Systems Monitoring Clause Samples

Systems Monitoring. In accordance with the federal Childhood Internet Protection Act <CIPA>, Internet access is filtered for all users. The use of technology resources may be monitored by district, school and network administrators and their authorized employees to protect the integrity of district technological resources as well as individual compliance with this policy. Users have no expectation of privacy related to their use of the district’s technological resources. Administrators may examine and use data in disciplinary actions; evidence of crime will be provided to law enforcement officials.
Systems Monitoring. The Town has the right to, and will, monitor employee electronic communications and usage. Employees must have no expectation of privacy in anything they create, store, send or receive on the Town’s computer Systems. Your electronic communications can be monitored without prior notification if the Town deems this necessary, in its sole discretion. All incoming and outgoing voice and email messages and attachments are subject to access, review and disclosure in the ordinary course of administering the Systems, including communications that are password protected. Similarly, Internet web sites visited and files downloaded will be evident to those employees responsible for administering that system. Additionally, the Town uses automated monitoring tools to continuously detect, block and/or quarantine files that may violate our policies or threaten the integrity of our Systems. Employees responsible for administering the Systems are required to report any abuses of the Systems to the Town’s managers. Indeed, certain illegal uses of the Town’s Systems are required by law to be reported to law enforcement authorities. Violations of any part of the Electronic Communications Policy may result in disciplinary action, which, depending upon their severity or frequency may range from warning or suspension of privileges to possible discharge from employment.
Systems Monitoring. During the life of this agreement, the parties may, through mutual agreement achieved in meetings of the Employee Relations Committee, alter or further refine the procedures outlined above, in 15.01 (g) and (h).
Systems Monitoring. Ellucian will monitor the Cloud Environment on a 24x7x365 basis. 10.1 Ellucian will monitor the Application components and the Cloud Environment for availability. 10.2 Client will allow Ellucian-based remote services monitoring and security tools reasonable access to the Applications.
Systems Monitoring. FluidStack may monitor, collect, store and use information on the use and performance of the Cloud Infrastructure and the Platform to detect threats or errors to the Platform and/or FluidStack’s operations and for the purposes of the further development and improvement of FluidStack's services, provided that such activities at all times comply the Privacy Policy, the latest version is available at the FluidStack website.
Systems Monitoring. In accordance with the federal Childhood Internet Protection Act (CIPA), Internet access at MLSD is filtered. The use of technology resources may be monitored by authorized employees to protect the integrity of district technological resources as well as individual compliance with this policy. Administrators may examine and use data in disciplinary actions; evidence of crime will be provided to law enforcement officials.
Systems Monitoring. ▇▇▇▇▇▇▇ monitors networks and systems to detect and log events that could cause problems.
Systems Monitoring. The Town has the right to, and will, monitor any and all employee, and/or town hall personnel electronic communications and usage on Town of Ayer computer equipment. Employees and town personnel must have no expectation of privacy in anything they create, store, send or receive on the Town’s computer Systems. Your electronic communications can be monitored without prior notification if the Town deems this necessary, in its sole discretion. All incoming and outgoing voice and messages and attachments are subject to access, review and disclosure in the ordinary course of administering the Systems, including communications that are password protected. Similarly, Internet web sites visited, private email systems and online email accounts and files downloaded will be evident to those employees responsible for administering that system. Additionally, the Town uses automated monitoring tools to continuously detect, block and/or quarantine files that may violate our policies or threaten the integrity of our Systems. Employees responsible for administering the Systems are required to report any abuses of the Systems to the Town’s IT Director and/or Town Manager. Certain illegal and unethical uses of the Town’s Systems are subject by law to be reported to the proper local, state, and/or federal authorities. Violations of any part of the Electronic Communications Policy may result in disciplinary action, which, depending upon their severity or frequency may range from warning, suspension of privileges to possible discharge from employment with the Town of Ayer. All e-mail created or received by an employee of the Town of Ayer is a public record. All Town Employees and Special Town Employees (i.e. appointed and elected board/commission/committee members; volunteers; etc.) MUST use an official Town- issued E-mail (in the form @▇▇▇▇.▇▇.▇▇) for all Town-related business. Using your personal E- Mail to conduct Town business is strictly prohibited and may be subject to disciplinary action and/or personal systems at risk for subpoena or discovery. ALL electronic communications are Public Records.

Related to Systems Monitoring

  • Infrastructure Modification of the location and/or sizing of the infrastructure for the Project that does not materially change the functionality of the infrastructure.

  • Monitoring In each case in which the Foreign Custody Manager maintains Foreign Assets with an Eligible Foreign Custodian selected by the Foreign Custody Manager, the Foreign Custody Manager shall establish a system to monitor (i) the appropriateness of maintaining the Foreign Assets with such Eligible Foreign Custodian and (ii) the contract governing the custody arrangements established by the Foreign Custody Manager with the Eligible Foreign Custodian. In the event the Foreign Custody Manager determines that the custody arrangements with an Eligible Foreign Custodian it has selected are no longer appropriate, the Foreign Custody Manager shall notify the Board in accordance with Section 3.2.5 hereunder.

  • Systems The Servicer covenants that at the date hereof in respect of the software which is used by the Servicer in providing the Services, it shall for the duration of this Agreement:

  • Contract Monitoring The criminal background checks required by this rule shall be national in scope, and must be conducted at least once every three (3) years. Contractor shall make the criminal background checks required by Paragraph IV.G.1 available for inspection and copying by DRS personnel upon request of DRS.