Use of PTO A nurse will be required to take his or her accrued PTO during the leave, except where required by law. a. Notwithstanding the foregoing, for absences greater than thirty (30) days, a nurse will be allowed to leave up to eighty (80) accrued hours remaining in his/her PTO bank. Such a nurse shall designate to the Medical Center, prior to the announcement of such absence, the date by which compensation for PTO is to be discontinued. b. The number of hours of PTO used per week during the leave may not be less than the number of hours that the nurse was regularly scheduled to work.
Use of websites (a) The Borrower may satisfy its obligation under this Agreement to deliver any information in relation to those Lenders (the “Website Lenders”) who accept this method of communication by posting this information onto an electronic website designated by the Borrower and the Agent (the “Designated Website”) if: (i) the Agent expressly agrees (after consultation with each of the Lenders) that it will accept communication of the information by this method; (ii) both the Borrower and the Agent are aware of the address of and any relevant password specifications for the Designated Website; and (iii) the information is in a format previously agreed between the Borrower and the Agent. If any Lender (a “Paper Form Lender”) does not agree to the delivery of information electronically then the Agent shall notify the Borrower accordingly and the Borrower shall supply the information to the Agent (in sufficient copies for each Paper Form Lender) in paper form. In any event the Borrower shall supply the Agent with at least one copy in paper form of any information required to be provided by it. (b) The Agent shall supply each Website Lender with the address of and any relevant password specifications for the Designated Website following designation of that website by the Borrower and the Agent. (c) The Borrower shall promptly upon becoming aware of its occurrence notify the Agent if: (i) the Designated Website cannot be accessed due to technical failure; (ii) the password specifications for the Designated Website change; (iii) any new information which is required to be provided under this Agreement is posted onto the Designated Website; (iv) any existing information which has been provided under this Agreement and posted onto the Designated Website is amended; or (v) the Borrower becomes aware that the Designated Website or any information posted onto the Designated Website is or has been infected by any electronic virus or similar software. If the Borrower notifies the Agent under paragraph (c)(i) or paragraph (c)(v) above, all information to be provided by the Borrower under this Agreement after the date of that notice shall be supplied in paper form unless and until the Agent and each Website Lender is satisfied that the circumstances giving rise to the notification are no longer continuing. (d) Any Website Lender may request, through the Agent, one paper copy of any information required to be provided under this Agreement which is posted onto the Designated Website. The Borrower shall comply with any such request within ten Business Days.
Use of Data by User Registry Operator will permit user to use the zone file for lawful purposes; provided that (a) user takes all reasonable steps to protect against unauthorized access to and use and disclosure of the data and (b) under no circumstances will Registry Operator be required or permitted to allow user to use the data to, (i) allow, enable, or otherwise support the transmission by email, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than user’s own existing customers, or (ii) enable high volume, automated, electronic processes that send queries or data to the systems of Registry Operator or any ICANN-‐accredited registrar.
Malicious Use of Orphan Glue Records Registry Operator shall take action to remove orphan glue records (as defined at ▇▇▇▇://▇▇▇.▇▇▇▇▇.▇▇▇/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct.
Use of Technology Participants are subject to all existing laws (federal and state) and University regulations and policies on use of technology, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct such as: • UC Electronic Communications Policy: ▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇/ucophome/policies/ec/ • UCLA E-mail Policy and Guidelines: ▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇▇.▇▇▇/app/Default.aspx?&id=455 • IT Services Acceptable Use Policy: ▇▇▇▇://▇▇▇.▇▇▇.▇▇▇▇.▇▇▇/policies/aupdetail.html • The UC Policy on Copyright Ownership: ▇▇▇▇://▇▇▇▇▇▇▇▇▇.▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇/resources/copyright-ownership.html • Bruin OnLine Service Level Agreement: ▇▇▇▇://▇▇▇.▇▇▇.▇▇▇▇.▇▇▇/policies/BOL_SLA.pdf Any violation may result in technology related privileges being restricted or revoked and may also result in The University undertaking disciplinary action. If the violation constitutes a criminal offense, appropriate legal action may be taken.