enabled. This information is collected by Symantec for the purpose of providing protection and of evaluating and advising You regarding potential threats and risks that may be associated with a particular Web site before You view it. − Executable files that are identified as potential malware, including information on the actions taken by such files at the time of installation. These files are submitted to Symantec using the Software’s automatic submission function. The collected files could contain personally identifiable information that has been obtained by the malware without Your permission. Files of this type are being collected by Symantec only for the purpose of improving the ability of Symantec’s products to detect malicious behavior. Such automatic submission function may be deactivated after installation by following the instructions in the Documentation for applicable products. − The name given to the computer during the initial setup of the operating system. If collected, the name will be used by Symantec as an account name for the computer under which You may elect to receive additional services and/or under which You may use certain features of the Software. You may change such account name at any time after installation of the Software (recommended). − Status information regarding installation and operation of the Software. This information indicates to Symantec whether installation of the Software was successfully completed as well as whether the Software has encountered an error. The status information could contain personally identifiable information only if such information is included in the name of the file or folder encountered by the Software at the time of installation or error. The status information is collected by Symantec for the purpose of evaluating and improving Symantec’s product performance and installation success rate. Symantec may also use this information to optimize its web-pages. − Information contained in email messages that you send through the Software to Symantec to report as spam or as incorrectly identified as spam. These email messages may contain personally identifiable information and will be sent to Symantec only with your permission, and will not be sent automatically. If you send such messages to Symantec, Symantec will use them only for the purpose of improving the detection ability of Symantec’s antispam technology. − Information contained in a report that You may choose to send to Symantec through the Software ...
enabled. This information is collected by Symantec for the purpose of providing protection and of evaluating and advising You regarding potential threats and risks that may be associated with a particular Web site before You view it.
enabled. Voice Traffic directed to a terminating End User physically located outside the originating End User’s local calling area will be considered toll traffic and subject to access charges.
enabled. The winching operations must be conducted in accordance with Australian civil aviation legislation and regulations and a Member’s operating procedures.
enabled. Is the port or device enabled? This state is initialized to enabled. • autoConnect Does asynManager automatically attempt to connect if it finds the port or device disconnected? This is initialized to the state specified in the call to registerPort. If the port does not support multiple devices, then port and device status are the same. If the port does support multiple devices, then asynManager keeps track of the states for the port and for every device connected to the port. Low level drivers must call pasynManager:exceptionConnect whenever they connect to a port or port,addr and exceptionDisconnect whenever they disconnect.
enabled. Providers and staff in the practice are IT enabled, including optimized EMR use and data collection methods to inform quality improvements in patient care and practice workflow. • The EMR is able to link appropriately with other providers and parts of the system, including other community providers, pharmacies and acute care facilities. • Virtual care options, including access to appropriate email, telephone and video conferencing advice/consults, are used and optimized.
enabled. The Contractor acknowledges and agrees that the winching capability may be subject to regular audit by the Member purchasing the Services.
enabled. If you disable this option subsequent reports will be generated in the “classic” text format. Images: Click to define graphic images to display in the header area of reports.
enabled. Toggle this on or off to enable or disable ethernet communications. Use Internet: Toggled to YES, you are informing the Galaxy 3 that you want to use the etherenet to talk to LeagueLeader.
enabled. As such I consent to the installation of Microsoft’s Authenticator App on my phone. • I will ensure I obtain permission from the DPO before any personal data is transferred from a school-owned device to a personal device. • I will ensure any data transferred from a school-owned device to a personal device is encrypted or pseudonymised and protected by Sophos home. • I will ensure any sensitive personal data is not transferred to a personal device unless completely necessary – and, when doing so, that it is encrypted. • I will ensure my personal device has been assessed for security by the IT Network Manager before it is used for lone working. • I will ensure no unauthorised persons, such as family members or friends, access any personal devices used for lone-working. • I will act in accordance with the school’s Online Safety Policy when transporting school equipment and data.