Telemedicine Services This plan covers clinically appropriate telemedicine services when the service is provided via remote access through an on-line service or other interactive audio and video telecommunications system in accordance with R.I. General Law § 27-81-1. Clinically appropriate telemedicine services may be obtained from a network provider, and from our designated telemedicine service provider. When you seek telemedicine services from our designated telemedicine service provider, the amount you pay is listed in the Summary of Medical Benefits. When you receive a covered healthcare service from a network provider via remote access, the amount you pay depends on the covered healthcare service you receive, as indicated in the Summary of Medical Benefits. For information about telemedicine services, our designated telemedicine service provider, and how to access telemedicine services, please visit our website or contact our Customer Service Department.
Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.
DUŠEVNÍ VLASTNICTVÍ The Institution acknowledges and agrees that the Sponsor shall have exclusive ownership rights to all Poskytovatel uznává a souhlasí, že Zadavatel bude mít výhradní vlastnická práva ke všem Study Data, improvements, developments, discoveries, inventions, work, know-how and other rights (whether or not patentable), created, developed, and/or reduced to practice as a result of or in connection with the conduct of the Study and/or the use of the Study Drug or the Confidential Information, together with all intellectual property rights relating thereto (“Intellectual Property”). The Institution shall promptly disclose in writing to PSI and the Sponsor all Intellectual Property made by the Institution, the Investigator and/or the Study Personnel. At the Sponsor's request, the Institution shall cause all rights titles and interests in and to any such Intellectual Property to be assigned to the Sponsor without additional compensation and provide reasonable assistance to obtain patents, including causing the execution of any invention assignment or other documents. Studijním údajům, vylepšením, na vývoj, k objevům, vynálezům, dílům, know-how a dalším právům (ať už patentovatelným či nikoli), vytvořeným, vyvinutým, a/nebo uvedeným do praxe v důsledku nebo v souvislosti s prováděním Studie, a/nebo používáním Studijního léku nebo Důvěrných informací společně s právy duševního vlastnictví s nimi souvisejícími (dále jen „Duševní vlastnictví“). Poskytovatel bude neprodleně písemně informovat PSI a Zadavatele o veškerém Duševním vlastnictví vytvořeném Poskytovatelem, Hlavním zkoušejícím a/nebo Studijním personálem. Na žádost Zadavatele zajistí Poskytovatel převod veškerých práv a zájmů týkajících se Duševního vlastnictví na Zadavatele bez další odměny a poskytne přiměřenou součinnost k získání patentu včetně zajištění podpisu dokumentů k převodu objevu nebo jiných dokumentů.
Nepotism No employee shall be awarded a position where he/she is to be directly supervised by a member of his/her immediate family. “
Vlastnictví Zdravotnické zařízení si ponechá a bude uchovávat Zdravotní záznamy. Zdravotnické zařízení a Zkoušející převedou na Zadavatele veškerá svá práva, nároky a tituly, včetně práv duševního vlastnictví k Důvěrným informacím (ve smyslu níže uvedeném) a k jakýmkoli jiným Studijním datům a údajům.
Generelt A. Apple Inc. (“Apple”) giver hermed licenstager licens til at bruge Apples software samt tredjeparters software, dokumentation, grænseflader, indhold, skrifter og evt. data, som følger med denne licens, uanset om de forefindes som ROM (Read Only Memory) eller på andet medie (under et kaldet “Apple- software”) i henhold til betingelserne i denne licensaftale. Apple og/eller Apples licensgivere bevarer ejendomsretten til selve Apple-softwaren og forbeholder sig alle de rettigheder, som ikke udtrykkeligt er givet til licenstager.
Technology Research Analyst Job# 1810 General Characteristics Maintains a strong understanding of the enterprise’s IT systems and architectures. Assists in the analysis of the requirements for the enterprise and applying emerging technologies to support long-term business objectives. Responsible for researching, collecting, and disseminating information on emerging technologies and key learnings throughout the enterprise. Researches and recommends changes to foundation architecture. Supports research projects to identify and evaluate emerging technologies. Interfaces with users and staff to evaluate possible implementation of the new technology in the enterprise, consistent with the goal of improving existing systems and technologies and in meeting the needs of the business. Analyzes and researches process of deployment and assists in this process.
Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.
Certified and Minority Business Enterprises Reports Upon Customer request, the Contractor shall report to the requesting Customer the Contractor’s spend with certified and other minority business enterprises in the provision of commodities or services related to the Customer’s orders. These reports shall include the period covered, the name, minority code, and Federal Employer Identification Number of each minority business utilized during the period; commodities and services provided by the minority business enterprise, and the amount paid to each minority business enterprise on behalf of the Customer.
SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.