Keyboard and Mouse Sample Clauses

Keyboard and Mouse. 1) These items are to be checked regularly and made dust free and problem free. In case of defects they are to be replaced with reputed make.
AutoNDA by SimpleDocs
Keyboard and Mouse. 1. Key boards and mouse are to be replaced with a new one of reputed make as and when they are found to be malfunctioning/ Not working.
Keyboard and Mouse. ❑ Keyboard-to-user distance allows user to relax shoulders with elbows hanging close to body. ❑ Keyboard position is flat. ❑ Mouse-to-user distance - mouse is directly next to the keyboard. ❑ Mouse is on the same level as the keyboard.
Keyboard and Mouse. 7.7.3.1 THE KEYBOARD DESIGN MUST PREVENT MALFUNCTION DUE TO KEY "BOUNCE," SIMULTANEOUS CLOSURE OF MULTIPLE KEYS OR SPILLAGE OF LIQUIDS. The keyboard design WILL prevent malfunction to key "bounce," simultaneous closure of multiple keys or spillage of liquids. 7.7.3.2 THE KEYS SHOULD BE FORMED BY DOUBLE-SHOT MOLDING TO PREVENT DIRT AND DUST FROM OBLITERATING THE LEGENDS. The keys WILL be formed by double-shot molding to prevent dirt and dust from obliterating the legends. 7.7.3.3 THE KEYBOARD MUST BE DETACHED OR DETACHABLE FROM THE WORKSTATION ON AN EXTENDED, COILED CABLE, AND ITS POSITION MUST BE ADJUSTABLE BY THE OPERATOR. The keyboard WILL be detached or detachable from the workstation on an extended, coiled cable, and its position CAN be adjustable by the operator.

Related to Keyboard and Mouse

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Trunk Group Architecture and Traffic Routing 5.2.1 The Parties shall jointly establish Access Toll Connecting Trunks between CLEC and CBT by which they will jointly provide Tandem-transported Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic from and to CLEC's Customers. 5.2.2 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access and non-translated Toll Free traffic (e.g., 800/888) to allow CLEC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier that is connected to the CBT access Tandem. 5.2.3 The Access Toll Connecting Trunks shall be one-way or two-way trunks, as mutually agreed, connecting an End Office Switch that CLEC utilizes to provide Telephone Exchange Service and Switched Exchange Access Service in the given LATA to an access Tandem Switch CBT utilizes to provide Exchange Access in the LATA.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Metadata Where the Contractor has or generates metadata as a result of services provided to the Province, where that metadata is personal information, the Contractor will: not use it or disclose it to any other party except where the Agreement otherwise specifies; and remove or destroy individual identifiers, if practicable.

  • Synchronization The Licensor hereby grants limited synchronization rights for One (1) music video streamed online (Youtube, Vimeo, etc..) for up to 500,000 non-monetized video streams on all total sites. A separate synchronisation license will need to be purchased for distribution of video to Television, Film or Video game.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • XXX Hosting 10.1 XXX Hosting is not required for resale in the BellSouth region.

  • Rosters 8.1 As far as practically possible, the Employer will draw up a roster 1 week in advance. Changes to rosters may occur with 24 hours notice or, subject to the availability of the Employee, with less notice if by mutual consent. 8.2 The Employer will ordinarily roster Employees in a manner that is both fair and equitable to ensure that, where applicable, the allocation of weekend and public holiday hours are equally divided between Employees on a rotating basis.

  • - C and M Employees shall be designated under the following bargaining unit department. - Custodial and Maintenance

  • By Microsoft Microsoft will defend Customer against any third-party claim to the extent it alleges that a Product or Fix made available by Microsoft for a fee and used within the scope of the license granted under this agreement (unmodified from the form provided by Microsoft and not combined with anything else), misappropriates a trade secret or directly infringes a patent, copyright, trademark or other proprietary right of a third party. If Microsoft is unable to resolve a claim of infringement under commercially reasonable terms, it may, as its option, either: (1) modify or replace the Product or fix with a functional equivalent; or (2) terminate Customer’s license and refund any prepaid license fees (less depreciation on a five-year, straight-line basis) for perpetual licenses and any amount paid for Online Services for any usage period after the termination date. Microsoft will not be liable for any claims or damages due to Customer’s continued use of a Product or Fix after being notified to stop due to a third- party claim.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!