Password to Open the Document Sample Clauses

Password to Open the Document allows you to set a password for opening the encrypted PDF. Change Permissions Password - prevents users from changing the permission settings. The user can view the file in Acrobat Reader but must enter the specified Permissions password in order to change the file’s Security and Permissions settings.
AutoNDA by SimpleDocs

Related to Password to Open the Document

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CSTC chooses to subtend a Verizon access Tandem, CSTC’s NPA/NXX must be assigned by CSTC to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 CSTC shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from CSTC’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office CSTC utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow CSTC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • How to Obtain Warranty Service The Warranty Holder must inspect the Flooring for Manufacturing Defects caused by improper milling, grading, staining, and coating, and report any such defects to Cali Bamboo, prior to installation of the Flooring. To obtain warranty service, the Warranty Holder must contact Cali Bamboo’s Customer Experience Department: xxxxxxxxxxxxxxx@xxxxxxxxxx.xxx/ 000- 000-0000. Warranty claims must be received within 30 calendar days after the Warranty Holder identifies the Manufacturing Defect or other basis for a warranty claim. To be covered under this Cali Bamboo limited warranty, the Warranty Holder must provide documentation of sales order and proof that the Flooring was properly installed in accordance with the Installation Guide (defined below). Cali Bamboo reserves the right to retain a certified and independent National Wood Flooring Association inspector (“NWFA Inspector”) to verify the Warranty Holder’s warranty claims. The determination of the NWFA Inspector regarding the warranty claim is not binding on either Cali Bamboo or on the Warranty Holder. A determination that does not verify the warranty claim shall not affect the Warranty Holder’s right to submit its claim to arbitration in accordance with the terms of the Arbitration Agreement (as defined in Cali Bamboo’s Terms and Conditions of Purchase). The performance of the inspection, however, if requested by Xxxx Xxxxxx and assuming that Xxxx Xxxxxx advances the full cost of the inspection as described above, is a requirement for the Warranty Holder to submit a warranty claim to arbitration under the Arbitration Agreement. For specific instructions on how to obtain warranty service for defective Flooring, visit the Cali Bamboo website xxxxx://xxx.xxxxxxxxxx.xxx/flooring-warranty/. This limited warranty covers Flooring that is both (i) installed with strict adherence to Cali Bamboo’s Odyssey Engineered flooring installation guide found online at xxxxx://xxx.xxxxxxxxxx.xxx/flooring-installation/ (the “Installation Guide”) and

  • Books and Records; Certain Funds Received After the Cut-Off Date From and after the sale of the Mortgage Loans to the Purchaser, record title to each Mortgage (other than with respect to any Outside Serviced Mortgage Loan) and each Note shall be transferred to the Trustee subject to and in accordance with this Agreement. Any funds due after the Cut-Off Date in connection with a Mortgage Loan received by the Seller shall be held in trust on behalf of the Trustee (for the benefit of the Certificateholders) as the owner of such Mortgage Loan and shall be transferred promptly to the Certificate Administrator. All scheduled payments of principal and interest due on or before the Cut-Off Date but collected after the Cut-Off Date, and all recoveries and payments of principal and interest collected on or before the Cut-Off Date (only in respect of principal and interest on the Mortgage Loans due on or before the Cut-Off Date and principal prepayments thereon), shall belong to, and shall be promptly remitted to, the Seller. The transfer of each Mortgage Loan shall be reflected on the Seller’s balance sheets and other financial statements as the sale of such Mortgage Loan by the Seller to the Purchaser. The Seller intends to treat the transfer of each Mortgage Loan to the Purchaser as a sale for tax purposes. Following the transfer of the Mortgage Loans by the Seller to the Purchaser, the Seller shall not take any actions inconsistent with the ownership of the Mortgage Loans by the Purchaser and its assignees. The transfer of each Mortgage Loan shall be reflected on the Purchaser’s balance sheets and other financial statements as the purchase of such Mortgage Loan by the Purchaser from the Seller. The Purchaser intends to treat the transfer of each Mortgage Loan from the Seller as a purchase for tax purposes. The Purchaser shall be responsible for maintaining, and shall maintain, a set of records for each Mortgage Loan which shall be clearly marked to reflect the transfer of ownership of each Mortgage Loan by the Seller to the Purchaser pursuant to this Agreement. It is expressly agreed and understood that, notwithstanding the assignment of the Loan Documents, it is expressly intended that the Seller will receive the benefit of any securitization indemnification provisions in the Loan Documents.

  • Exceptional Access to Thick Registration Data In case of a registrar failure, deaccreditation, court order, etc. that prompts the temporary or definitive transfer of its domain names to another registrar, at the request of ICANN, Registry Operator will provide ICANN with up-­‐to-­‐date data for the domain names of the losing registrar. The data will be provided in the format specified in Specification 2 for Data Escrow. The file will only contain data related to the domain names of the losing registrar. Registry Operator will provide the data as soon as commercially practicable, but in no event later than five (5) calendar days following ICANN’s request. Unless otherwise agreed by Registry Operator and ICANN, the file will be made available for download by ICANN in the same manner as the data specified in Section 3.1 of this Specification.

  • Background Data The Disclosing Party's Background Data, if any, will be identified in a separate technical document.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes. 11.2 We may (i) compile statistical and other information related to the performance, operation and use of the Services, and (ii) use data from the Services in aggregated form for security and operations management, to create statistical analyses, and for research and development purposes (clauses i and ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly available; however, Service Analyses will not incorporate Your Content, Personal Data or Confidential Information in a form that could serve to identify You or any individual. We retain all intellectual property rights in Service Analyses. 11.3 We may provide You with the ability to obtain certain Oracle Software (as defined below) for use with the Services. If we provide Oracle Software to You and do not specify separate terms for such software, then such Oracle Software is provided as part of the Services and You have the non-exclusive, worldwide, limited right to use such Oracle Software, subject to the terms of this Agreement and Your order (except for separately licensed elements of the Oracle Software, which separately licensed elements are governed by the applicable separate terms), solely to facilitate Your use of the Services. You may allow Your Users to use the Oracle Software for this purpose, and You are responsible for their compliance with the license terms. Your right to use any Oracle Software will terminate upon the earlier of our notice (by web posting or otherwise) or the end of the Services associated with the Oracle Software. Notwithstanding the foregoing, if Oracle Software is licensed to You under separate terms, then Your use of such software is governed by the separate terms. Your right to use any part of the Oracle Software that is licensed under the separate terms is not restricted in any way by this Agreement.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Procurement of Recovered Materials In the performance of this contract, the Contractor shall make maximum use of products containing recovered materials that are EPA-designated items unless the product cannot be acquired

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!