Outside Devices Sample Clauses

Outside Devices a. Non-Power Up devices are not allowed to be connected to the Xxxxx network.
AutoNDA by SimpleDocs
Outside Devices a. Non-PowerUp devices are not to be brought on campus or allowed to connect to the network.
Outside Devices. Non-PowerUp laptop or tablets are NOT to be brought on campus or allowed to connect tothe HISD network.

Related to Outside Devices

  • Protective Devices Protective devices, wearing apparel, and other equipment necessary to protect employees from injury shall be provided by the County in accordance with practices now prevailing or as such practices may be improved from time to time by the County.

  • Mobile Devices Mobile devices which are issued by and belonging to the Contractor for purposes of processing Personal Data should have access control measures and remote wipe capability turned on. Procedures should be in place to report and wipe data off lost mobile devices immediately after detection of loss.

  • Outside Work All work necessary to the assembling, installation, erection, operation, maintenance, repair, control, in- spection and supervision of all electrical apparatus, devices, wires, cables, supports, insulators, conduc- tors, ducts and raceways when part of distributing systems outside of buildings, railroads and outside the directly related railroad property and yards. In- stalling and maintaining the catenary and trolley work on railroad property, and bonding of rails. All underground ducts and cables when they are in- stalled by and are part of the system of a distrib- uting company, except in power stations during new construction, including ducts and cables to adjacent switch racks or substations. All outdoor substations and electrical connections up to and including the setting of transformers and the connecting of the secondary buses thereto. Outside work to include renewable electrical energy sources such as solar photovoltaic, geothermal, wind, biomass, wave, etc., and other distributed en- ergy installations such as fuel cells, microturbines, etc.

  • Keys or Access Devices We’ll furnish keys and/or access devices on the Lease start date and only after: (1) all parties have signed the Lease and all other rental documents and (2) all applicable rents and security deposits have been paid in full.

  • CONTRACTOR PORTABLE DEVICES Contractor shall not place Data on any portable Device unless Device is located and remains within Contractor’s CONUS Data Center. For Authorized Users subject to ITS policies, the Data, and/or the portable device containing the Data, shall be destroyed in accordance with applicable ITS destruction policies (ITS Policy S13-003 Sanitization/Secure Disposal and S14-003 Information Security Controls or successor) when the Contractor is no longer contractually required to store the Data. TRANSFERRING OF DATA General Except as required for reliability, performance, security, or availability of the services, the Contractor will not transfer Data unless directed to do so in writing by the Authorized User. All Data shall remain in CONUS. At the request of the Authorized User, the Contractor will provide the services required to transfer Data from existing Databases to physical storage devices, to facilitate movement of large volumes of Data. The Authorized User may require several Cloud providers to share or transfer Data for a period of time. This will be provided for in the Authorized User Agreement or shall be assumed to be limited to a six month duration. Transfer of Data at End of Contract and/or Authorized User Agreement Term At the end of the Contract and/or Authorized User Agreement term, Contractor may be required to facilitate transfer of Data to a new Contractor. This transfer must be carried out as specified by the Authorized User in the Authorized User Agreement. Transfer of Data; Charges Contractor cannot charge for the transfer of Data unless the charges are provided for in response to an Authorized User RFQ. Transfer of Data; Contract Breach or Termination Notwithstanding Section 3.6.3, in the case of Contract breach or termination for cause of the Contract, all expenses for the transfer of Data shall be the responsibility of the Contractor.

  • Access to Network Interface Device (NID 2.4.3.1. Due to the wide variety of NIDs utilized by BellSouth (based on subscriber size and environmental considerations), Mpower may access the on-premises wiring by any of the following means: BellSouth shall allow Mpower to connect its loops directly to BellSouth’s multi-line residential NID enclosures that have additional space and are not used by BellSouth or any other telecommunications carriers to provide service to the premise. Mpower agrees to install compatible protectors and test jacks and to maintain the protection system and equipment and to indemnify BellSouth pursuant to Section 8 of the General Terms and Conditions of this Agreement.

  • Synchronization Rights The Licensor hereby grants limited synchronization rights for One (1) music video streamed online (Youtube, Vimeo, etc..) for up to 500000 non-monetized video streams on all total sites. A separate synchronization license will need to be purchased for distribution of video to Television, Film or Video game.

  • Devices BNY Mellon will restrict the transfer of Customer Data from its network to mass storage devices. BNY Mellon will use a mobile device management system or equivalent tool when mobile computing is used to provide the services. Applications on such authenticated devices will be housed within an encrypted container and BNY Mellon will maintain the ability to remote wipe the contents of the container.

  • Apple and Android Devices The following terms apply when you use a mobile application obtained from either the Apple Store or Google Play (each an “App Distributor”) to access the Site:

  • Evaluation Software If the Software is an evaluation version or is provided to You for evaluation purposes, then, unless otherwise approved in writing by an authorized representative of Licensor, Your license to use the Software is limited solely for internal evaluation purposes in non-production use and in accordance with the terms of the evaluation offering under which You received the Software, and expires 90 days from installation (or such other period as may be indicated within the Software). Upon expiration of the evaluation period, You must discontinue use of the Software, return to an original state any actions performed by the Software, and delete the Software entirely from Your system and You may not download the Software again unless approved in writing by an authorized representative of Licensor. The Software may contain an automatic disabling mechanism that prevents its use after a certain period of time. RESTRICTIONS

Time is Money Join Law Insider Premium to draft better contracts faster.