BlackBerry ID Sample Clauses

BlackBerry ID. If You do not already have a BlackBerry ID, You will be prompted to create one in order to access and use Your BBM Solution. Once created, Your BlackBerry ID can also be used by You to access other products or services that utilize the BlackBerry ID service and for which You are eligible to access (“BlackBerry ID Accessible Services”). Unless You and BlackBerry agree to other terms and conditions governing Your use of Your BlackBerry ID in association with such products and services, You agree that the terms and conditions of this Agreement that apply to the BlackBerry ID Service, both as a Service and as part of the BBM Solution, also apply to the use of Your BlackBerry ID with BlackBerry ID Accessible Services; including without limitation, Sections 2, 3, 5, 6, 9, 12, 16, 17, 18, 19, 20, and this Section 11. In addition, any termination of this Agreement will not affect the application of such terms and conditions to Your continued use of Your BlackBerry ID with other BlackBerry ID Accessible Services, unless BlackBerry indicates that such termination is intended to terminate Your right to use Your BlackBerry ID with other BlackBerry ID Accessible Services.
AutoNDA by SimpleDocs
BlackBerry ID. To access certain RIM services and third party services (“BlackBerry ID Accessible Services”), You will require a BlackBerry ID which You can obtain by completing the BlackBerry ID sign-up form.

Related to BlackBerry ID

  • Cell Phones The College follows the State’s Cell Phone Policy. Employees who receive cell phones from the College shall also abide by this Policy. The College shall provide the Policy to any employee who is given a cell phone. Employees are responsible for the cost of all personal calls. While the College anticipates some incidental personal use of cell phones, it is also expected that such use is infrequent.

  • Computers All computers, hardware, software, computer upgrades and maintenance in connection therewith shall be at Owner's expense.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • MOBILE DATA COMPUTERS 20 1. As part of the law enforcement services to be provided to CITY, COUNTY 21 has provided, or will provide, mobile data computers (hereinafter called 22 “MDCs”) that are or will be mounted in patrol vehicles and motorcycles, 23 designated by COUNTY for use within CITY limits.

  • Cell Phone Employee shall be provided with a cell phone, with e-mail capabilities, at Board expense. As a condition of receipt of said cell phone, employee is expected to be reachable as necessary and appropriate by the Superintendent and Board President for the thorough and efficient operation of the School District. Incidental personal use shall be permitted. Employees shall have the option of being reimbursed for the use of a personal smartphone in the amount of fifty dollars ($50.00) per month instead of accepting a district cell phone. As a condition of this reimbursement, employee must a) be reasonably available at all times via the personal phone; and b) take reasonable measures to protect the confidentiality of student and staff information being transmitted to and through said phone.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • Servers Marco backs up the following servers only: Windows Servers, SQL servers, Exchange server, and Virtual Machines images running VMWare or Hyper V.

  • Mobile Phones The Company’s expectations in relation to the use of Company provided mobile phones are outlined in Company policy HR-P13. If an Employee is provided with a mobile phone by the Company, the Employee shall be liable for the cost of excessive private telephone calls. Employees agree to make themselves contactable via their personal mobile phone to receive instructions from their supervisors, with the Company reimbursing Employees the cost of any such telephone calls. It is not a condition of employment to own a mobile phone. No Employee shall be engaged in private telephone conversations whilst at work with the exception of designated breaks and in emergency situations. The Company will not be liable for the repair or replacement of personal mobile phones.

  • Workspace Whenever an academic or student union building is planned for construction or renovation, there shall be consideration of the needs for office space of graduate student employees in relevant departments. The University shall provide to all graduate student employees an on-campus mailbox. With approval of their department chair, graduate student employees shall be given key access into the buildings in which their offices or labs are housed for the purpose of performing assistantship work in said office or lab which is permitted by the department chair to be done outside of regular business hours. Department chairs may deny key access into buildings and/or offices/labs in order to minimize access to confidential materials or to minimize the risk of theft, fire/explosion hazards, personal harm, and other security/safety issues. Denial shall not be arbitrary or capricious. If key access is denied, the reason will be provided to the graduate student employee(s) involved. All departmental policies related to the issuance of keys to TOs shall apply equally to TOs in the Division of Continuing Education. Graduate student employees shall have reasonable access to photocopiers for copying related to their employment within departmental guidelines for usage. The parties agree to the creation of a joint committee, composed of equal numbers of representatives of the Union and the University, that will attempt to develop a plan to provide appropriate telephone access for bargaining unit members in connection with their employment responsibilities. The University will provide to this committee a report on the offices assigned to bargaining unit members during the 2005-2006 academic year and the proximity of those offices to a University telephone available for use by the respective bargaining unit member.

  • Device Data We may share certain personal information and device-identifying technical data about you and your devices with third party service providers, who will compare and add device data and fraud data from and about you to a database of similar device and fraud information in order to provide fraud management and prevention services, which include but are not limited to identifying and blocking access to the applicable service or Web site by devices associated with fraudulent or abusive activity. Such information may be used by us and our third party service providers to provide similar fraud management and prevention services for services or Web sites not provided by us. We will not share with service providers any information that personally identifies the user of the applicable device.

Time is Money Join Law Insider Premium to draft better contracts faster.