Google Data Center & Network Security Sample Clauses

Google Data Center & Network Security a. Data Centers
AutoNDA by SimpleDocs

Related to Google Data Center & Network Security

  • Network PHARMACY is a retail, mail order or specialty pharmacy that has a contract to accept our pharmacy allowance for prescription drugs and diabetic equipment or supplies covered under this plan. NETWORK PROVIDER is a provider that has entered into a contract with us or other Blue Cross and Blue Shield plans. For pediatric dental care services, network provider is a dentist that has entered into a contract with us or participates in the Dental Coast to Coast Network. For pediatric vision hardware services, a network provider is a provider that has entered into a contract with EyeMed, our vision care service manager.

  • MOBILE DATA COMPUTERS 20 1. As part of the law enforcement services to be provided to CITY, COUNTY 21 has provided, or will provide, mobile data computers (hereinafter called 22 “MDCs”) that are or will be mounted in patrol vehicles and motorcycles, 23 designated by COUNTY for use within CITY limits.

  • Web site Information on registration for and use of the E-Verify program can be obtained via the Internet at the Department of Homeland Security Web site: xxxx://xxx.xxx.xxx/E-Verify.

  • NON-NETWORK PROVIDER is a provider that has not entered into a contract with us or any other Blue Cross and Blue Shield plan. For pediatric dental care services, non-network provider is a dentist that has not entered into a contract with us or does not participate in the Dental Coast to Coast Network. For pediatric vision hardware services, a non-network provider is a provider that has not entered into a contract with EyeMed, our vision care service manager.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Network Security 10.1 Protection of Service and Property. Each Party shall exercise the same degree of care to prevent harm or damage to the other Party and any third parties, its employees, agents or End User Customers, or their property as it employs to protect its own personnel, End User Customers and property, etc.

  • Web Hosting If Customer submits a Service Order(s) for web hosting services, the following terms shall also apply:

  • Subscriber Network The trunk and feeder signal distribution network over which video, audio, text and data signals are transmitted to Subscribers.

  • Network Access TENANT may find it necessary to purchase a network interface card, wireless PC card or other hardware in order to connect to the internet service. LANDLORD is not responsible for the purchase of these items and LANDLORD cannot guarantee compatibility with any device TENANT may have. The computer and network card must have software installed that supports the Internet Protocol commonly referred to as TCP/IP. Any conflicts between the software compatibility of the network and the TENANT’S computer operating system or any other feature will be the responsibility of the TENANT to resolve. LANDLORD will not be responsible for software issues related to the user’s personal computer.

  • Web Portal If you elect to link to and use the web interface provided by us (the “Web Portal”), you agree that the Web Portal is for the sole purpose of enabling Recipients to update and add their contact information. If you elect to use the Web Portal, we grant for the period of the Term (as defined below) to you a limited non-exclusive, worldwide, royalty-free license to place a digital image of the applicable sign-up Logo, which will be presented to you (the “Image”), on an appropriate page of your Internet site, with a hyperlink to our Web Portal site (the “Link”) currently at xxxxx://xxxxxx.xxxxxxxxxxxxxxxxxxx.xxx/. You may not use any other trademark or service xxxx in connection with the Image without our prior written approval. The Link may not be used in any manner to provide an Authorized User with access to the Web Portal via any framing, layering or other techniques now known or hereafter developed that permit display of the Web Portal with any materials posted by you or anyone other than us. You may not allow the Image to be linked to any other web site. You may not use the Image in any manner not permitted hereunder, modify the Image, or copy, or create a derivative work from, the “look and feel” of the Image. We will have the right to review all uses of the Image for quality control purposes and proper compliance. We reserve the right to modify permission to use the Image and/or the Link at any time.

Time is Money Join Law Insider Premium to draft better contracts faster.