Images If applicable, the CONSULTANT is prohibited from capturing on any visual medium images of any property, logo, student, or employee of the DISTRICT, or any image that represents the DISTRICT without express written consent from the DISTRICT.
Access to Software Access Rights to Software which is Results shall comprise: Access to the Object Code; and, where normal use of such an Object Code requires an Application Programming Interface (hereafter API), Access to the Object Code and such an API; and, if a Party can show that the execution of its tasks under the Project or the Exploitation of its own Results is technically or legally impossible without Access to the Source Code, Access to the Source Code to the extent necessary. Background shall only be provided in Object Code unless otherwise agreed between the Parties concerned.
Metadata Bibliographical, structural & descriptive data of the Licensed Material as defined in Schedule 5.
PHOTOGRAPHS AND VIDEOS Resident consents to Owner’s use of photographs and/or video images of the Resident and the Premises, including those taken at functions or events sponsored by the Community, for the purpose of advertising the Community or other similar communities owned or operated by Owner. Owner may use these images in advertising, websites, and social networking sites such as Facebook for marketing and promotional purposes. Resident consents to the publication of these images and waives any claims against Owner for use of such images.
Devices BNY Mellon will restrict the transfer of Customer Data from its network to mass storage devices. BNY Mellon will use a mobile device management system or equivalent tool when mobile computing is used to provide the services. Applications on such authenticated devices will be housed within an encrypted container and BNY Mellon will maintain the ability to remote wipe the contents of the container.
Encrypt or Encryption As defined in the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Security Rule at 45 CFR 164.304, means the use of an algorithmic process to transform Personally Identifiable Information into an unusable, unreadable, or indecipherable form in which there is a low probability of assigning meaning without use of a confidential process or key.
Photos Seller will not supply or instruct Broker to load any photos that were previously uploaded to the MLS by another company, even if Seller owns the copyright to such photos, unless Xxxxxx has the written permission from the broker who previously published the photos in MLS. Seller agrees Broker is not responsible to check past listings for photo compliance. Any claims in this regard will be handled as a dispute according to the terms of Paragraph 19 of this Contract.
Firmware The Contractor shall deliver firmware required for production acceptance testing in accordance with CDRL A009 Contractor’s Supplier Configuration Management Plan. The Contractor shall use Government furnished software for testing. Deliverable Data Item (See DD-1423): CDRL A009: “Contractor’s Supplier Configuration Management Plan”
Photographs You give your permission to us to use any photograph or photographic image including video or video stills taken of you while you are in any public spaces, grounds, offices at the Property or any sponsored events at the Property. You grant us and the Manager and our designees, the irrevocable and unrestricted right and permission to copyright, in its own name or otherwise, and to use, re-use, publish and re-publish photographic or video portraits or pictures of you or in which you may be included, without restriction as to changes or alterations. This usage may be in conjunction with your own name or a fictitious name. It may involve reproductions in color or otherwise that may be made through any medium, and in any and all media now or hereafter known. Usage may include illustration, promotion, art, editorial, advertising, trade, or any other legal purpose. You also consent to the use of any printed matter in conjunction with that usage. You waive any right that you may have to inspect or approve the finished product, the advertising copy or other matter that may be used in that regard. I hereby waive any right that I may have to inspect or approve the finished product and the advertising copy or other matter that may be used in connection therewith or the use to which it may be applied. You agree that we, the Manager and our designees will have no liability due to any blurring, distortion, alteration, optical illusion, or use in composite form that may occur in taking or usage of any picture or in the subsequent processing or publication of the picture. You release us, the Manager, and our designees from all claims of any nature arising in any way from the use of your photograph or photographic image. This release contains the entire agreement on this subject matter.
Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.