Information a. Tablets come with a standard pre-loaded software image. This image may not be altered by students or parents. b. Do not remove any software or change computer settings, unless directed by school staff. c. Software applications may be installed by members of the Sterling High School technology services department. d. The software installed by Sterling High School must be left in usable condition by users of the tablet. e. Do not change the computer name. f. Do not remove or change operating system extensions. g. Do not attempt to circumvent any security restrictions or security settings on the computer. h. The school does not accept responsibility for the loss of any data deleted due to re-imaging or maintenance performed on the tablet. i. Periodic software updates will automatically install on the tablets as they become available.
Software and File Management General Information a. Laptops come with a standard pre‐loaded software image. This image may not be altered by students or parents. b. Do not remove any software or change computer settings, unless directed by school staff. c. Software applications may be installed by members of the MTPS technology services department. d. The software installed by MTPS must be left in usable condition by users of the laptop. e. Do not change the computer name. f. Do not remove or change operating system extensions. g. Do not attempt to circumvent any security restrictions or security settings on the computer. h. The school does not accept responsibility for the loss of any data deleted due to re­imaging or maintenance performed on the laptop. i. Periodic software updates will automatically install on the laptops as they become available. The MooreNet Acceptable Usage Agreement states that students are expected to comply with ethical‐use guidelines and abide by the federal copyright laws. Music, videos, and games may not be downloaded, installed, or saved to the hard drive. Music and games can be disruptive during class and may not be used in school unless the student has permission from the teacher for an educational project. Do not delete any folders or files that you did not create or that you do not recognize. Deletion of files could interfere with the functionality of the laptop. a. Students are expected to use their MTPS Google account (@▇▇▇▇.▇▇) and Google Drive to save school­related files. b. Students may use the “My documents” folder as well as the computer’s desktop for temporarily saving files, but note that those locations are NOT backed up and files saved there WILL BE LOST if the laptop needs to be reimaged and MAY BE LOST if technical staff need to troubleshoot the computer. c. Students’ “P­drive” on the MTPS computer network may be used for saving files, but note that the P­Drive is NOT ACCESSIBLE FROM THE INTERNET so files saved there will not be accessible from home. d. The use of thumbdrives or other external storage media is not recommended. The laptop is equipped with a standard screensaver and wallpaper which should not be modified. Students will log in using their assigned usernames and passwords. Students will not share their password with others. Sound will be muted at all times at school unless permission is granted. Headphones can be used in class with given permission from the teacher. a. Help conserve our instructional resources by using “print preview” or digita...
Software and File Management General Information. ● Devices come with pre-installed software and may not be altered by students or parents. ● Do not change device settings, unless directed by school staff. ● Software applications may be installed by members of the Somerdale School District technology services department remotely during the course of the school year at any time. ● Do not attempt to circumvent any security restrictions or security settings on the chromebook. ● The school does not accept responsibility for the loss of any data deleted due to resetting or maintenance performed on the device while it is under repair by the technology department.. ● Periodic software updates will automatically be installed on the devices as they become available.
Software and File Management General Information a. Chromebooks come with a standard pre-loaded image. This image may not be altered or changed in any way. b. Do not remove or add any software or change computer settings, unless directed. c. All software must be approved and installed by Kingsway or South ▇▇▇▇▇▇▇▇ School Districts. d. The school does not accept responsibility for the loss of any data deleted due to re- imaging Chromebooks
Software and File Management General Information a. Chromebooks come with a standard pre-loaded image. This image may not be altered or changed in any way. b. Do not remove or add any software or change computer settings, unless directed. c. All software must be approved and installed by Merchantville School. d. The school does not accept responsibility for the loss of any data deleted due to re-imaging chromebooks. The Merchantville Acceptable Usage Policy and Internet Safety Agreement states that students are expected to comply with ethical-use guidelines and abide by the federal copyright laws. Music, videos, and games may not be downloaded, installed, or saved to the hard drive. Music and games can be disruptive during class and may not be used in school unless the student has permission from the teacher for an educational project. Students’ “Google Drive” folders will give students access to storage space through a unique student login Students can individualize their wallpaper/screensaver as long as the image is not offensive or inappropriate. Students will login under their assigned usernames and passwords. Students will not share their password with others. Sound will be muted at all times at school unless permission is granted. Headphones can be used in class with expressed permission from the teacher. Printing cannot be done from Chromebooks at Merchantville School.
Software and File Management General Information a. Laptops come with a standard pre-loaded image. This image may not be altered or changed in any way. b. Do not remove or add any software or change computer settings, unless directed. c. All software must be approved and installed by West Deptford Public School. d. Do not change the computer name. e. Do not remove or change operating system extensions f. The school does not accept responsibility for the loss of any data deleted due to re-imaging laptops.
Software and File Management General Information a. Chromebooks come with a standard pre-loaded image. This image may not be altered or changed in any way. b. Do not remove or add any software or change computer settings, unless directed. c. All software must be approved and installed by West Deptford Public School. d. The school does not accept responsibility for the loss of any data deleted due to re-imaging chromebooks. The West Deptford Acceptable Usage Policy and Internet Safety Agreement states that students are expected to comply with ethical-use guidelines and abide by the federal copyright laws. Music, videos, and games may not be downloaded, installed, or saved to the hard drive. Music and games can be disruptive during class and may not be used in school unless the student has permission from the teacher for an educational project. Students’ “Google Drive” folders will give students access to storage space through a unique student login Students can individualize their wallpaper/screensaver as long as the image is not offensive or inappropriate. Students will login under their assigned usernames and passwords. Students will not share their password with other students.

Related to Software and File Management General Information

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes. 11.2 We may (i) compile statistical and other information related to the performance, operation and use of the Services, and (ii) use data from the Services in aggregated form for security and operations management, to create statistical analyses, and for research and development purposes (clauses i and ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly available; however, Service Analyses will not incorporate Your Content, Personal Data or Confidential Information in a form that could serve to identify You or any individual. We retain all intellectual property rights in Service Analyses. 11.3 We may provide You with the ability to obtain certain Oracle Software (as defined below) for use with the Services. If we provide Oracle Software to You and do not specify separate terms for such software, then such Oracle Software is provided as part of the Services and You have the non-exclusive, worldwide, limited right to use such Oracle Software, subject to the terms of this Agreement and Your order (except for separately licensed elements of the Oracle Software, which separately licensed elements are governed by the applicable separate terms), solely to facilitate Your use of the Services. You may allow Your Users to use the Oracle Software for this purpose, and You are responsible for their compliance with the license terms. Your right to use any Oracle Software will terminate upon the earlier of our notice (by web posting or otherwise) or the end of the Services associated with the Oracle Software. Notwithstanding the foregoing, if Oracle Software is licensed to You under separate terms, then Your use of such software is governed by the separate terms. Your right to use any part of the Oracle Software that is licensed under the separate terms is not restricted in any way by this Agreement.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Access to Financial Information Buyer’s representatives shall have access to, and Seller and its Affiliates shall cooperate with Buyer and furnish upon request, all financial and other information relating to the Hotel’s operations to the extent necessary to enable Buyer’s representatives to prepare audited financial statements in conformity with Regulation S-X of the Securities and Exchange Commission (the “SEC”) and other applicable rules and regulations of the SEC and to enable them to prepare a registration statement, report or disclosure statement for filing with the SEC on behalf of Buyer or its Affiliates, whether before or after Closing and regardless of whether such information is included in the Records to be transferred to Buyer hereunder. Seller shall also provide to Buyer’s representative a signed representation letter in form and substance reasonably acceptable to Seller sufficient to enable an independent public accountant to render an opinion on the financial statements related to the Hotel. Buyer will reimburse Seller for costs reasonably incurred by Seller to comply with the requirements of the preceding sentence to the extent that Seller is required to incur costs not in the ordinary course of business for third parties to provide such representation letters. The provisions of this Section shall survive Closing or termination of this Contract.

  • Billing Information 6.1 NLT and the RL shall provide each other with information within their possession that is necessary to allow them to provide accurate and timely billing to each other and to any other relevant third parties.

  • Information Services Traffic 5.1 For purposes of this Section 5, Voice Information Services and Voice Information Services Traffic refer to switched voice traffic, delivered to information service providers who offer recorded voice announcement information or open vocal discussion programs to the general public. Voice Information Services Traffic does not include any form of Internet Traffic. Voice Information Services Traffic also does not include 555 traffic or similar traffic with AIN service interfaces, which traffic shall be subject to separate arrangements between the Parties. Voice Information services Traffic is not subject to Reciprocal Compensation as Local Traffic under the Interconnection Attachment. 5.2 If a Reconex Customer is served by resold Verizon Telecommunications Service or a Verizon Local Switching UNE, subject to any call blocking feature used by Reconex, to the extent reasonably feasible, Verizon will route Voice Information Services Traffic originating from such Service or UNE to the Voice Information Service platform. For such Voice Information Services Traffic, unless Reconex has entered into an arrangement with Verizon to ▇▇▇▇ and collect Voice Information Services provider charges from Reconex’s Customers, Reconex shall pay to Verizon without discount the Voice Information Services provider charges. Reconex shall pay Verizon such charges in full regardless of whether or not it collects such charges from its own Customers. 5.3 Reconex shall have the option to route Voice Information Services Traffic that originates on its own network to the appropriate Voice Information Services platform(s) connected to Verizon’s network. In the event Reconex exercises such option, Reconex will establish, at its own expense, a dedicated trunk group to the Verizon Voice Information Service serving switch. This trunk group will be utilized to allow Reconex to route Voice Information Services Traffic originated on its network to Verizon. For such Voice Information Services Traffic, unless Reconex has entered into an arrangement with Verizon to ▇▇▇▇ and collect Voice Information Services provider charges from Reconex’s Customers, Reconex shall pay to Verizon without discount the Voice Information Services provider charges. Reconex shall pay Verizon such charges in full regardless of whether or not it collects such charges from its own Customers. 5.4 Reconex shall pay Verizon such charges in full regardless of whether or not it collects charges for such calls from its own Customers. 5.5 For variable rated Voice Information Services Traffic (e.g., NXX 550, 540, 976, 970, 940, as applicable) from Reconex Customers served by resold Verizon Telecommunications Services or a Verizon Local Switching Network Element, Reconex shall either (a) pay to Verizon without discount the Voice Information Services provider charges, or (b) enter into an arrangement with Verizon to ▇▇▇▇ and collect Voice Information Services provider charges from Reconex’s Customers. 5.6 Either Party may request the other Party provide the requesting Party with non discriminatory access to the other party’s information services platform, where such platform exists. If either Party makes such a request, the Parties shall enter into a mutually acceptable written agreement for such access. 5.7 In the event Reconex exercises such option, Reconex will establish, at its own expense, a dedicated trunk group to the Verizon Information Service serving switch. This trunk group will be utilized to allow Reconex to route information services traffic originated on its network to Verizon.