Peripherals and Accessories Sample Clauses

Peripherals and Accessories. ⏹ Purchase SIM cards on behalf of staff to prevent them from owning the phone number assigned to their device. This makes it easier to reassign devices and numbers when staff changes occur. This is particularly important if a staff person becomes disgruntled or is asked to leave the organization, as they can immediately be removed from official communication lines. Consult with local network providers about options such as closed user groups (CUGs). ⏹ Smartphones are likely to have a built-in camera and keyboard, limiting the need for connection to external input devices. ⏹ While tablets can accommodate an external keyboard and mouse, not using them makes it easier to transport, store, and sanitize such devices. ⏹ Furnish each mobile device with a durable case and a screen protector not only for protection from damage but also to keep them looking new. ⏹ Consider purchasing privacy screen protectors of tinted tempered glass, if available, instead of transparent ones. They allow mobile devices to be used privately and in public places without revealing confidential information. The user can see the information being displayed, but others on either side of them will only see a darkened screen. This is particularly important if the worker will be using the device in the field or at home instead of a project office. ⏹ Purchase a device case and a bag to carry the device in the field. A case is particularly useful if the device will be handed to clients to enter data. However, nothing carried by workers should indicate that a device is inside, as this may increase the probability of theft. Pro tips for virtual client support staff ⏹ Workers should only use devices provided by their organizations. Any use of personally owned devices must be approved and noted by management. Workers using their own devices should only engage in official activities when using a SIM card provided by the organization. ⏹ Workers using devices purchased by the program must use the provided carrying cases and screen protectors. ⏹ Only use original charging accessories purchased from a trusted manufacturer. Do not use public USB charging stations and never connect devices to government computers, whether via cable connection, Wi-Fi, or Bluetooth. ⏹ If an individual is using a mobile device and a call comes in for another outreach worker, have that worker accept the call if they are available. If they are not available, inform the client that the worker is not close by and offer a call b...
AutoNDA by SimpleDocs
Peripherals and Accessories. ♦ Portable music devices ♦ Personal (non-County) mass storage devices (hard drives, thumb drives, etc) ♦ Webcams ♦ Printer sharing through a PC ♦ Wireless printing

Related to Peripherals and Accessories

  • Devices BNY Mellon will restrict the transfer of Customer Data from its network to mass storage devices. BNY Mellon will use a mobile device management system or equivalent tool when mobile computing is used to provide the services. Applications on such authenticated devices will be housed within an encrypted container and BNY Mellon will maintain the ability to remote wipe the contents of the container.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Orthotic Appliances Coverage for Orthotic Appliances is limited to custom-made leg, arm, back and neck braces, when related to a surgical procedure or when used in an attempt to avoid surgery, and is necessary to carry out normal activities of daily living excluding sports activities. Coverage includes the initial purchase, fitting or adjustment. Replacements are covered only when Medically Necessary due to a change in bodily configuration. All other Orthotic Appliances are not covered. The determination of whether a covered item will be paid under the DME, orthotics or prosthetics benefits will be based upon its classification as defined by the Centers for Medicare and Medicaid Services.

  • Hardware IF HARDWARE IS IDENTIFIED ON A TRANSACTION DOCUMENT, THE SALE AND USE OF THE HARDWARE WILL BE GOVERNED BY TERMS OTHER THAN THIS XXXX. OT DISCLAIMS ALL WARRANTIES AND LIABILITY WITH RESPECT TO THE HARDWARE.

  • Interfaces Bellcore’s GR-446-CORE defines the interface between the administration system and LIDB including specific message formats. (Bellcore’s TR-NWP-000029, Section 10)

  • MOBILE DATA COMPUTERS 20 1. As part of the law enforcement services to be provided to CITY, COUNTY 21 has provided, or will provide, mobile data computers (hereinafter called 22 “MDCs”) that are or will be mounted in patrol vehicles and motorcycles, 23 designated by COUNTY for use within CITY limits.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • Software Title and ownership to Existing Software Product(s) delivered by Contractor under the Contract that is normally commercially distributed on a license basis by the Contractor or other independent software vendor proprietary owner (“Existing Licensed Product”), embedded in the Custom Products, shall remain with Contractor or the proprietary owner of other independent software vendor(s) (ISV). Effective upon acceptance, such Product shall be licensed to Authorized User in accordance with the Contractor or ISV owner’s standard license agreement, provided, however, that such standard license, must, at a minimum: (a) grant Authorized User a non-exclusive, perpetual license to use, execute, reproduce, display, perform, adapt (unless Contractor advises Authorized User as part of Contractor’s proposal that adaptation will violate existing agreements or statutes and Contractor demonstrates such to the Authorized User’s satisfaction) and distribute Existing Licensed Product to the Authorized User up to the license capacity stated in the Purchase Order or work order with all license rights necessary to fully effect the general business purpose(s) stated in the Bid or Authorized User’s Purchase Order or work order, including the financing assignment rights set forth in paragraph (c) below; and (b) recognize the State of New York as the licensee where the Authorized User is a state agency, department, board, commission, office or institution. Where these rights are not otherwise covered by the ISV’s owner’s standard license agreement, the Contractor shall be responsible for obtaining these rights at its sole cost and expense. The Authorized User shall reproduce all copyright notices and any other legend of ownership on any copies authorized under this clause. Open source software is developed independently of Contractor and may be governed by a separate license (“open source software”). If the open source software is governed by a separate License and provided under this Contract, Contractor shall provide a copy of that license in the applicable Documentation and the Authorized User's license rights and obligations with respect to that open source software shall be defined by those separate license terms and subject to the conditions, if any, therein. Nothing in this Contract shall restrict, limit, or otherwise affect any rights or obligations the Authorized User may have, or conditions to which the Authorized User may be subject, under such separate open source license terms.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

Time is Money Join Law Insider Premium to draft better contracts faster.