Use of ICT Clause Samples

Use of ICT. Yes CHAPTER 10: Electronic commerce Mobility of business people : Yes CHAPTER 9; Article 2 Freedom of transit : No
Use of ICT. 2.1. While at College or a College-related activity, you must not have involvement with any material or activity which might put yourself at risk. The use of social networking sites, including but not limited to Facebook are therefore prohibited. As well, you must not at any time use ICT to upset, harass, or harm anyone else in the College community, or the College itself, even if it is meant as a ‘joke’. Unacceptable use could include acts of a malicious or nuisance nature, invasion of privacy, harassment, bullying, hacking, altering the settings on any ICT device or equipment without authorisation, plagiarism, gaming, impersonation/identity theft, spoofing, gambling, fraud, copyright infringement, or cheating in an examination. Behaviour the College may need to respond to also include the use of websites to facilitate misconduct which puts at risk the safety of the College environment. 2.2. If any privately-owned ICT equipment/device, such as a laptop, desktop, PDA, mobile phone, camera, or recording device, portable storage (like a USB or flash memory device), is brought to College or a College-related activity, the College cybersafety rules apply to that device. If you are not sure whether it is appropriate to have a particular device at College or at a College-related activity, you are expected to check with the relevant teacher before bringing it.
Use of ICT. 2.1 While at school-related activity, you must not have involvement with any material or activity which might put yourself at risk. As well, you must not at any time use ICT to upset, harass, or harm anyone else in the school community, or the school itself, even if it is meant as a ‘joke’. Unacceptable use could include acts of a malicious or nuisance nature, invasion of privacy, harassment, bullying, hacking, altering the settings on any ICT device or equipment without authorisation, plagiarism, gaming, impersonation/identity theft, spoofing, gambling, fraud, copyright infringement, or cheating in an examination. Behaviour the school may need to respond to also includes the use of websites to facilitate misconduct which puts at risk the safety of the school environment 2.2 If any privately-own ICT equipment/device, such as a laptop, PDA, mobile device, camera, or recording device, portable storage (like a USB or flash memory device). is brought to school for a school-related activity, the school cybersafety rules apply to that device. If you are not sure whether it is appropriate to have a particular device at school or at a school-related activity, you are expected to check with the relevant teacher before bringing it.
Use of ICT. Digital Agenda of Europe aims at contributing to the economic growth and helping individuals and businesses in the EU to make the most of the development of digital technologies. The programme is the first of the seven initiatives in the Europe 2020 Strategy for smart, sustainable and inclusive growth. Therefore, investment under ESIF to support the creation, access, and use of services based on ICT is crucial for all sectors and regions of Bulgaria and for the country objectives by the key indicators of Digital Agenda Scoreboard, and especially for rural, less developed and populated areas, and aiming at the poor and vulnerable groups of special needs people. The main planned areas of intervention are building infrastructure for next generation access, digital (electronic) access and promoting the development and widespread adoption of ICT products and services, including Internet-based ones. The introduction of ultra-high-speed open and competitive networks will stimulate a favourable cycle of development of the digital economy that will enable new and demanding broadband services to develop and meet the need for accelerated development of backward areas. In order to address the challenges identified in the analysis of the PA it is necessary that investments in ICT be focused on the following areas: solving the problem of the construction of broadband next generation access in remote, sparsely populated and rural areas; digitization of existing records and archives in the administration; building of new NGA networks and improvement of existing broadband infrastructure; providing better deployed broadband technology to ensure the successful operation of e-government in Bulgaria; creation and implementation of information systems for management, monitoring and control in key sectors; providing the necessary equipment for the operation of e-government in the state and municipal authorities, education, health and social services. In accordance with the ex-ante conditionalities, Bulgarian authorities will draw up a national plan for next generation access, aimed at achieving the objectives of the Digital Agenda of Europe, namely: 98% coverage with connectivity speed of 30 Mbps; 50% coverage with connectivity speed of 100 Mbps In the document, based on an economic analysis, a plan of investments in the infrastructure will be developed, taking into account the existing one. This process will be fully in line with the draft Regulation to reduce the cost of deplo...
Use of ICT. While at school or a school-related activity, you must not have involvement with any material or activity which might put yourself or others at risk. As well, you must not at any time use ICT to upset, bully, or harm anyone else in the school community, or the school itself, even if it is meant as a ‘joke’. • Unacceptable use could include, but is not limited to, acts of a malicious or nuisance nature, invasion of privacy, harassment, bullying, hacking, altering the settings on any ICT device or equipment without authorisation, plagiarism, gaming, impersonation/identity theft, spoofing, gambling, fraud, copyright infringement, or cheating in an examination. Behaviour the school may need to respond to may also include the use of websites, applications, social networking sites, or the like, to facilitate misconduct which puts at risk the safety of the school community. • If any privately-owned ICT equipment/device, such as a Chromebook, laptop, desktop, mobile phone, camera, or recording device, portable storage (like a USB or flash memory device), is brought to school or a school-related activity, the school cybersafety rules apply to that device. If you are not sure whether it is appropriate to have a particular device at school or at a school- related activity, you are expected to check with the relevant teacher before bringing it.
Use of ICT. 2.1 While at school or a school-related activity, you must not have involvement with any material or activity which might put yourself or others at risk. As well, you must not at any time use ICT to upset, bully, or harm anyone else in the school community, or the school itself, even if it is meant as a ‘joke’. 2.2 Unacceptable use could include, but is not limited to, acts of a malicious or nuisance nature, invasion of privacy, harassment, bullying, hacking, altering the settings on any ICT device or equipment without authorisation, plagiarism, gaming, impersonation/identity theft, spoofing, gambling, fraud, copyright infringement, or cheating in an examination. Behaviour the school may need to respond to may also include the use of websites, applications, social networking sites, or the like, to facilitate misconduct which puts at risk the safety of the school community. Harmful Digital Communications Act 2015: ▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇▇▇▇.▇▇▇▇.▇▇/act/public/2015/0063/latest/whole.html 2.3 If any privately-owned ICT equipment/device, such as a Chromebook, laptop, desktop, mobile phone, camera, or recording device, portable storage (like a USB or flash memory device), is brought to school or a school-related activity, the school cybersafety rules apply to that device. If you are not sure whether it is appropriate to have a particular device at school or at a school-related activity, you are expected to check with the relevant teacher before bringing it.

Related to Use of ICT

  • Use of Data by User Registry Operator will permit user to use the zone file for lawful purposes; provided that (a) user takes all reasonable steps to protect against unauthorized access to and use and disclosure of the data and (b) under no circumstances will Registry Operator be required or permitted to allow user to use the data to, (i) allow, enable, or otherwise support the transmission by email, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than user’s own existing customers, or (ii) enable high volume, automated, electronic processes that send queries or data to the systems of Registry Operator or any ICANN-­‐accredited registrar.

  • Use of Logos The Company hereby consents to the use of its and its Subsidiaries’ logos in connection with the Debt Financing so long as such logos (i) are used solely in a manner that is not intended to or likely to harm or disparage the Company Group or the reputation or goodwill of the Company Group; (ii) are used solely in connection with a description of the Company, its business and products or the Merger; and (iii) are used in a manner consistent with the other terms and conditions that the Company reasonably imposes.

  • Use of websites (a) The Borrower may satisfy its obligation under this Agreement to deliver any information in relation to those Lenders (the “Website Lenders”) who accept this method of communication by posting this information onto an electronic website designated by the Borrower and the Agent (the “Designated Website”) if: (i) the Agent expressly agrees (after consultation with each of the Lenders) that it will accept communication of the information by this method; (ii) both the Borrower and the Agent are aware of the address of and any relevant password specifications for the Designated Website; and (iii) the information is in a format previously agreed between the Borrower and the Agent. If any Lender (a “Paper Form Lender”) does not agree to the delivery of information electronically then the Agent shall notify the Borrower accordingly and the Borrower shall supply the information to the Agent (in sufficient copies for each Paper Form Lender) in paper form. In any event the Borrower shall supply the Agent with at least one copy in paper form of any information required to be provided by it. (b) The Agent shall supply each Website Lender with the address of and any relevant password specifications for the Designated Website following designation of that website by the Borrower and the Agent. (c) The Borrower shall promptly upon becoming aware of its occurrence notify the Agent if: (i) the Designated Website cannot be accessed due to technical failure; (ii) the password specifications for the Designated Website change; (iii) any new information which is required to be provided under this Agreement is posted onto the Designated Website; (iv) any existing information which has been provided under this Agreement and posted onto the Designated Website is amended; or (v) the Borrower becomes aware that the Designated Website or any information posted onto the Designated Website is or has been infected by any electronic virus or similar software. If the Borrower notifies the Agent under paragraph (c)(i) or paragraph (c)(v) above, all information to be provided by the Borrower under this Agreement after the date of that notice shall be supplied in paper form unless and until the Agent and each Website Lender is satisfied that the circumstances giving rise to the notification are no longer continuing. (d) Any Website Lender may request, through the Agent, one paper copy of any information required to be provided under this Agreement which is posted onto the Designated Website. The Borrower shall comply with any such request within ten Business Days.

  • Use of Issuer PII The Issuer does not grant the Asset Representations Reviewer any rights to Issuer PII except as provided in this Agreement. The Asset Representations Reviewer will use Issuer PII only to perform its obligations under this Agreement or as specifically directed in writing by the Issuer and will only reproduce Issuer PII to the extent necessary for these purposes. The Asset Representations Reviewer must comply with all laws applicable to PII, Issuer PII and the Asset Representations Reviewer’s business, including any legally required codes of conduct, including those relating to privacy, security and data protection. The Asset Representations Reviewer will protect and secure Issuer PII. The Asset Representations Reviewer will implement privacy or data protection policies and procedures that comply with applicable law and this Agreement. The Asset Representations Reviewer will implement and maintain reasonable and appropriate practices, procedures and systems, including administrative, technical and physical safeguards to (i) protect the security, confidentiality and integrity of Issuer PII, (ii) ensure against anticipated threats or hazards to the security or integrity of Issuer PII, (iii) protect against unauthorized access to or use of Issuer PII and (iv) otherwise comply with its obligations under this Agreement. These safeguards include a written data security plan, employee training, information access controls, restricted disclosures, systems protections (e.g., intrusion protection, data storage protection and data transmission protection) and physical security measures.

  • Use of Name (a) The Sub-Adviser hereby consents to the use of its name and the names of its affiliates in the Fund’s disclosure documents, shareholder communications, advertising, sales literature and similar communications. The Sub-Adviser shall not use the name or any tradename, trademark, trade device, service ▇▇▇▇, symbol or any abbreviation, contraction or simulation thereof of the Adviser, the Trust, the Fund or any of their affiliates in its marketing materials unless it first receives prior written approval of the Trust and the Adviser. (b) It is understood that the name of each party to this Agreement, and any derivatives thereof or logos associated with that name, is the valuable property of the party in question and its affiliates, and that each other party has the right to use such names pursuant to the relationship created by, and in accordance with the terms of, this Agreement only so long as this Agreement shall continue in effect. Upon termination of this Agreement, the parties shall forthwith cease to use the names of the other parties (or any derivative or logo) as appropriate and to the extent that continued use is not required by applicable laws, rules and regulations.