Locking Devices Sample Clauses

Locking Devices. Some Software may require the use of a key to prevent unauthorized installation and use of the Software, but the Software may not include expiration codes, “time bombs”, or similar devices that can disable the software once a proper key is provided. Further, the software may not contain any routines, functions, or devices that can or are designed to transmit or transfer any data surreptitiously to the Contractor or any other party. Nor may the software contain any routines, functions, or similar devices designed to permit the Contractor or a third party to surreptitiously access data on the State’s network or on any of the State’s computers. Should the State need assistance with a key or similar device to use the Software within the State’s scope of license, the Contractor will assist the State at any time and without charge or fee, regardless of whether such Software is then under Support.
AutoNDA by SimpleDocs
Locking Devices. A. Slide Bolt: Fabricate with side-locking bolts to engage through slots in tracks for locking by padlock, located on single-jamb side, operable from inside only.
Locking Devices. Curtain shall be located at each end of bottom bar by concealed slide bolts which shall engage a lock wedge in each guide. A plunger type cylinder lock is provide as standard equipment.
Locking Devices. If Tenant places any locking devices on the entrances to the Premises, Tenant must ensure the County has accurate and up-to-date contact information for an individual that can grant access to the Premises, and must provide a key or entry instructions to the Airport Director.

Related to Locking Devices

  • Mobile Devices Mobile devices which are issued by and belonging to the Contractor for purposes of processing Personal Data should have access control measures and remote wipe capability turned on. Procedures should be in place to report and wipe data off lost mobile devices immediately after detection of loss.

  • CONTRACTOR PORTABLE DEVICES Contractor shall not place Data on any portable Device unless Device is located and remains within Contractor’s CONUS Data Center. For Authorized Users subject to ITS policies, the Data, and/or the portable device containing the Data, shall be destroyed in accordance with applicable ITS destruction policies (ITS Policy S13-003 Sanitization/Secure Disposal and S14-003 Information Security Controls or successor) when the Contractor is no longer contractually required to store the Data. TRANSFERRING OF DATA General Except as required for reliability, performance, security, or availability of the services, the Contractor will not transfer Data unless directed to do so in writing by the Authorized User. All Data shall remain in CONUS. At the request of the Authorized User, the Contractor will provide the services required to transfer Data from existing Databases to physical storage devices, to facilitate movement of large volumes of Data. The Authorized User may require several Cloud providers to share or transfer Data for a period of time. This will be provided for in the Authorized User Agreement or shall be assumed to be limited to a six month duration. Transfer of Data at End of Contract and/or Authorized User Agreement Term At the end of the Contract and/or Authorized User Agreement term, Contractor may be required to facilitate transfer of Data to a new Contractor. This transfer must be carried out as specified by the Authorized User in the Authorized User Agreement. Transfer of Data; Charges Contractor cannot charge for the transfer of Data unless the charges are provided for in response to an Authorized User RFQ. Transfer of Data; Contract Breach or Termination Notwithstanding Section 3.6.3, in the case of Contract breach or termination for cause of the Contract, all expenses for the transfer of Data shall be the responsibility of the Contractor.

  • Safety Devices All Products provided under the Contract shall be equipped with required safety devices to comply with all applicable codes, laws, and regulations that are in effect at the time of delivery.

  • Protective Devices Protective devices, wearing apparel, and other equipment necessary to protect employees from injury shall be provided by the County in accordance with practices now prevailing or as such practices may be improved from time to time by the County.

  • Removable media devices All electronic files that contain County PHI or PI data must be encrypted when stored on any removable media or portable device (i.e. USB thumb drives, floppies, CD/DVD, smartphones, backup tapes etc.). Encryption must be a FIPS 140-2 certified algorithm which is 128bit or higher, such as AES.

  • Orthotic Appliances Coverage for Orthotic Appliances is limited to custom-made leg, arm, back and neck braces, when related to a surgical procedure or when used in an attempt to avoid surgery, and is necessary to carry out normal activities of daily living excluding sports activities. Coverage includes the initial purchase, fitting or adjustment. Replacements are covered only when Medically Necessary due to a change in bodily configuration. All other Orthotic Appliances are not covered. The determination of whether a covered item will be paid under the DME, orthotics or prosthetics benefits will be based upon its classification as defined by the Centers for Medicare and Medicaid Services.

  • Access to Network Interface Device (NID 2.4.3.1. Due to the wide variety of NIDs utilized by BellSouth (based on subscriber size and environmental considerations), Mpower may access the on-premises wiring by any of the following means: BellSouth shall allow Mpower to connect its loops directly to BellSouth’s multi-line residential NID enclosures that have additional space and are not used by BellSouth or any other telecommunications carriers to provide service to the premise. Mpower agrees to install compatible protectors and test jacks and to maintain the protection system and equipment and to indemnify BellSouth pursuant to Section 8 of the General Terms and Conditions of this Agreement.

  • Intercept Devices 26.1.1.1 Local and federal law enforcement agencies periodically request information or assistance from local telephone service providers. When either Party receives a request associated with an End User of the other Party, it shall refer such request to the Party that serves such End User, unless the request directs the receiving Party to attach a pen register, trap-and-trace or form of intercept on the Party's facilities, in which case that Party shall comply with any valid request.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • Devices BNY Mellon will restrict the transfer of Customer Data from its network to mass storage devices. BNY Mellon will use a mobile device management system or equivalent tool when mobile computing is used to provide the services. Applications on such authenticated devices will be housed within an encrypted container and BNY Mellon will maintain the ability to remote wipe the contents of the container.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!