Scaling “Scaling,” as used herein, involves:
Evaluation Software If the Software is an evaluation version or is provided to You for evaluation purposes, then, unless otherwise approved in writing by an authorized representative of Licensor, Your license to use the Software is limited solely for internal evaluation purposes in non-production use and in accordance with the terms of the evaluation offering under which You received the Software, and expires 90 days from installation (or such other period as may be indicated within the Software). Upon expiration of the evaluation period, You must discontinue use of the Software, return to an original state any actions performed by the Software, and delete the Software entirely from Your system and You may not download the Software again unless approved in writing by an authorized representative of Licensor. The Software may contain an automatic disabling mechanism that prevents its use after a certain period of time. RESTRICTIONS
System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.
Screening After you sign and date the consent document, you will begin screening. The purpose of the screening is to find out if you meet all of the requirements to take part in the study. Procedures that will be completed during the study (including screening) are described below. If you do not meet the requirements, you will not be able to take part in the study. The study investigator or study staff will explain why. As part of screening, you must complete all of the items listed below: • Give your race, age, gender, and ethnicity • Give your medical history o You must review and confirm the information in your medical history questionnaire • Give your drug, alcohol, and tobacco use history • Give your past and current medication and treatment history. This includes any over-the-counter or prescription drugs, such as vitamins, dietary supplements, or herbal supplements, taken in the past 28 days • Height and weight will be measured • Physical exam will be done • Electrocardiogram (ECG) will be collected. An ECG measures the electrical activity of the heart • You may be tested for COVID-19 o Blood tests for human immunodeficiency virus (HIV), hepatitis B, and hepatitis C o Blood tests to see how your blood clots ▪ Fibrinogen ▪ PT/INR/aPTT o Blood tests for amylase and lipase (enzymes that help with digestion, Part B only) o Blood tests for a lipid (fats) panel (Part B only) ▪ Total cholesterol ▪ Triglycerides ▪ HDL ▪ Direct HDL o Blood tests to check your thyroid function (Part B and Part C only) ▪ TSH ▪ Free T4 o Urine to test for drugs of abuse (illegal and prescription) o Urine tests to check your albumin/ creatinine ratio o Females who have not had a period for at least 12 months in a row will have a blood hormone test to confirm they cannot have children • The study investigator may decide to do an alcohol breath test • The use of proper birth control will be reviewed (males only) • You will be asked “How do you feel?” HIV, hepatitis B, and hepatitis C will be tested at screening. If anyone is exposed to your blood during the study, you will have these tests done again. If you have a positive test, you cannot be in or remain in the study. HIV is the virus that causes acquired immunodeficiency syndrome (AIDS). If your HIV test is positive, you will be told about the results. It may take weeks or months after being infected with HIV for the test to be positive. The HIV test is not always right. Having certain infections or positive test results may have to be reported to the State Department of Health. This includes results for HIV, hepatitis, and other infections. If you have any questions about what information is required to be reported, please ask the study investigator or study staff. Although this testing is meant to be private, complete privacy cannot be guaranteed. For example, it is possible for a court of law to get health or study records without your permission.
Anti-Layering The Company shall not incur, create, issue, assume, guarantee or otherwise become liable for any Indebtedness that is both (a) subordinate or junior in right of payment to any Senior Debt and (b) senior in any respect in right of payment to the Notes. No Subsidiary Guarantor shall incur, create, issue, assume, guarantee or otherwise become liable for any Indebtedness that is both (a) subordinate or junior in right of payment to its Senior Debt and (b) senior in right of the Section 4.9 hereof.
Trunk Group Architecture and Traffic Routing 5.2.1 The Parties shall jointly establish Access Toll Connecting Trunks between CLEC and CBT by which they will jointly provide Tandem-transported Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic from and to CLEC's Customers. 5.2.2 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access and non-translated Toll Free traffic (e.g., 800/888) to allow CLEC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier that is connected to the CBT access Tandem. 5.2.3 The Access Toll Connecting Trunks shall be one-way or two-way trunks, as mutually agreed, connecting an End Office Switch that CLEC utilizes to provide Telephone Exchange Service and Switched Exchange Access Service in the given LATA to an access Tandem Switch CBT utilizes to provide Exchange Access in the LATA.
Unbundled Channelization (Multiplexing) 5.7.1 To the extent NewPhone is purchasing DS1 or DS3 or STS-1 Dedicated Transport pursuant to this Agreement, Unbundled Channelization (UC) provides the optional multiplexing capability that will allow a DS1 (1.544 Mbps) or DS3 (44.736 Mbps) or STS-1 (51.84 Mbps) Network Elements to be multiplexed or channelized at a BellSouth central office. Channelization can be accomplished through the use of a multiplexer or a digital cross-connect system at the discretion of BellSouth. Once UC has been installed, NewPhone may request channel activation on a channelized facility and BellSouth shall connect the requested facilities via COCIs. The COCI must be compatible with the lower capacity facility and ordered with the lower capacity facility. This service is available as defined in NECA 4. 5.7.2 BellSouth shall make available the following channelization systems and interfaces: 5.7.2.1 DS1 Channelization System: channelizes a DS1 signal into a maximum of twenty- four (24)
Access Toll Connecting Trunk Group Architecture 9.2.1 If CSTC chooses to subtend a Verizon access Tandem, CSTC’s NPA/NXX must be assigned by CSTC to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 CSTC shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from CSTC’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office CSTC utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow CSTC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.
Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.
Architecture The Private Improvements shall have architectural features, detailing, and design elements in accordance with the Project Schematic Drawings. All accessory screening walls or fences, if necessary, shall use similar primary material, color, and detailing as on the Private Improvements.