Alarm-Backup Sample Clauses

Alarm-Backup. Ref: ECCO 450, Shock Mounted
AutoNDA by SimpleDocs

Related to Alarm-Backup

  • Backup Authorized Devices that are not shared devices will periodically create automatic backups that are transmitted to the Service when the user is logged in with their Managed Apple ID and the device is screen-locked, connected to a power source, and connected to the Internet via a Wi-Fi network. You may disable backup in the MDM Enrollment Settings. Backup is limited to device settings, device characteristics, photos, videos, documents, messages (iMessage, SMS and MMS, if enabled), ringtones, app data (including Health app data), location settings (such as location-based reminders that You have set up), and Home screen and app organization. Content that You purchase, download or provide access to Your End Users from the iTunes Store, App Store or iBooks Store, and Content purchased from or provided by any third parties, will not be backed up. Such Content may be eligible for re- download from those services, subject to account requirements, availability, and any applicable terms and conditions. Content synced from Your End Users’ computers will not be backed up. If You enable iCloud Photo Library, the photo libraries of Your End Users will be backed up separately from their automatic iCloud backup. The Content stored in an End User’s contacts, calendars, bookmarks, and documents is accessible via iCloud on the web or on any of the End User’s Authorized Devices. When iCloud Backup is enabled, devices managed or controlled by Your Institution will not back up to iTunes automatically during a sync, but You may enable End Users to manually initiate a backup to iTunes. It is solely Your responsibility to maintain appropriate alternative backup of Your and Your End Users’ information and data.

  • Data Backup The Services do not replace the need for Customer to maintain regular data backups or redundant data archives. PROVIDER HAS NO OBLIGATION OR LIABILITY FOR ANY LOSS, ALTERATION, DESTRUCTION, DAMAGE, CORRUPTION OR RECOVERY OF CUSTOMER DATA.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • Electronic Backups Subrecipient shall ensure that all electronic information is protected by performing regular backups of automated files and databases and ensure the availability of information assets for continued business. Subrecipient shall ensure that all data, files, and backup files are encrypted.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Local Number Portability Database 10.6.1 The Permanent Number Portability (PNP) database supplies routing numbers for calls involving numbers that have been ported from one local service provider to another. BellSouth agrees to provide access to the PNP database at rates, terms and conditions as set forth by BellSouth and in accordance with an effective FCC or Commission directive.

  • Errors on Paycheques In the event of an error on an employee's pay, the correction will be made in the pay period following the date on which the underpayment comes to the Employer's attention. If the error results in an employee being underpaid by one (1) day's pay or more, the Employer will provide payment for the shortfall within three (3) business days from the date it is notified of the error. If the Employer makes an overpayment of a day’s pay or less for an employee, the overpayment will be deducted on the pay period following the date that the error is discovered. If the error is in excess of a normal day’s pay, the Employer will be reimbursed based on a mutually satisfactory arrangement between the employee and the Employer.

  • Data Backup Plan Contractor must have established documented procedures to backup DHCS PHI to maintain retrievable exact copies of DHCS PHI or PI. The plan must include a regular schedule for making backups, storing backups offsite, an inventory of backup media, and an estimate of the amount of time needed to restore DHCS PHI or PI should it be lost. At a minimum, the schedule must be a weekly full backup and monthly offsite storage of DHCS data.

  • System Monitoring to ensure safe and continuous operation, the Customer must monitor key services and resource use as recommended by Deswik, and provide Deswik with details of monitoring and any relevant alerts as needed. Services to be monitors include, without limitation, disk space, CPU usage, memory usage, database connectivity, and network utilization.

  • Setup Merchant will be solely responsible for the installation of such Equipment and any alterations necessary for such installation. Processor will not be liable for any delay or incompletion of an installation of Equipment. Merchant will be responsible for maintaining and paying for electrical power and a secured phone line or other secure internet connection to be used solely by the Equipment to communicate with Processor.

Time is Money Join Law Insider Premium to draft better contracts faster.