Cameras and Filming Sample Clauses

Cameras and Filming. Only the Exhibitor may grant permission to have his/her exhibit and/or product photographed or videotaped. Exhibitor grants to WEF a perpetual non-exclusive license to photograph, display and otherwise use any likeness of the Exhibitor’s exhibit for the purpose of advertising future activities of WEF or future exhibitions. The only videotaping or electronic recording of any exhibit or equipment in the Residuals and Biosolids exhibit halls which may take place is by the Exhibitor recording his/her own exhibit or equipment. Any exhibitor taking photographs or videotape of another's exhibit or product without permission must relinquish the film or digital media upon request; the film or digital media will be disposed of one year after being relinquished. Exhibitors shall comply with the WEF Camera Policy for Media as included in the online Exhibitor Service Manual.
AutoNDA by SimpleDocs
Cameras and Filming. The only videotaping or electronic recording of any exhibit or equipment in the WEF Collection Systems Conference and Stormwater Summit exhibit halls which may take place is by the Exhibitor recording his/her own exhibit or equipment. Any exhibitor taking photographs or videotape of another's exhibit or product without permission must relinquish or immediately delete the film or digital media upon request; the film or digital media will be disposed of one year after being relinquished. No photography and/or videotaping will be permitted by Exhibitor without prior written authorization by WEF Management.

Related to Cameras and Filming

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store County PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Security Office.

Time is Money Join Law Insider Premium to draft better contracts faster.