Online Only Trajectories Sample Clauses

Online Only Trajectories. Keonna Thomas As highlighted in the previous section, Keonna Thomas was notable for maintaining an active online presence which included online peer-to-peer conversations with a number of notable jihadists: Abdullah el-Faisal, Mujahid Miski, and Shawn Parson.260 The defence counsel’s sentencing memorandum notes that Thomas, who was unemployed and lived with her mother and two small children experienced emotional and physical isolation, which she fulfilled by turning to the Internet, which in turn led to her falling ‘prey to the promises made by young ISIL acolytes about a religious utopia in Raqqa.’261 Her lawyers also suggested that in her loneliness and desperation for social interaction, she spent 13 hours or more per day on jihadist online fora after receiving her first computer in 2010, which led to her becoming an outspoken supporter of Islamic fundamentalism.262 The prosecutors also paint the picture of a woman living a double life, on one hand quiet and reserved in the offline sphere and on the other an influential member of the jihadisphere, spreading propaganda and operational advice for those travelling to Syria.263 In Thomas’ case, it appears that her radical behaviour did not leave the confines of her own home – she booked her travel from Philadelphia to Barcelona with the intention of travelling to Istanbul by bus, but the Government executed a search warrant of her house days before her scheduled travel.264 Her heavy usage of the Internet, taken 260 USA v. Keonna Thomas, Criminal Complaint. 261 USA v. Keonna Thomas, Defendant’s Sentencing Memorandum, pp.3-4. 262 Jeremy Roebuck, North Philly Woman Gets 8 Year Term for Plan to Leave Kids, Marry IS Soldier, The Inquirer, September 6, 2017. Available at: http://www.philly.com/philly/news/pennsylvania/philadelphia/north-philly-mom-gets-8-year-term-for-plan- to-leave-kids-marry-isis-soldier-20170906.html. 263 USA v. Keonna Thomas, Government’s Sentencing Memorandum. 264 USA v. Keonna Thomas, Government’s Sentencing Memorandum. with reports of social isolation, description of leading a double-life, and a lack of evidence to suggest her behaviours spilled over into the offline domain, suggest that she is a strong candidate to be seen as an online only trajectory. Safya Roe Yassin There are strong parallels between Thomas’ case and that of Safya Roe Yassin. As with Thomas, Yassin’s filings describe her as a socially isolated mother living with a parent. In cross-examination in court, her father noted...
AutoNDA by SimpleDocs

Related to Online Only Trajectories

  • Web Hosting If Customer submits a Service Order(s) for web hosting services, the following terms shall also apply:

  • Access to Network Interface Device (NID 2.4.3.1. Due to the wide variety of NIDs utilized by BellSouth (based on subscriber size and environmental considerations), Mpower may access the on-premises wiring by any of the following means: BellSouth shall allow Mpower to connect its loops directly to BellSouth’s multi-line residential NID enclosures that have additional space and are not used by BellSouth or any other telecommunications carriers to provide service to the premise. Mpower agrees to install compatible protectors and test jacks and to maintain the protection system and equipment and to indemnify BellSouth pursuant to Section 8 of the General Terms and Conditions of this Agreement.

  • Purchase Order Flip via Ariba Network (AN) The online process allows suppliers to submit invoices via the AN for catalog and non- catalog goods and services. Contractors have the ability to create an invoice directly from their Inbox in their AN account by simply “flipping” the purchase order into an invoice. This option does not require any special software or technical capabilities. For the purposes of this section, the Contractor warrants and represents that it is authorized and empowered to and hereby grants the State and the third-party provider of MFMP the right and license to use, reproduce, transmit, distribute, and publicly display within the system the information outlined above. In addition, the Contractor warrants and represents that it is authorized and empowered to and hereby grants the State and the third-party provider the right and license to reproduce and display within the system the Contractor’s trademarks, system marks, logos, trade dress, or other branding designation that identifies the products made available by the Contractor under the Contract.

  • Video Display Terminals ‌ The Employer shall ensure that any new office equipment or facility required for use in conjunction with VDTs shall meet the standards recommended by the Workers' Compensation Board.

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

  • Loop Provisioning Involving Integrated Digital Loop Carriers 2.6.1 Where InterGlobe has requested an Unbundled Loop and BellSouth uses IDLC systems to provide the local service to the End User and BellSouth has a suitable alternate facility available, BellSouth will make such alternative facilities available to InterGlobe. If a suitable alternative facility is not available, then to the extent it is technically feasible, BellSouth will implement one of the following alternative arrangements for InterGlobe (e.g. hairpinning):

  • XXX Hosting 10.1 XXX Hosting is not required for resale in the BellSouth region.

  • Mobile Devices Mobile devices which are issued by and belonging to the Contractor for purposes of processing Personal Data should have access control measures and remote wipe capability turned on. Procedures should be in place to report and wipe data off lost mobile devices immediately after detection of loss.

  • Local Switching Interfaces 4.2.13.1 Newcomm shall order ports and associated interfaces compatible with the services it wishes to provide as listed in Exhibit A. BellSouth shall provide the following local switching interfaces:

  • Technical Standards Applicable to a Wind Generating Plant i. Low Voltage Ride-Through (LVRT) Capability A wind generating plant shall be able to remain online during voltage disturbances up to the time periods and associated voltage levels set forth in the standard below. The LVRT standard provides for a transition period standard and a post-transition period standard.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!