RMail Encrypted Reply™ Sample Clauses

RMail Encrypted Reply™. If a recipient clicks the link to initiate an Encrypted Reply™ message, there is one additional RMail Unit consumed per up to five replies per original sender’s sent message, regardless of cumulative file upload size.
AutoNDA by SimpleDocs

Related to RMail Encrypted Reply™

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Mail Services BTU-ESP may use the School Board mail service, including employee mailboxes, for official communication to education support professionals, provided the BTU-ESP complies with all provisions of the Private Express Statutes, including postage requirements. The parties agree that should the Private Express Statutes change regarding required postage, this provision shall be modified accordingly. BTU-ESP and the Board shall develop guidelines for this service and for appropriate charges prior to implementing the use of the mail service.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • E-Mail Access Patient shall be given the Physician’s e-mail address to which non-urgent communications can be addressed. Such communications shall be dealt with by the Physician or staff member of the Practice in a timely manner. Patient understands and agrees that email and the internet should never be used to access medical care in the event of an emergency, or any situation that Patient could reasonably expect may develop into an emergency. Patient agrees that in such situations, when a Patient cannot speak to Physician immediately in person or by telephone, that Patient shall call 911 or the nearest emergency medical assistance provider, and follow the directions of emergency medical personnel.

  • MOBILE DATA COMPUTERS 20 1. As part of the law enforcement services to be provided to CITY, COUNTY 21 has provided, or will provide, mobile data computers (hereinafter called 22 “MDCs”) that are or will be mounted in patrol vehicles and motorcycles, 23 designated by COUNTY for use within CITY limits.

  • Transmission encryption All data transmissions of County PHI or PI outside the secure internal network must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as AES. Encryption can be end to end at the network level, or the data files containing PHI can be encrypted. This requirement pertains to any type of PHI or PI in motion such as website access, file transfer, and E-Mail.

  • User Generated Content On, or in connection with, the Platform, Bayer may ask for or allow you to communicate, submit, upload or otherwise make available text, video, chat, images, or other content (“User Generated Content), which may be accessible and viewable by others on the Platform and by others in the public. You agree that you will not submit any User Generated Content that is defamatory, harassing, threatening, bigoted, hateful, violent, vulgar, obscene, pornographic, or otherwise offensive or that xxxxx or can reasonably be expected to harm any person or entity, whether or not such material is protected by law. With regards to any User Generated Content, you agree to xxxxx Xxxxx a non-exclusive, sublicensable, irrevocable and royalty-free worldwide license under all copyrights, trademarks, patents, trade secrets, privacy and publicity rights and other intellectual property rights for the full duration of those rights to use, reproduce, transmit, print, publish, publicly display, exhibit, distribute, redistribute, copy, index, comment on, modify, transform, adapt, translate, create derivative works based upon, publicly perform, publicly communicate, make available, and otherwise exploit such User Generated Content, in whole or in part, in all media formats and channels now known or later developed, in any number of copies and without limit as to time, manner and frequency of use, without further notice to you, without attribution (to the extent this is not contrary to mandatory provisions of applicable law), and without the requirement of permission from or payment to you or any other person or entity. You agree that submission of User Generated Content does not establish any relationship of trust and confidence between you and Bayer, and that you have no expectation of compensation whatsoever (except as may be specifically stated in a separate agreement). You represent and warrant that your User Generated Content conforms to these Conditions and that you own or have the necessary rights and permissions including, without limitation, all copyrights, music rights and likeness rights (with respect to any person) contained in the User Generated Content, without the need for payment to any other person or entity, to use and exploit, and to authorize Bayer to use and exploit, your User Generated Content in all manners contemplated by these Conditions; and you agree to indemnify and hold Bayer harmless from any claims or expenses (including attorneys’ fees) by any third party arising out of or in connection with Bayer’s use and exploitation of your User Generated Content resulting from your breach of these Conditions. You also agree to waive and not to enforce any moral rights, ancillary rights or similar rights in or to the User Generated Content against Bayer or Bayer’s licensees, distributors, agents, representatives and other authorized users, and agree to procure the same agreement to waive and not to enforce from others who may possess such rights. Bayer retains the right to monitor, screen, post, remove, modify, store and review User Generated Content or communications sent through the Platform, at any time and for any reason, including to ensure that the User Generated Content conforms to these Conditions, without prior notice to you. Bayer may terminate your account and access to the Platform if your User Generated Content violates these Conditions, including unlawful postings or content, without prior notice to you. Bayer is not responsible for, and does not endorse or guarantee, the opinions, views, advice or recommendations posted or sent by users.

Time is Money Join Law Insider Premium to draft better contracts faster.