Pseudonym Sample Clauses

Pseudonym. A-10.8 If the Director wishes to use a pseudonym in substitution of his or her name on the screen, advertising, publicity and any other material in which credit, in any form whatsoever, is given for direction of the motion picture, the Director may invoke the following procedure:
AutoNDA by SimpleDocs
Pseudonym. A-11.6 The Director of a television motion picture ninety (90) minutes or longer (excluding an episode of an episodic series) shall be entitled to request the use of a pseudonym in accordance with ARTICLE A-10.8 of this Appendix.
Pseudonym. ‌ For location privacy, temporary identifiers, i.e., pseudonyms, are used with an appropriate changing scheme, e.g., a vehicle ITS station uses its current pseudonym P1 in a short period tP1 and changes P1 to a new one P2 for the next short period tP2 . By using these pseudonyms, attackers are not able (or at least not easily) to link different pseudonyms in order to identify the vehicle ITS station emitting messages with these pseudonyms. A pseudonym is interpreted in different forms depending on the layer/protocol. Here we assume that the pseudonym is an arbitrary bit string. For the access layer, the 48 bits of MAC address are replaced by the pseudonym. For the GeoNetworking layer, the rightmost 48 bits of the GeoNetworking address, which correspond to the MAC address, are also replaced by the pseudonym. For the IPv6 layer, in the case of IPv6 stateless address autoconfiguration, we suggest that the rightmost 64 bits of IPv6 address, i.e., interface identifier, are generated based on the pseudonym. It is worth noting that the pseudonym is synchronously changed across the entire ITS station stack. For instance, when a current pseudonym is changed to a new one, the whole MAC address is replaced by the new pseudonym, while the GeoNetworking address and the IPv6 address are changed accordingly. The IPv6 security module provides a pseudonym, which is randomly generated 48 bits, to the external IPv6 interface module that generates the 64 bits of an interface identifier based on the provided pseudonym. The external IPv6 interface module configures the 128 bits of a global IPv6 address based on the generated interface identifier. Figure 11.7: Considered network topology.
Pseudonym. All transactions that are processed with the Bank under a pseudonym engage the Client personally and without restriction, whether they are carried out under their personal signature or under their pseudonym, a specimen of which is communicated to the Bank. Cheques issued by the Client under their pseudonym are binding on them in the same way as those signed with their personal name.

Related to Pseudonym

  • End User An “End User” is you, an individual or entity, which receives the Models from Licensee or Authorized Licensee User pursuant to this End User Agreement to use in the regular course of your affairs, but not for resale, modification, distribution or exploitation by third parties without AnyLogic’s prior written consent.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Metadata Bibliographical, structural & descriptive data of the Licensed Material as defined in Schedule 5.

  • User 4.9.1 Not to use the Property otherwise than for the Permitted Use;

  • Images If applicable, the CONSULTANT is prohibited from capturing on any visual medium images of any property, logo, student, or employee of the DISTRICT, or any image that represents the DISTRICT without express written consent from the DISTRICT.

  • Web site Information on registration for and use of the E-Verify program can be obtained via the Internet at the Department of Homeland Security Web site: xxxx://xxx.xxx.xxx/E-Verify.

  • Customer Data 5.1 The Customer shall own all right, title and interest in and to all of the Customer Data and shall have sole responsibility for the legality, reliability, integrity, accuracy and quality of the Customer Data.

  • Database The LERG is available through Telcordia. ICONN is available through the Qwest web site.

  • Encryption The Fund acknowledges and agrees that encryption may not be available for every communication through the System, or for all data. The Fund agrees that Custodian may deactivate any encryption features at any time, without notice or liability to the Fund, for the purpose of maintaining, repairing or troubleshooting the System or the Software.

  • User Data In addition to any disclosures authorized by Section 24, You and Your Authorised Users consent and agree that the RIM Group of Companies may access, preserve, and disclose Your or Your Authorised Users' data, including personal information, contents of your communication or information about the use of Your BlackBerry Solution functionality and the services or software and hardware utilized in conjunction with Your BlackBerry Solution where available to RIM ("User Data"), to third parties, including foreign or domestic government entities, without providing notice to You or Your Authorized Users under the laws of countries where the RIM Group of Companies and its service providers, other partners and affiliates are located in order to: (i) comply with legal process or enforceable governmental request, or as otherwise required by law; (ii) cooperate with third parties in investigating acts in violation of this Agreement; or (iii) cooperate with system administrators at Internet service providers, networks or computing facilities in order to enforce this Agreement. You warrant that You have obtained all consents necessary under applicable law from Your Authorised Users to disclose User Data to the RIM Group of Companies and for the RIM Group of Companies to collect, use, process, transmit, and/or disclose such User Data as described above.

Time is Money Join Law Insider Premium to draft better contracts faster.