Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.
Linking to the Website and Social Media Features You may link to our homepage, provided you do so in a way that is fair and legal and does not damage our reputation or take advantage of it, but you must not establish a link in such a way as to suggest any form of association, approval, or endorsement on our part. This Website may provide certain social media features that enable you to: • Link from your own or certain third-party websites to certain content on this Website. • Send emails or other communications with certain content, or links to certain content, on this Website. • Cause limited portions of content on this Website to be displayed or appear to be displayed on your own or certain third-party websites. You may use these features solely as they are provided by us, and solely with respect to the content they are displayed with, and otherwise in accordance with any additional terms and conditions we provide with respect to such features. Subject to the foregoing, you must not: • Establish a link from any website that is not owned by you. • Cause the Website or portions of it to be displayed on, or appear to be displayed by, any other site, for example, framing, deep linking, or in-line linking. • Link to any part of the Website other than the homepage. • Otherwise take any action with respect to the materials on this Website that is inconsistent with any other provision of these Terms of Use. The website from which you are linking, or on which you make certain content available, must comply in all respects with the Content Standards set out in these Terms of Use. You agree to cooperate with us in causing any unauthorized framing or linking immediately to stop. We reserve the right to withdraw linking permission without notice. We may disable all or any social media features and any links at any time without notice in our discretion.
Telemedicine Services This plan covers clinically appropriate telemedicine services when the service is provided via remote access through an on-line service or other interactive audio and video telecommunications system in accordance with R.I. General Law § 27-81-1. Clinically appropriate telemedicine services may be obtained from a network or non- network provider, and from our designated telemedicine service provider. When you seek telemedicine services from our designated telemedicine service provider, the amount you pay is listed in the Summary of Medical Benefits. When you receive a covered healthcare service from a network or non-network provider via remote access, the amount you pay depends on the covered healthcare service you receive, as indicated in the Summary of Medical Benefits. For information about telemedicine services, our designated telemedicine service provider, and how to access telemedicine services, please visit our website or contact our Customer Service Department.
Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.
Online Services Microsoft warrants that each Online Service will perform in accordance with the applicable SLA during Customer’s use. Customer’s remedies for breach of this warranty are described in the SLA.
Telephone Services All telegraph, telephone, and communication connections which Tenant may desire outside the Premises shall be subject to Landlord’s prior written approval, in Landlord’s sole discretion, and the location of all wires and the work in connection therewith shall be performed by contractors approved by Landlord and shall be subject to the direction of Landlord, except that such approval is not required as to Tenant’s cabling from the Premises in a route designated by Landlord to any telephone cabinet or panel provided for Tenant’s connection to the telephone cable serving the Building, so long as Tenant’s equipment does not require connections different than or additional to those to the telephone cabinet or panel provided. As to any such connections or work outside the Premises requiring Landlord’s approval, Landlord reserves the right to designate and control the entity or entities providing telephone or other communication cable installation, removal, repair and maintenance outside the Premises and to restrict and control access to telephone cabinets or panels. In the event Landlord designates a particular vendor or vendors to provide such cable installation, removal, repair and maintenance for the Building, Tenant agrees to abide by and participate in such program. Tenant shall be responsible for and shall pay all costs incurred in connection with the installation of telephone cables and communication wiring in the Premises, including any hook-up, access and maintenance fees related to the installation of such wires and cables in the Premises and the commencement of service therein, and the maintenance thereafter of such wire and cables; and there shall be included in Operating Expenses for the Building all installation, removal, hook-up or maintenance costs incurred by Landlord in connection with telephone cables and communication wiring serving the Building which are not allocable to any individual users of such service but are allocable to the Building generally. If Tenant fails to maintain all telephone cables and communication wiring in the Premises and such failure affects or interferes with the operation or maintenance of any other telephone cables or communication wiring serving the Building, Landlord or any vendor hired by Landlord may enter into and upon the Premises forthwith and perform such repairs, restorations or alterations as Landlord deems necessary in order to eliminate any such interference (and Landlord may recover from Tenant all of Landlord’s costs in connection therewith). No later than the Termination Date, Tenant agrees to remove all telephone cables and communication wiring installed by Tenant for and during Tenant’s occupancy, which Landlord shall request Tenant to remove. Tenant agrees that neither Landlord nor any of its agents or employees shall be liable to Tenant, or any of Tenant’s employees, agents, customers or invitees or anyone claiming through, by or under Tenant, for any damages, injuries, losses, expenses, claims or causes of action because of any interruption, diminution, delay or discontinuance at any time for any reason in the furnishing of any telephone or other communication service to the Premises and the Building.
Modern Slavery You hereby affirm your compliance with the Modern Slavery Xxx 0000 and associated guidance. You confirm (a) that you have read, are familiar with and shall not perform an act or omission which is in contravention with, the letter or spirit of the Act; and (b) you carry out regular, meaningful and comprehensive due diligence procedures and have internal policies in place to address any suspected human rights abuse in your business and Group where applicable.
Conhecimento da Lingua O Contratado, pelo presente instrumento, declara expressamente que tem pleno conhecimento da língua inglesa e que leu, compreendeu e livremente aceitou e concordou com os termos e condições estabelecidas no Plano e no Acordo de Atribuição (“Agreement” xx xxxxxx).
The Web Services E-Verify Employer Agent agrees to, consistent with applicable laws, regulations, and policies, commit sufficient personnel and resources to meet the requirements of this MOU.
Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.