Mobile Handheld Smart Card Device Sample Clauses

Mobile Handheld Smart Card Device. These devices are standalone devices capable of reading & updating smart cards based on the programmed business logic and verifying live fingerprints against those stored on a smart card. These devices do not require a computer or a permanent power source for transacting. These devices could be used for  Renewal of policy when no modification is required to the cardOffline verification and transacting at hospitals or mobile camps in case computer is not available.  Reading and updating microprocessor smart cards  Fingerprint verification  They should be programmable with inbuilt security features to secure against tampering.  Memory for data storage  Capable of printing receipts without any external interface  Capable of data transfer to personal computers and over GPRS, phone line  Secure Application loading – Application loading to be secure using KEYs  Rechargeable batteries  At least 2 Full size smart card reader and one XXX slot  Display  Keypad for functioning the application  Integrated Printer  Optical biometric verification capabilitywith similar specifications as mentioned for Fingerprint scanners abovein the hardware section  Allowing 1:1 search in the biometric module  Capability to connect to PC, telephone, modem, GPRS or any other mode of data transfer  PCI Compliance
AutoNDA by SimpleDocs
Mobile Handheld Smart Card Device. These devices are standalone devices capable of reading & updating smart cards based on the programmed business logic and verifying live fingerprints against those stored on a smart card. These devices do not require a computer or a permanent power source for transacting. These devices could be used for • Renewal of policy when no modification is required to the cardOffline verification and transacting at hospitals or mobile camps in case computer is not available. The main features of these devices are: • Reading and updating microprocessor smart cards • Fingerprint verification • They should be programmable with inbuilt security features to secure against tampering. • Memory for data storage • Capable of printing receipts without any external interface • Capable of data transfer to personal computers and over GPRS, phone line • Secure Application loading – Application loading to be secure using KEYs • Rechargeable batteries Specifications • At least 2 Full size smart card reader and one XXX slot • Display insurance company at the time of empanelling the hospital. Note: All specifications mentioned in the document for devices are minimum criteria and not exact criteria. • Keypad for functioning the application Insurance Co. Ltd. • Integrated Printer • Optical biometric verification capability with similar specifications as mentioned for Fingerprint scanners above in the hardware section • Allowing 1:1 search in the biometric module • Capability to connect to PC, telephone, modem, GPRS or any other mode of data transfer • PCI Compliance

Related to Mobile Handheld Smart Card Device

  • Telemedicine Services This plan covers clinically appropriate telemedicine services when the service is provided via remote access through an on-line service or other interactive audio and video telecommunications system in accordance with R.I. General Law § 27-81-1. Clinically appropriate telemedicine services may be obtained from a network provider, and from our designated telemedicine service provider. When you seek telemedicine services from our designated telemedicine service provider, the amount you pay is listed in the Summary of Medical Benefits. When you receive a covered healthcare service from a network provider via remote access, the amount you pay depends on the covered healthcare service you receive, as indicated in the Summary of Medical Benefits. For information about telemedicine services, our designated telemedicine service provider, and how to access telemedicine services, please visit our website or contact our Customer Service Department.

  • End User This agreement shall bind the ordering activity as end user but shall not operate to bind a Government employee or person acting on behalf of the Government in his or her personal capacity.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If ECI chooses to subtend a Verizon access Tandem, ECI’s NPA/NXX must be assigned by ECI to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 ECI shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from ECI’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office ECI utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow ECI’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • Interoperability To the extent required by applicable law, Cisco shall provide You with the interface information needed to achieve interoperability between the Software and another independently created program. Cisco will provide this interface information at Your written request after you pay Cisco’s licensing fees (if any). You will keep this information in strict confidence and strictly follow any applicable terms and conditions upon which Cisco makes such information available.

  • Data Input Control It will be possible to retrospectively examine and establish whether and by whom Personal Data have been entered, modified or removed from SAP data processing systems.

  • Online Services Microsoft warrants that each Online Service will perform in accordance with the applicable SLA during Customer’s use. Customer’s remedies for breach of this warranty are described in the SLA.

  • Registry Interoperability and Continuity Registry Operator shall comply with the Registry Interoperability and Continuity Specifications as set forth in Specification 6 attached hereto (“Specification 6”).

  • Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Evaluation Software If the Software is an evaluation version or is provided to You for evaluation purposes, then, unless otherwise approved in writing by an authorized representative of Licensor, Your license to use the Software is limited solely for internal evaluation purposes in non-production use and in accordance with the terms of the evaluation offering under which You received the Software, and expires 90 days from installation (or such other period as may be indicated within the Software). Upon expiration of the evaluation period, You must discontinue use of the Software, return to an original state any actions performed by the Software, and delete the Software entirely from Your system and You may not download the Software again unless approved in writing by an authorized representative of Licensor. The Software may contain an automatic disabling mechanism that prevents its use after a certain period of time. RESTRICTIONS

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!