Pseudonym Sample Clauses

Pseudonym. The Director of a television motion picture ninety (90) minutes or longer (excluding an episode of an episodic series) shall be entitled to request the use of a pseudonym in accordance with ARTICLE A-10.8 of this Appendix.
AutoNDA by SimpleDocs
Pseudonym. If the Director wishes to use a pseudonym in substitution of his or her name on the screen, advertising, publicity and any other material in which credit, in any form whatsoever, is given for direction of the motion picture, the Director may invoke the following procedure:
Pseudonym. All transactions that are processed with the Bank under a pseudonym engage the Client personally and without restriction, whether they are carried out under their personal signature or under their pseudonym, a specimen of which is communicated to the Bank. Cheques issued by the Client under their pseudonym are binding on them in the same way as those signed with their personal name.
Pseudonym. ‌ For location privacy, temporary identifiers, i.e., pseudonyms, are used with an appropriate changing scheme, e.g., a vehicle ITS station uses its current pseudonym P1 in a short period tP1 and changes P1 to a new one P2 for the next short period tP2 . By using these pseudonyms, attackers are not able (or at least not easily) to link different pseudonyms in order to identify the vehicle ITS station emitting messages with these pseudonyms. A pseudonym is interpreted in different forms depending on the layer/protocol. Here we assume that the pseudonym is an arbitrary bit string. For the access layer, the 48 bits of MAC address are replaced by the pseudonym. For the GeoNetworking layer, the rightmost 48 bits of the GeoNetworking address, which correspond to the MAC address, are also replaced by the pseudonym. For the IPv6 layer, in the case of IPv6 stateless address autoconfiguration, we suggest that the rightmost 64 bits of IPv6 address, i.e., interface identifier, are generated based on the pseudonym. It is worth noting that the pseudonym is synchronously changed across the entire ITS station stack. For instance, when a current pseudonym is changed to a new one, the whole MAC address is replaced by the new pseudonym, while the GeoNetworking address and the IPv6 address are changed accordingly. The IPv6 security module provides a pseudonym, which is randomly generated 48 bits, to the external IPv6 interface module that generates the 64 bits of an interface identifier based on the provided pseudonym. The external IPv6 interface module configures the 128 bits of a global IPv6 address based on the generated interface identifier.

Related to Pseudonym

  • End User This agreement shall bind the ordering activity as end user but shall not operate to bind a Government employee or person acting on behalf of the Government in his or her personal capacity.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Metadata Where the Contractor has or generates metadata as a result of services provided to the Province, where that metadata is personal information, the Contractor will: not use it or disclose it to any other party except where the Agreement otherwise specifies; and remove or destroy individual identifiers, if practicable.

  • User A Person utilizing the Cable Television System, including all related facilities for purposes of production and/or transmission of electronic or other Signals as opposed to utilization solely as a Subscriber.

  • Web Site Information on registration for and use of the E-Verify program can be obtained via the Internet at the Department of Homeland Security Web site: xxxx://xxx.xxx.xxx/E-Verify.

  • Customer Data 5.1 The Customer shall own all rights, title and interest in and to all of the Customer Data and shall have sole responsibility for the legality, reliability, integrity, accuracy and quality of the Customer Data. 5.2 The Supplier shall follow its archiving procedures for Customer Data as set out in its Back-Up Policy available at XxxxxXXX.xxx or such other website address as may be notified to the Customer as such document may be amended by the Supplier in its sole discretion from time to time the current version of which is set out at Schedule 3 of this Agreement. In the event of any loss or damage to Customer Data, the Customer's sole and exclusive remedy shall be for the Supplier to use reasonable commercial endeavours to restore the lost or damaged Customer Data from the latest back-up of such Customer Data maintained by the Supplier in accordance with the archiving procedure described in its Back-Up Policy. The Supplier shall not be responsible for any loss, destruction, alteration or disclosure of Customer Data caused by any third party (except those third parties sub-contracted by the Supplier to perform services related to Customer Data maintenance and back-up). 5.3 The Supplier shall, in providing the Services, comply with its Privacy and Security Policy as such document may be amended from time to time by the Supplier in its sole discretion. 5.4 If the Supplier processes any personal data on the Customer’s behalf when performing its obligations under this agreement, the parties record their intention that the Customer shall be the data controller and the Supplier shall be a data processor and in any such case: (a) the Customer shall ensure that the Customer is entitled to transfer the relevant personal data to the Supplier so that the Supplier may lawfully use, process and transfer the personal data in accordance with this agreement on the Customer's behalf; (b) the Customer shall ensure that the relevant third parties have been informed of, and have given their consent to, such use, processing, and transfer as required by all applicable data protection legislation; (c) the Supplier shall process the personal data only in accordance with the terms of this agreement and any lawful instructions reasonably given by the Customer from time to time; and (d) each party shall take appropriate technical and organisational measures against unauthorised or unlawful processing of the personal data or its accidental loss, destruction or damage. 5.5 The Supplier and the Customer shall comply with their respective obligations as set out in Schedule 4 of this Agreement

  • Database The LERG is available through Telcordia. ICONN is available through the Qwest web site.

  • Encryption The Fund acknowledges and agrees that encryption may not be available for every communication through the System, or for all data. The Fund agrees that Custodian may deactivate any encryption features at any time, without notice or liability to the Fund, for the purpose of maintaining, repairing or troubleshooting the System or the Software.

  • User Data We will maintain certain data that you transmit to the Services for the purpose of managing the performance of the Services, as well as data relating to your use of the Services. Although we perform regular routine backups of data, you are solely responsible for all data that you transmit or that relates to any activity you have undertaken using the Services. You agree that we shall have no liability to you for any loss or corruption of any such data, and you hereby waive any right of action against us arising from any such loss or corruption of such data.

  • TLD Nameservers ICANN will use commercially reasonable efforts to ensure that any changes to the TLD nameserver designations submitted to ICANN by Registry Operator (in a format and with required technical elements specified by ICANN at xxxx://xxx.xxxx.xxx/domains/root/ will be implemented by ICANN within seven (7) calendar days or as promptly as feasible following technical verifications.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!