Mobile Devices Mobile devices which are issued by and belonging to the Contractor for purposes of processing Personal Data should have access control measures and remote wipe capability turned on. Procedures should be in place to report and wipe data off lost mobile devices immediately after detection of loss.
Devices BNY Mellon will restrict the transfer of Customer Data from its network to mass storage devices. BNY Mellon will use a mobile device management system or equivalent tool when mobile computing is used to provide the services. Applications on such authenticated devices will be housed within an encrypted container and BNY Mellon will maintain the ability to remote wipe the contents of the container.
000 TOOL ROOMS 24.100 The Company and the Unions agree that it shall be the Owner's prerogative to maintain and operate a general centrally located tool room and warehouse. The Unions agree that the manpower required for the operation of the centrally located tool room and warehouse may at the Owner's option be employed directly by them.
Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.
PATROL VIDEO SYSTEMS 2 1. As part of the law enforcement services to be provided to CITY, COUNTY 3 has provided, or will provide, patrol video systems (hereinafter called “PVS”) 4 that are or will be mounted in patrol vehicles designated by COUNTY for 5 use within CITY service area.
Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.
Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.
End Users Customer will control access to and use of the Products by End Users and is responsible for any use of the Products that does not comply with this Agreement.
Radios The Contractor or its employees shall not use any of the two-way radios or special telecommunications equipment under any circumstances. No exceptions will be made to this rule. Violation is grounds for immediate termination of this Contract, as well as punitive action.
End User An “End User” is you, an individual or entity, which receives the Models from Licensee or Authorized Licensee User pursuant to this End User Agreement to use in the regular course of your affairs, but not for resale, modification, distribution or exploitation by third parties without AnyLogic’s prior written consent.