User ID and Password You will be assigned a personal User ID and a Password that you will use to obtain access to the Online Banking. You authorize us to follow any instructions entered through the Service using your User ID and Password. Because your User ID and Password can be used to access your Accounts and to access information about these Accounts, you should treat your User ID and Password with the same degree of care and secrecy that you use to protect your ATM security code and other sensitive financial data. We may ask you to change your User ID and Password from time to time for security reasons. You agree not to use any language that is abusive, harassing, libelous, defamatory, obscene, or threatening when defining your Password or any other personalization of your Accounts.
DATABASE OF RESTRICTED SUPPLIER The process of restriction is used to exclude a company/person from conducting future business with Transnet and other organs of state for a specified period. No Bid shall be awarded to a Bidder whose name (or any of its members, directors, partners or trustees) appear on the Register of Tender Defaulters kept by National Treasury, or who have been placed on National Treasury’s List of Restricted Suppliers. Transnet reserves the right to withdraw an award, or cancel a contract concluded with a Bidder should it be established, at any time, that a bidder has been restricted with National Treasury by another government institution. Thus signed by the Parties and witnessed on the following dates and at the following places: For and on behalf of For and on behalf of TRANSNET SOC LTD …………………………………………………… duly authorised hereto duly authorised hereto Name: Name: Position: Position: Signature: Signature: Date: Date: Place: Place: AS WITNESS: AS WITNESS: Name: Name: Signature: Signature: AS WITNESS: AS WITNESS: Name: Name:
New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to:
DATABASE OF RESTRICTED SUPPLIERS 34.1 The process of restriction is used to exclude a company/person from conducting future business with Transnet and other organs of state for a specified period. No Bid shall be awarded to a Bidder whose name (or any of its members, directors, partners or trustees) appear on the Register of Tender Defaulters kept by National Treasury, or who have been placed on National Treasury’s List of Restricted Suppliers. Transnet reserves the right to withdraw an award, or cancel a contract concluded with a Bidder should it be established, at any time, that a bidder has been restricted with National Treasury by another government institution.
wire Unbundled ISDN Digital Loops These will be provisioned according to industry standards for 2-Wire Basic Rate ISDN services and will come standard with a test point, OC, and a DLR. NewPhone will be responsible for providing BellSouth with a Service Profile Identifier (SPID) associated with a particular ISDN-capable Loop and customer. With the SPID, BellSouth will be able to adequately test the circuit and ensure that it properly supports ISDN service.
Privacybeleid Apple beschermt je gegevens xx xxxxx tijde in overeenstemming met de richtlijnen van het privacybeleid van Apple. Je vindt deze richtlijnen op xxxxx://xxx.xxxxx.xxx/legal/privacy/.
Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.
Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.
Contract Migration Authorized Users holding individual Contracts with a Contractor at the time that Contractor is awarded a Centralized Contract for the same Products or services shall be permitted to migrate to that Centralized Contract effective with its commencement date. Such migration shall not operate to diminish, alter or eliminate any right that the Authorized User otherwise had under the terms and conditions of their individual Contract.
Software Transfer You may permanently transfer all of your rights under this XXXX, provided you retain no copies, you transfer all of the SOFTWARE PRODUCT (including all component parts, the media and printed materials, any upgrades, this XXXX, and, if applicable, the Certificate of Authenticity), and the recipient agrees to the terms of this XXXX. If the SOFTWARE PRODUCT is an upgrade, any transfer must include all prior versions of the SOFTWARE PRODUCT.