Searchability Offering searchability capabilities on the Directory Services is optional but if offered by the Registry Operator it shall comply with the specification described in this section.
ROAD DIMENSIONS Purchaser shall perform road work in accordance with the dimensions shown on the TYPICAL SECTION SHEET and the specifications within this road plan.
Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.
Geological and Archeological Specimens If, during the execution of the Work, the Contractor, any Subcontractor, or any servant, employee, or agent of either should uncover any valuable material or materials, such as, but not limited to, treasure trove, geological specimens, archival material, archeological specimens, or ore, the Contractor acknowledges that title to the foregoing is vested in the Owner. The Contractor shall notify the Owner upon the discovery of any of the foregoing, shall take reasonable steps to safeguard it, and seek further instruction from the Design Professional. Any additional cost incurred by the Contractor shall be addressed under the provision for changed conditions. The Contractor agrees that the Geological and Water Resources Division and the Historic Preservation Division of the Georgia Department of Natural Resources may inspect the Work at reasonable times.
Dienste Und Materialien Von Drittanbietern (a) Die Apple-Software gewährt möglicherweise Zugang zu(m) iTunes Store, App Store, Apple Books, Game Center, iCloud, Karten von Apple und zu anderen Diensten und Websites von Apple und Drittanbietern (gemeinsam und einzeln als „Dienste“ bezeichnet). Solche Dienste sind möglicherweise nicht in xxxxx Sprachen oder in xxxxx Ländern verfügbar. Die Nutzung dieser Dienste erfordert Internetzugriff und die Nutzung bestimmter Dienste erfordert möglicherweise eine Apple-ID, setzt möglicherweise dein Einverständnis mit zusätzlichen Servicebedingungen voraus und unterliegt unter Umständen zusätzlichen Gebühren. Indem du diese Software zusammen mit einer Apple-ID oder einem anderen Apple-Dienst verwendest, erklärst du dein Einverständnis mit den anwendbaren Servicebedingungen für diesen Dienst, z. B. den neuesten Apple Media Services-Bedingungen für das Land, in dem du auf diese Services zugreifst, die du über die Webseite xxxxx://xxx.xxxxx.xxx/legal/ internet-services/itunes/ anzeigen und nachlesen kannst
Road Surfaces (1) Grade, shape, crown, and/or outslope surface and shoulders.
Searchable Whois Notwithstanding anything else in this Agreement, Registry Operator must offer a searchable Whois service compliant with the requirements described in Section 1.10 of Specification 4 of this Agreement. Registry Operator must make available the services only to authenticated users after they logged in by supplying proper credentials (i.e., user name and password). Registry Operator must issue such credentials exclusively to eligible users and institutions that supply sufficient proof of their legitimate interest in this feature (e.g., law enforcement agencies).
252 Physical Change (a) Forest Service shall adjust the Specified Road construction cost if, prior to acceptance under B6.36, a physical change, caused by a single event and not due to negligence of Purchaser, results in an increase or decrease in work and/or materials furnished by Purchaser involving additional estimated cost of:
Vlastnictví Zdravotnické zařízení si ponechá a bude uchovávat Zdravotní záznamy. Zdravotnické zařízení a Zkoušející převedou na Zadavatele veškerá svá práva, nároky a tituly, včetně práv duševního vlastnictví k Důvěrným informacím (ve smyslu níže uvedeném) a k jakýmkoli jiným Studijním datům a údajům.
Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.