We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.
For more information visit our privacy policy.Outputs Analogue and digital outputs of protected content are allowed if they meet the requirements in this section and if they are not forbidden elsewhere in this Agreement..
Devices BNY Mellon will restrict the transfer of Customer Data from its network to mass storage devices. BNY Mellon will use a mobile device management system or equivalent tool when mobile computing is used to provide the services. Applications on such authenticated devices will be housed within an encrypted container and BNY Mellon will maintain the ability to remote wipe the contents of the container.
Probes Network hosts used to perform (DNS, EPP, etc.) tests (see below) that are located at various global locations.
Technology Upgrades Notwithstanding any other provision of this Agreement, Verizon shall have the right to deploy, upgrade, migrate and maintain its network at its discretion. The Parties acknowledge that Verizon, at its election, may deploy fiber throughout its network and that such fiber deployment may inhibit or facilitate Ymax’s ability to provide service using certain technologies. Nothing in this Agreement shall limit Verizon's ability to modify its network through the incorporation of new equipment or software or otherwise. Ymax shall be solely responsible for the cost and activities associated with accommodating such changes in its own network.
Evaluation Software If the Software is an evaluation version or is provided to You for evaluation purposes, then, unless otherwise approved in writing by an authorized representative of Licensor, Your license to use the Software is limited solely for internal evaluation purposes in non-production use and in accordance with the terms of the evaluation offering under which You received the Software, and expires 90 days from installation (or such other period as may be indicated within the Software). Upon expiration of the evaluation period, You must discontinue use of the Software, return to an original state any actions performed by the Software, and delete the Software entirely from Your system and You may not download the Software again unless approved in writing by an authorized representative of Licensor. The Software may contain an automatic disabling mechanism that prevents its use after a certain period of time. RESTRICTIONS
XXX Hosting 10.1 XXX Hosting is not required for resale in the BellSouth region.
System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.
Photographs You give your permission to us to use any photograph or photographic image including video or video stills taken of you while you are in any public spaces, grounds, offices at the Property or any sponsored events at the Property. You grant us and the Manager and our designees, the irrevocable and unrestricted right and permission to copyright, in its own name or otherwise, and to use, re-use, publish and re-publish photographic or video portraits or pictures of you or in which you may be included, without restriction as to changes or alterations. This usage may be in conjunction with your own name or a fictitious name. It may involve reproductions in color or otherwise that may be made through any medium, and in any and all media now or hereafter known. Usage may include illustration, promotion, art, editorial, advertising, trade, or any other legal purpose. You also consent to the use of any printed matter in conjunction with that usage. You waive any right that you may have to inspect or approve the finished product, the advertising copy or other matter that may be used in that regard. I hereby waive any right that I may have to inspect or approve the finished product and the advertising copy or other matter that may be used in connection therewith or the use to which it may be applied. You agree that we, the Manager and our designees will have no liability due to any blurring, distortion, alteration, optical illusion, or use in composite form that may occur in taking or usage of any picture or in the subsequent processing or publication of the picture. You release us, the Manager, and our designees from all claims of any nature arising in any way from the use of your photograph or photographic image. This release contains the entire agreement on this subject matter.
Interfaces GTE provides the CLECs with choices for access to OSS pre-ordering, ordering, maintenance and repair systems. Availability of the interfaces is fundamental to the CLEC being able to effectively do business with GTE. Additionally, in many instances, CLEC personnel must work with the service personnel of GTE. Measurements in this category assess the availability to the CLECs of systems and personnel at GTE work centers.
Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.