Mail Drop Sample Clauses

Mail Drop. Not to permit anyone other than a Household Member to use the Unit as an address or "mail drop."
AutoNDA by SimpleDocs

Related to Mail Drop

  • Mail Service 1. The Union shall be authorized to use the Agency’s internal mail distribution system, and the electronic mail system (e-mail), to conduct Union business which is necessary for the effective representation of bargaining unit employees. 2. Union representatives shall observe all Agency rules and regulations governing the use of mail distribution systems (electronic or otherwise). Failure to do so may result in denial of access of use.

  • Trademark Clearinghouse 4.1 Notwithstanding the requirements of Section 2.8 of the Agreement, Section 1 of Specification 7 to the Agreement and Section 2 of the Trademark Clearinghouse Rights Protection Mechanism Requirements (the “TMCH Requirements”), Registry Operator is not required to provide a Sunrise Period (as defined in the TMCH Requirements) or, except as set forth herein, otherwise comply with the obligations set forth in Section 2 of the TMCH Requirements (collectively, the “Sunrise Requirements”) so long as the TLD continues to be qualified as a .Brand TLD by ICANN. 4.2 Registry Operator must comply with all other provisions of the TMCH Requirements, including completing the Integration Testing required by Section 1 of the TMCH Requirements and providing the Claims Services required by Section 3 of the TMCH Requirements. Registry Operator will provide ICANN (i) confirmation of completion of Integration Testing and (ii) notice of the start date (the “Claims Commencement Date”) and end date for the Claims Period (as defined in the TMCH Requirements) for the TLD, in each case via the customer services portal at xxxx://xxxxxxx.xxxxxx.xxxxx.xxx/. Registry Operator may not Allocate (as defined in the TMCH Requirements) or register a domain name in the TLD (except for “NIC” and self-­‐allocation or registration to itself of domain names pursuant to Section 3.2 of Specification 5) prior to the Claims Commencement Date. 4.3 Registry Operator must comply with the Sunrise Requirements effective as of the Disqualification Date and commence a Sunrise Period within 60 calendar days of the Disqualification Date. If, at the Disqualification Date, the Trademark Clearinghouse or any successor or alternative trademark validation authority appointed by ICANN is not in operation, Registry Operator must implement the Sunrise Requirements through an alternative mechanism developed by Registry Operator that is reasonably acceptable to ICANN. As of the Disqualification Date, Registry Operator may not Allocate or register any additional domain names to third parties prior to the Allocation or registration of all Sunrise Period registrations except as permitted by Section 2.2.4 of the TMCH Requirements. In the event ICANN develops an alternative version of the TMCH Requirements specifically for .Brand TLDs or former .Brand TLDs, Registry Operator agrees to comply with such alternative requirements if such requirements are similar to the TMCH Requirements in effect as of the date hereof as modified by this Specification 13.

  • Mailboxes Each department or unit shall make available a convenient receptacle at a designated location for Employees to receive College business correspondence.

  • Mail Service Interruption If by reason of any interruption of mail service, actual or threatened, any notice to be given to the Trustee would reasonably be unlikely to reach its destination by the time notice by mail is deemed to have been given pursuant to Section 13.3, such notice shall be valid and effective only if delivered at the appropriate address in accordance with Section 13.3.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Usage for Voice Mail Message Service Rated Incollects (originated in BellSouth and from other companies) can also be on Optional Daily Usage File. Rated Incollects will be intermingled with BellSouth recorded rated and unrated usage. Rated Incollects will not be packed separately.

  • Electronic Mail (E-mail If you send the Bank an e-mail message, the Bank will be deemed to have received it on the following business day. You should not rely on e-mail if you need to report an unauthorized transaction from one of your accounts or if you need to stop a payment that is scheduled to occur. • NOTE: E-mail transmissions outside of the Online Banking site are not secure. We advise you not to send us or ask for sensitive information such as account numbers, Password, account information, etc. via any general or public e-mail system. If you wish to contact us electronically, please use the e- mail link provided on our Online Banking site. Use this secure form to e-mail the Bank regarding inquiries about an electronic funds transfer error resolution, reporting unauthorized transactions, or contacting the Bank regarding other concerns of a confidential nature.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Encrypt or Encryption As defined in the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Security Rule at 45 CFR 164.304, means the use of an algorithmic process to transform Personally Identifiable Information into an unusable, unreadable, or indecipherable form in which there is a low probability of assigning meaning without use of a confidential process or key.

  • Transmission encryption All data transmissions of County PHI or PI outside the secure internal network must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as AES. Encryption can be end to end at the network level, or the data files containing PHI can be encrypted. This requirement pertains to any type of PHI or PI in motion such as website access, file transfer, and E-Mail.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!