Cell Phones The College follows the State’s Cell Phone Policy. Employees who receive cell phones from the College shall also abide by this Policy. The College shall provide the Policy to any employee who is given a cell phone. Employees are responsible for the cost of all personal calls. While the College anticipates some incidental personal use of cell phones, it is also expected that such use is infrequent.
Activation We will notify the Xxxxxx of your request to receive electronic billing information. The presentment of your first electronic bill may vary from Xxxxxx to Xxxxxx and may take up to sixty (60) days, depending on the billing cycle of each Xxxxxx. While your electronic bill feature is being activated it is your responsibility to keep your accounts current. Each electronic Xxxxxx reserves the right to accept or deny your request to receive electronic bills.
Deactivation Computershare applications shall automatically deactivate a User ID after a specified number of unsuccessful log-in attempts. Sessions must be restricted or timed out after a defined period of inactivity and require Users to re-authenticate. User IDs for Computershare Personnel with access to Customer Confidential Information shall be deactivated immediately upon changes in job responsibilities that render such access unnecessary, or upon termination of employment.
Message Screening 9.4.4.1 BellSouth shall set message screening parameters so as to accept valid messages from Global Connection local or tandem switching systems destined to any signaling point within BellSouth’s SS7 network where the Global Connection switching system has a valid signaling relationship.
Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.
Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.
Searchable Whois Notwithstanding anything else in this Agreement, Registry Operator must offer a searchable Whois service compliant with the requirements described in Section 1.10 of Specification 4 of this Agreement. Registry Operator must make available the services only to authenticated users after they logged in by supplying proper credentials (i.e., user name and password). Registry Operator must issue such credentials exclusively to eligible users and institutions that supply sufficient proof of their legitimate interest in this feature (e.g., law enforcement agencies).
Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.
Web Hosting If Customer submits a Service Order(s) for web hosting services, the following terms shall also apply:
Cell Phone Employee shall be provided with a cell phone, with e-mail capabilities, at Board expense. As a condition of receipt of said cell phone, employee is expected to be reachable as necessary and appropriate by the Superintendent and Board President for the thorough and efficient operation of the School District. Incidental personal use shall be permitted. Employees shall have the option of being reimbursed for the use of a personal smartphone in the amount of fifty dollars ($50.00) per month instead of accepting a district cell phone. As a condition of this reimbursement, employee must a) be reasonably available at all times via the personal phone; and b) take reasonable measures to protect the confidentiality of student and staff information being transmitted to and through said phone.