Email and Texting Sample Clauses

Email and Texting. If you elect to communicate with me by email or text, or decide to receive appointment reminders by email or text, please be aware that email and text messages are not completely confidential. Please note that anything you send me electronically becomes a part of your legal record, even if I do not place it in your clinical record. Please note that I only use email and text to communicate about appointments. Discussions therapeutic in nature will be handled on the phone or in session.
AutoNDA by SimpleDocs
Email and Texting. Use of email may affect the security of messages. For example, using an email app on an unlocked phone may mean that anyone can view messages they receive in that app. Please keep in mind that communications via email over the internet are not secure. Although it is unlikely, there is a possibility that information you include in an email can be intercepted and read by other parties besides the person to whom it is addressed. Please do not include personal identifying information personal such as medical information in any emails/texts you send to me. No one can diagnose your condition from email or other written communications, and communication via email/text/website cannot replace the relationship you have with your therapist. I will not voluntarily participate in any litigation or custody dispute in which you and another individual, or entity, are parties. I have a policy of not communicating with patients’ attorneys and will generally not write or sign letters, reports, declarations, or affidavits to be used in any patient’s legal matter. I will generally not provide records or testimony unless compelled to do so. Should I be subpoenaed, or ordered by a court of law, to appear as a witness in an action involving you, you agree to reimburse me for any time spent for preparation, travel, or other time in which I have made myself available for such an appearance at my hourly rate for such services of $250.00 per hour.
Email and Texting. I prefer using email and or texting to arrange and/or modify appointments or briefly check with Clients. Please do not email or text me content related to your therapy sessions, as email and text are not completely secure or confidential. If you choose to communicate with me by email, be aware that all emails are retained in the logs of your and my internet service providers. While it is unlikely that someone will not be looking at these logs, they are, in theory, available to read by the system administrator(s) of the internet service provider. You should also know that if I receive any emails or texts from you and any responses I send to you that involve any therapeutic information will become a part of your legal record.

Related to Email and Texting

  • Encryption The Fund acknowledges and agrees that encryption may not be available for every communication through the System, or for all data. The Fund agrees that Custodian may deactivate any encryption features at any time, without notice or liability to the Fund, for the purpose of maintaining, repairing or troubleshooting the System or the Software.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • WASHINGTON’S ELECTRONIC BUSINESS SOLUTION (WEBS). Contractor represents and warrants that it is registered in Washington’s Electronic Business Solution (WEBS), Washington’s contract registration system and that, all of its information therein is current and accurate and that throughout the term of this Master Contract, Contractor shall maintain an accurate profile in WEBS.

  • Proposed Policies and Procedures Regarding New Online Content and Functionality By October 31, 2017, the School will submit to OCR for its review and approval proposed policies and procedures (“the Plan for New Content”) to ensure that all new, newly-added, or modified online content and functionality will be accessible to people with disabilities as measured by conformance to the Benchmarks for Measuring Accessibility set forth above, except where doing so would impose a fundamental alteration or undue burden. a) When fundamental alteration or undue burden defenses apply, the Plan for New Content will require the School to provide equally effective alternative access. The Plan for New Content will require the School, in providing equally effective alternate access, to take any actions that do not result in a fundamental alteration or undue financial and administrative burdens, but nevertheless ensure that, to the maximum extent possible, individuals with disabilities receive the same benefits or services as their nondisabled peers. To provide equally effective alternate access, alternates are not required to produce the identical result or level of achievement for persons with and without disabilities, but must afford persons with disabilities equal opportunity to obtain the same result, to gain the same benefit, or to reach the same level of achievement, in the most integrated setting appropriate to the person’s needs. b) The Plan for New Content must include sufficient quality assurance procedures, backed by adequate personnel and financial resources, for full implementation. This provision also applies to the School’s online content and functionality developed by, maintained by, or offered through a third-party vendor or by using open sources. c) Within thirty (30) days of receiving OCR’s approval of the Plan for New Content, the School will officially adopt, and fully implement the amended policies and procedures.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • TEXT MESSAGING WHILE DRIVING In accordance with Executive Order (EO) 13513, “Federal Leadership on Reducing Text Messaging While Driving,” any and all text messaging by Federal employees is banned: a) while driving a Government owned vehicle (GOV) or driving a privately owned vehicle (POV) while on official Government business; or b) using any electronic equipment supplied by the Government when driving any vehicle at any time. All cooperators, their employees, volunteers, and contractors are encouraged to adopt and enforce policies that ban text messaging when driving company owned, leased or rented vehicles, POVs or GOVs when driving while on official Government business or when performing any work for or on behalf of the Government.

  • Flextime ‌ (a) For the purpose of this agreement, flextime means the hours worked by an employee, or group of employees, who are given authority by the Employer to: (1) choose their starting and finishing times; and (2) choose their length of workday within a stated maximum number of hours, subject to meeting the required annual hours of work in accordance with this agreement, through a specified averaging period. (b) The full-time employee on flextime who has a day of absence, whether with or without pay, will be deemed to be absent for the agreed upon hours, providing at least the agreed upon hours are required to complete the averaging period. If less than the agreed upon hours are required to complete the averaging period, such number of hours will be deemed to be the hours of absence. (c) The averaging period for employees on flextime will be two pay periods. (d) The workday for those employees on flextime will not exceed 10 hours.

  • Procedures for Providing NP Through Full NXX Code Migration Where a Party has activated an entire NXX for a single Customer, or activated at least eighty percent (80%) of an NXX for a single Customer, with the remaining numbers in that NXX either reserved for future use by that Customer or otherwise unused, if such Customer chooses to receive Telephone Exchange Service from the other Party, the first Party shall cooperate with the second Party to have the entire NXX reassigned in the LERG (and associated industry databases, routing tables, etc.) to an End Office operated by the second Party. Such transfer will be accomplished with appropriate coordination between the Parties and subject to appropriate industry lead times for movements of NXXs from one switch to another. Neither Party shall charge the other in connection with this coordinated transfer.

  • Data Storage Where required by applicable law, Student Data shall be stored within the United States. Upon request of the LEA, Provider will provide a list of the locations where Student Data is stored.

  • Reducing Text Messaging While Driving Pursuant to Executive Order 13513, 74 FR 51225 (Oct. 6, 2009), Recipient should encourage its employees, subrecipients, and contractors to adopt and enforce policies that ban text messaging while driving, and Recipient should establish workplace safety policies to decrease accidents caused by distracted drivers.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!