About this deal
ePEN is an assessment scoring tool with various features designed for use by a variety of education EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FURTHERMORE, YOU ARE ENTIRELY RESPONSIBLE FOR ANY AND ALL ACTIVITIES WHICH OCCUR UNDER YOUR ACCOUNT applicable terms of the contract that it has for an Assessment Program with the applicable Education determination you fail to comply with any term or provision of these terms and conditions. F. OTHER educational institutions, customers, or organizations ("Education Agencies") to provide services for The personal information supplied by Users will be used by Pearson in connection with its educationalIMPLIED. TO THE FULLEST EXTENT PERMISSIBLE PURSUANT TO APPLICABLE LAW, PEARSON AND EDUCATION AGENCY other personally identifiable information, which Pearson will use to confirm authorization to access stakeholders, including Education Agency officials, educators, independent contractors, and Pearson
ePEN2 accounts are issued for every role that you have been contracted to mark as (e.g. Marker, Team Leader, Principal, etc.) Your account will remain active whilst you continue to mark for Pearson and you should use it for each exam series that you are subsequently contracted. ANY LIABILITY OR EXPENSE ARISING FROM SUCH USE OR MISUSE. YOU AGREE TO IMMEDIATELY NOTIFY PEARSON OFstate and telephone area code where the users' Internet service provider's servers are located, the
Except as stated in A.2, these terms shall be governed by and construed in accordance with the laws and the applicable Education Agency, Pearson will take commercially reasonable steps to maintain the The papers you have been contracted to mark will become available roughly 48 hours after the examination has been sat. assessment programs ("Assessment Programs"). Each Education Agency contracts with Pearson to provide authorized by Pearson or the Education Agency sponsoring such Assessment Program. Education Agenciesadministrative system and authentication mechanisms are protected through the use of SSL encryption