Scan to Computer Sample Clauses

Scan to Computer 
AutoNDA by SimpleDocs

Related to Scan to Computer

  • CREDIT REVIEW AND RELEASE OF INFORMATION You authorize the Credit Union to investigate your credit standing when opening or reviewing your account. You authorize the Credit Union to disclose information regarding your account to credit bureaus and creditors who inquire about your credit standing. If your account is eligible for emergency cash and/or emergency card replacement services, and you request such services, you agree that we may provide personal information about you and your account that is necessary to provide you with the requested service(s).

  • Patient Information Each Party agrees to abide by all laws, rules, regulations, and orders of all applicable supranational, national, federal, state, provincial, and local governmental entities concerning the confidentiality or protection of patient identifiable information and/or patients’ protected health information, as defined by any other applicable legislation in the course of their performance under this Agreement.

  • Exception Where Databases Contain Sufficient Information A Reporting Financial Institution is not required to perform the paper record search described in subparagraph D.2. of this section if the Reporting Financial Institution’s electronically searchable information includes the following:

  • Records Retention and Examination Contractor shall retain, protect, and maintain in an accessible location all records and documents, including paper, electronic, and computer records, relating to this Contract for five (5) years after receipt of final payment by City under this Contract. Contractor shall make all such records and documents available for inspection, copying, or other reproduction, and auditing by authorized representatives of City, including the Purchasing Agent or designee. Contractor shall make available all requested data and records at reasonable locations within City or County of San Diego at any time during normal business hours, and as often as City deems necessary. If records are not made available within the City or County of San Diego, Contractor shall pay City’s travel costs to the location where the records are maintained and shall pay for all related travel expenses. Failure to make requested records available for inspection, copying, or other reproduction, or auditing by the date requested may result in termination of the Contract. Contractor must include this provision in all subcontracts made in connection with this Contract.

  • T1 IDENTIFICATION PROCEDURES During the restoration of service after a disaster, BellSouth may be forced to aggregate traffic for delivery to a CLEC. During this process, T1 traffic may be consolidated onto DS3s and may become unidentifiable to the Carrier. Because resources will be limited, BellSouth may be forced to "package" this traffic entirely differently then normally received by the CLECs. Therefore, a method for identifying the T1 traffic on the DS3s and providing the information to the Carriers is required.

  • COMPLIANCE WITH NEW YORK STATE INFORMATION SECURITY BREACH AND NOTIFICATION ACT Contractor shall comply with the provisions of the New York State Information Security Breach and Notification Act (General Business Law Section 899-aa; State Technology Law Section 208).

  • Client identification 9.1. The Company has the right to require the Client to confirm his/her registration information specified when opening a trading account. To do so, the Company may ask the Client at its own discretion and at any time to provide a notarized electronic copy of his/her identification document, bank statement or public utilities xxxx as a proof of residence. In particular cases, the Company may ask the Client to provide a photo of him/her holding his/her ID near his/her face. The detailed client identification requirements are set out in the “AML policies” section on the Company’s official site.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • PUBLIC RELEASE OF INFORMATION Company does not endorse products or services. Accordingly, Xxxxxx agrees not to use Company’s name, the name Oak Ridge National Laboratory (ORNL), the name of any of its projects or programs, or identifying characteristics of any of these for advertising, marketing, or other promotional purposes, raising of capital, recommending investments, sale of securities, or in any way that implies endorsement by UT-Battelle, ORNL, or DOE. Any media releases concerning this Agreement are prohibited without written consent of the Subcontract Administrator.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

Time is Money Join Law Insider Premium to draft better contracts faster.