Scans Sample Clauses

Scans. In order to maintain the security of the Subscription Services, regular network and system scans are performed, including non-intrusive network scans on customer-facing infrastructure.
AutoNDA by SimpleDocs
Scans. Scans in excess of ½ of print/copy volume accumulated during contract billing period will be charged @ $.003 per scan (example; 1000 chargeable scans @ .003 =
Scans. If Institution deems it necessary to perform security scans or other similar tests, the Institution must comply with the following mandatory requirements: (i) provide one week’s notice of intent to test; (ii) coordinate testing with Company staff;
Scans. In order to maintain the security of the Subscription Services, Apttus will perform regular network and system scans, including non-intrusive network scans on web-facing infrastructure.
Scans. AREAS OF COMPETENCIES The U.S. Department of Labor's Secretary's Commission on Achieving Necessary Skills (SCANS) to enter the workplace documentation has determined that a total of 43 competencies must be addressed and the method(s) of determining competency listed. #5-Acquire information Develop skills and techniques to implement the basic nursing process. Reflect knowledge of then nursing process in: a. class participation/case-studies b. theory exams #7-Organize information Able to assign acquired data to correct categories within the nursing process a. Theory exams b. Lab practicum/exams #30-Demonstrate reading competence Analyzes written/printed information to determine appropriate course of action. a. Case-Studies b. Multiple-choice question exams
Scans. On a monthly basis, Arctic Wolf will use the Solution to conduct external vulnerability assessment scans of Customer’s environment. As part of these scans, vulnerability and exploit information will be normalized and correlated with other data sources in order to determine Customer’s Security Score and prioritization of any identified remediation strategies. Arctic Wolf will deliver to Customer a summary security report that includes Security Incident and Emergency notification activities on a monthly and quarterly basis. Configuration Score (aka Security Score). Customer’s Security Score is provided as part of the Solution is for illustrative and informational purposes only and may be used by Customer for internal benchmarking purposes. The Security Score is based on certain information related to the results of the Solution within Customer’s environment and is compiled using the Solutions Data made available to Arctic Wolf in conjunction with its delivery of the Solution. Customer’s Security Score will be communicated in Customer’s summary reports in addition to being available on Customer’s online Executive Dashboard. Customers may elect to compare their Security Score against industry averages from organizations in the same industry vertical to assess how Customer is performing against industry norms. Host Containment. Based upon the agreed upon escalation process and provided that the Arctic Wolf Agent is deployed by Customer, Arctic Wolf’s Security Services team will remotely isolate a Customer endpoint device(s) that shows evidence of compromise or other suspicious activity. When the Security Services team identifies certain indicators of attack on an endpoint, the containment action will be initiated systematically, in accordance with the agreed upon escalation process, to rapidly quarantine the suspected compromised system.
Scans. You assign to Align all right (including Intellectual Property), title, and interest in and to Scans. In the event such assignment fails, you grant the Align Group a non-exclusive worldwide, fully paid up, royalty free, irrevocable, perpetual, sub-licensable, transferable license and right to reproduce, create derivative works, distribute, display, publish, perform or otherwise use Scans, and any Intellectual Property directed to the Content, for the Align Purposes (“Scan License”).
AutoNDA by SimpleDocs
Scans. The parties understand that in connection with the performance of the Agreement, SureSmile may need the Customer to submit patient specific scans and other order specific details.

Related to Scans

  • Devices BNY Mellon will restrict the transfer of Customer Data from its network to mass storage devices. BNY Mellon will use a mobile device management system or equivalent tool when mobile computing is used to provide the services. Applications on such authenticated devices will be housed within an encrypted container and BNY Mellon will maintain the ability to remote wipe the contents of the container.

  • Cameras 3.2 NSP items may only be acquired through the Contractor or their Authorized Dealer and must be reported quarterly with all other sales under the Master Agreement. 3.3 NSP items must be priced at a minimum discount of 15% from MSRP or List Price. 3.4 NSP items may be offered to a Purchasing Entity as a stand-alone option, and the maximum allowable amount of all NSP items in a single Order shall be determined by the Participating State or Entity. 3.5 It shall be at the discretion of the Participating State or Entity to allow Open Market Items in their Participating Addendum.

  • Cell Phones The College follows the State’s Cell Phone Policy. Employees who receive cell phones from the College shall also abide by this Policy. The College shall provide the Policy to any employee who is given a cell phone. Employees are responsible for the cost of all personal calls. While the College anticipates some incidental personal use of cell phones, it is also expected that such use is infrequent.

  • Encryption The Fund acknowledges and agrees that encryption may not be available for every communication through the System, or for all data. The Fund agrees that Custodian may deactivate any encryption features at any time, without notice or liability to the Fund, for the purpose of maintaining, repairing or troubleshooting the System or the Software.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!