Mailboxes Each department or unit shall make available a convenient receptacle at a designated location for Employees to receive College business correspondence.
Video Display Terminals The Employer shall ensure that any new office equipment or facility required for use in conjunction with VDTs shall meet the standards recommended by the Workers' Compensation Board.
Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.
Transmission encryption All data transmissions of County PHI or PI outside the secure internal network must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as AES. Encryption can be end to end at the network level, or the data files containing PHI can be encrypted. This requirement pertains to any type of PHI or PI in motion such as website access, file transfer, and E-Mail.
Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.
Internet Use Customer assumes total responsibility for its and its users’ use of the Internet. Masergy specifically disclaims any warranties, endorsements or representations regarding any merchandise, information, software, products, data, files, or services provided through the Internet.
Catalog Information about Hawthorn University is published in a school catalog that contains a description of certain policies, procedures, and other information about the school. Hawthorn University reserves the right to change any provision of the catalog at any time. Notice of changes will be communicated in a revised catalog, an addendum or supplement to the catalog, or other written format. Students are expected to read and be familiar with the information contained in the school catalog, in any revisions, supplements and addenda to the catalog, and with all school policies. By enrolling in Hawthorn University, the student agrees to abide by the terms stated in the catalog and all school policies.
Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.
Vending Machines Seller shall remove all monies from all vending machines, laundry machines, pay telephones and other coin-operated equipment as of the Cut-Off Time and shall retain all monies collected therefrom as of the Cut-Off Time, and Purchaser shall be entitled to any monies collected therefrom after the Cut-Off Time.
Computers All computers, hardware, software, computer upgrades and maintenance in connection therewith shall be at Owner's expense.