Computers All computers, hardware, software, computer upgrades and maintenance in connection therewith shall be at Owner's expense.
Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.
Computer Tape The computer tape regarding the Receivables made available by the Seller to the Depositor is complete and accurate in all respects as of the Transfer Date.
Communications and Computer Lines Tenant may install, maintain, replace, remove or use any communications or computer wires and cables (collectively, the "Lines") at the Project in or serving the Premises, provided that (i) Tenant shall obtain Landlord's prior written consent, use an experienced and qualified contractor reasonably approved by Landlord, and comply with all of the other provisions of Articles 7 and 8 of this Lease, (ii) an acceptable number of spare Lines and space for additional Lines shall be maintained for existing and future occupants of the Project, as determined in Landlord's reasonable opinion, (iii) the Lines therefor (including riser cables) shall be (x) appropriately insulated to prevent excessive electromagnetic fields or radiation, (y) surrounded by a protective conduit reasonably acceptable to Landlord, and (z) identified in accordance with the "Identification Requirements," as that term is set forth hereinbelow, (iv) any new or existing Lines servicing the Premises shall comply with all applicable governmental laws and regulations, (v) as a condition to permitting the installation of new Lines, Tenant shall remove existing Lines located in or serving the Premises and repair any damage in connection with such removal, and (vi) Tenant shall pay all costs in connection therewith. All Lines shall be clearly marked with adhesive plastic labels (or plastic tags attached to such Lines with wire) to show Tenant's name, suite number, telephone number and the name of the person to contact in the case of an emergency (A) every four feet (4') outside the Premises (specifically including, but not limited to, the electrical room risers and other Common Areas), and (B) at the Lines' termination point(s) (collectively, the "Identification Requirements"). Landlord reserves the right to require that Tenant remove any Lines located in or serving the Premises which are installed in violation of these provisions, or which are at any time (1) are in violation of any Applicable Laws, (2) are inconsistent with then-existing industry standards (such as the standards promulgated by the National Fire Protection Association (e.g., such organization's "2002 National Electrical Code")), or (3) otherwise represent a dangerous or potentially dangerous condition.
Cell Phones The College follows the State’s Cell Phone Policy. Employees who receive cell phones from the College shall also abide by this Policy. The College shall provide the Policy to any employee who is given a cell phone. Employees are responsible for the cost of all personal calls. While the College anticipates some incidental personal use of cell phones, it is also expected that such use is infrequent.
Computer The Contractor shall maintain at its office for its use a computer with, at a minimum, a 1 GHz processor and an internet connection. The Contractor shall maintain individual email accounts for each of its project managers.
Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.
Devices BNY Mellon will restrict the transfer of Customer Data from its network to mass storage devices. BNY Mellon will use a mobile device management system or equivalent tool when mobile computing is used to provide the services. Applications on such authenticated devices will be housed within an encrypted container and BNY Mellon will maintain the ability to remote wipe the contents of the container.
COMMERCIAL COMPUTER SOFTWARE If performance involves acquisition of existing computer software, the following Company Exhibit is incorporated by reference: CCS Commercial Computer Software License (Company – July 2010).
COMPUTER GRAPHICS FILES The Engineer agrees to comply with Attachment G, Computer Graphics Files for Document and Information Exchange, if determined by the State to be applicable to this contract.