Computing Resources definition
Examples of Computing Resources in a sentence
The Employee agrees to comply with all Employer security and access policies and procedures, including but not limited to the Code of Ethical Business Conduct, the policy on Use and Protection of Company Computer Systems and Intellectual Property, the policy on Protection of Confidential Information, and Cyber Security Procedure A026 regarding Acceptable Use of Computing Resources.
The Employee agrees to comply with all Employer security and access policies and procedures, including but not limited to the Code of Ethical Business Conduct, the policy on Use and Protection of Assets, Systems, and Intellectual Property, the policy on Protection of Confidential Information, and the Acceptable Use of Computing Resources procedure.
For receipt of such offers, bargaining unit members terminated not for cause shall retain access to their Oregon State University email address for a period of two years (subject to the University’s Acceptable Use of Computing Resources policy).
Bank shall abide by Company’s security measures to restrict unauthorized access to Computing Resources.
Further and to the extent applicable, Provider will comply with federal laws and regulations relating to student privacy including Privacy Rights of Students, Computer Users' Responsibilities, Security of Computing Resources, Security of Data, Privacy of Computing Resources, Health Information Privacy and Accountability Act (HIPAA), Children Internet Protection Act (CIPA), and the ▇▇▇▇▇-▇▇▇▇▇ ▇▇▇▇▇▇ Act (GLBA).
Bank shall, and shall use commercially reasonable efforts to ensure that its Authorized Users do not, access or utilize the Computing Resources for any purpose not authorized in this Exhibit or the Agreement.
Bank shall provide written notification to Company’s IT Systems Manager of the employees, agents, or subcontractors designated by Bank to have access to the Computing Resources under this Agreement (“Authorized Users”).
All information received by Bank as a result of access to the Computing Resources shall be considered Company’s Confidential Information under the Agreement, unless excluded from such definition pursuant to the provisions of Section 10.2.
Bank shall provide Company’s IT Systems Manager the information regarding each Authorized User reasonably required by Company, including, but not limited to, the Computing Resources each Authorized User will access and the method of each Authorized User’s access to the Computing Resources.
Upon learning of (a) any potential misuse or compromise of the Computing Resources, or (b) any potential misuse or unauthorized access to or disclosure of Confidential Information, Bank shall immediately notify Company’s IT Systems Manager.