Fish and Wildlife Service 2002c. Colorado pikeminnow (Ptychocheilus lucius) recovery goals: amendment and supplement to the Colorado Squawfish Recovery Plan.
Containers The marine and intermodal cargo containers either owned or leased by the Borrower and employed by the Borrower in the conduct of its business, including, without limitation, refrigerated, dry van, tank, open top and flat rack containers and refrigeration units and generator sets associated therewith, but excluding any chassis for such containers.
Access Toll Connecting Trunk Group Architecture 9.2.1 If CSTC chooses to subtend a Verizon access Tandem, CSTC’s NPA/NXX must be assigned by CSTC to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 CSTC shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from CSTC’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office CSTC utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow CSTC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.
Removable media devices All electronic files that contain DHCS PHI or PI data must be encrypted when stored on any removable media or portable device (i.e. USB thumb drives, floppies, CD/DVD, smartphones, backup tapes etc.). Encryption must be a FIPS 140-2 certified algorithm which is 128bit or higher, such as AES.
Computers All computers, hardware, software, computer upgrades and maintenance in connection therewith shall be at Owner's expense.
Cryptography Supplier will maintain policies and standards on the use of cryptographic controls that are implemented to protect Accenture Data.
Devices BNY Mellon will restrict the transfer of Customer Data from its network to mass storage devices. BNY Mellon will use a mobile device management system or equivalent tool when mobile computing is used to provide the services. Applications on such authenticated devices will be housed within an encrypted container and BNY Mellon will maintain the ability to remote wipe the contents of the container.
Weapons We have a zero tolerance of the possession of weapons (sword, knives etc) or firearms (guns etc) in the Room, Building or Common Property. If You are found in possession of weapons, firearms or implements associated with their use in the Room, Building or Common Property We will immediately terminate this agreement and inform the relevant UNSW and legal authorities.
Escorting Visitors Visitors to areas where PHI COUNTY discloses to 4 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY is 5 contained shall be escorted and such PHI shall be kept out of sight while visitors are in the area.
Vendors Any vendors engaged by Tenant to perform services in or to the Premises including, without limitation, janitorial contractors and moving contractors shall be coordinated with any work being performed by or for Landlord and in such manner as to maintain harmonious labor relations and not to damage the Building or the Property or interfere with Building construction or operation and shall be performed by vendors first approved by Landlord.