Software Policy Clause Samples

POPULAR SAMPLE Copied 1 times
Software Policy.  IT Personnel support all software installed on City computers; however, IT staff may be unable to fully support the use of non-standard or specialty software.  IT may decline to install, reinstall, or otherwise fix software that is not approved by the IT Department.  To ensure that IT is able to support all software installed on City computers, IT must approve the installation and use of all software.  Because all software on City computers must comply with the publishers’ licensing requirements, IT staff will not install software unless and until ownership and proper licensing is established.  All City employees, either temporary or full-time, must conform to copyright laws and software licensing agreements.  Copying and/or duplicating software is prohibited unless specifically permitted within the software license agreement.  The City’s current preferred enterprise solution is Tyler Technology application software whenever practical.  All software must be purchased following City of Pueblo Purchasing Guidelines. Implementation or enhancement of any City software is done by the IT Department.  Microsoft application software. Microsoft Office is made available through O365 cloud-based services, and is acquired through IT using a volume purchase agreement. This ensures low pricing and the appropriate version of software to address the requirements. Other Microsoft application software, such as Visio, Project, Publisher and individual Office applications when needed (Word, Excel, Access, PowerPoint) will also be purchased through IT’s volume purchase agreement.  Microsoft Operating Systems (Windows 7, 8.1 and 10). Generally, operating system software is purchased as part of a new PC purchase. In some cases, it is appropriate to upgrade operating systems. In such cases, the upgraded software is purchased through IT’s volume license.  Software that is not the City’s property or licensed to the City will not be installed on City computers.
Software Policy. All software on ADM Board owned computers or devices must be purchased by and remain the property of the ADM Board. Upon delivery, all software must be registered properly and installed by the Information Technology Department. Employees may not duplicate any licensed software or related documentation for use, either on ADM Board premises or elsewhere, unless expressly authorized to do so by written agreement with the licensor. Employees may not provide software licensed to the ADM Board to anyone outside the organization or install it on personal devices. Employees should be aware that the illegal duplication of software or installing it on personal devices may result in the filing of criminal copyright infringement charges by the owners of the copyrights and can subject both the employee and the ADM Board to liability. The ADM Board regulates employees’ use of its computer software, therefore employees may not load software on ADM Board computers or any other devices without consent from the Manger of Information Technology.
Software Policy. All computing resources must run State standard real-time virus protection software. The virus protection software is not disabled or altered in a manner that shall reduce the effectiveness of the software. The software’s virus definitions are kept current on a regular scheduled basis. For users who access the network from home or other remote locations, a Secure Remote Access service is provided as an enterprise service in the Enterprise Services standard. Every virus that is not automatically cleaned by the virus protection software constitutes a security incident and is reported to the Organization ISO. (See Security Incident Procedures, below.) Endpoint protection is provided as an enterprise service in the Enterprise Services Standard.
Software Policy. All software and hardware must be approved and installed by the IT Department. Employees and contractors are prohibited from installing any software or using any hardware on Company information system resources that have not been approved by the IT Department.
Software Policy. Ensuring the prevention of software theft is both a managerial and individual employee responsibility. Both corporate and individual users of software are subject to the provisions of the Copyright Act 1968 which allows the imposition of corporate penalties and penalties against individual users resulting in fines and/or imprisonment. Illegally copied software may also carry with it a high risk of computer virus infection. Subsequent eradication of virus infection may not easily be achieved and may be too late to prevent destruction of sensitive or vital data.

Related to Software Policy

  • Software Updates ▇▇▇▇▇ agrees to keep current with software licensed from Skyward and will install new versions on a timeline approved by ▇▇▇▇▇ governance. This timeline will be communicated by NWRDC to the Districts.

  • Software Warranty We warrant that the Tyler Software will perform without Defects during the term of this Agreement. If the Tyler Software does not perform as warranted, we will use all reasonable efforts, consistent with industry standards, to cure the Defect in accordance with the maintenance and support process set forth in Section C(9), below, the SLA and our then current Support Call Process.

  • Third Party Software The Software may contain third party software which requires notices and/or additional terms and conditions. Such required Third Party Software notices and/or additional terms and conditions are located at ▇▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇/▇▇▇▇-third-party/ (or a successor website thereto) and are made a part of and incorporated by reference into this Agreement.

  • Software Licenses Seller has all necessary licenses to use all material third-party software used in Seller's business, and Seller's use of third-party software does not infringe the rights of any Person.

  • Software Licensing A. Sourcewell selected The Gordian Group’s (Gordian) software, data and services (IQCC System) for their IQCC program. The system includes Gordian’s proprietary ezIQC, eGordian and Bid Safe IQCC applications (IQCC Applications) and construction cost data (Construction Task Catalog), which shall be used by the Contractor to prepare and submit Price Proposals, subcontractor lists, and other requirements specified by Sourcewell and Sourcewell Members. The Contractor’s use, in whole or in part, of ▇▇▇▇▇▇▇’s IQCC Applications and Construction Task Catalog and other proprietary materials provided by ▇▇▇▇▇▇▇ for any purpose other than to execute work under this Contract for Sourcewell and Sourcewell Members is strictly prohibited unless otherwise stated in writing by ▇▇▇▇▇▇▇. The Contractor hereby agrees to abide by the terms of the following IQCC System License: