Intercept Devices 26.1.1.1 Local and federal law enforcement agencies periodically request information or assistance from local telephone service providers. When either Party receives a request associated with an End User of the other Party, it shall refer such request to the Party that serves such End User, unless the request directs the receiving Party to attach a pen register, trap-and-trace or form of intercept on the Party's facilities, in which case that Party shall comply with any valid request.
Devices BNY Mellon will restrict the transfer of Customer Data from its network to mass storage devices. BNY Mellon will use a mobile device management system or equivalent tool when mobile computing is used to provide the services. Applications on such authenticated devices will be housed within an encrypted container and BNY Mellon will maintain the ability to remote wipe the contents of the container.
Network Interface Device 4.1 The NID is defined as any means of interconnection of end-user customer premises wiring to BellSouth’s distribution plant, such as a cross-connect device used for that purpose. The NID is a single-line termination device or that portion of a multiple-line termination device required to terminate a single line or circuit at the premises. The NID features two independent xxxxxxxx or divisions that separate the service provider’s network from the End User’s on-premises wiring. Each chamber or division contains the appropriate connection points or posts to which the service provider and the End User each make their connections. The NID provides a protective ground connection and is capable of terminating cables such as twisted pair cable. 4.1.1 BellSouth shall permit Al-Call to connect Al-Call ’s loop facilities to on-premises wiring through the BellSouth NID or at any other technically feasible point.
Removable media devices All electronic files that contain DHCS PHI or PI data must be encrypted when stored on any removable media or portable device (i.e. USB thumb drives, floppies, CD/DVD, smartphones, backup tapes etc.). Encryption must be a FIPS 140-2 certified algorithm which is 128bit or higher, such as AES.
Fabrication Making up data or results and recording or reporting them.
Evaluation Software If the Software is an evaluation version or is provided to You for evaluation purposes, then, unless otherwise approved in writing by an authorized representative of Licensor, Your license to use the Software is limited solely for internal evaluation purposes in non-production use and in accordance with the terms of the evaluation offering under which You received the Software, and expires 90 days from installation (or such other period as may be indicated within the Software). Upon expiration of the evaluation period, You must discontinue use of the Software, return to an original state any actions performed by the Software, and delete the Software entirely from Your system and You may not download the Software again unless approved in writing by an authorized representative of Licensor. The Software may contain an automatic disabling mechanism that prevents its use after a certain period of time. RESTRICTIONS
Diagnostic procedures to aid the Provider in determining required dental treatment.
Safety Devices All Products provided under the Contract shall be equipped with required safety devices to comply with all applicable codes, laws, and regulations that are in effect at the time of delivery.
Assembly (a) The Contracting Parties shall have an Assembly. (b) Each Contracting Party shall be represented by one delegate who may be assisted by alternate delegates, advisors and experts. (c) The expenses of each delegation shall be borne by the Contracting Party that has appointed the delegation. The Assembly may ask WIPO to grant financial assistance to facilitate the participation of delegations of Contracting Parties that are regarded as developing countries in conformity with the established practice of the General Assembly of the United Nations or that are countries in transition to a market economy. (a) The Assembly shall deal with matters concerning the maintenance and development of this Treaty and the application and operation of this Treaty. (b) The Assembly shall perform the function allocated to it under Article 26(2) in respect of the admission of certain intergovernmental organizations to become party to this Treaty. (c) The Assembly shall decide the convocation of any diplomatic conference for the revision of this Treaty and give the necessary instructions to the Director General of WIPO for the preparation of such diplomatic conference. (a) Each Contracting Party that is a State shall have one vote and shall vote only in its own name. (b) Any Contracting Party that is an intergovernmental organization may participate in the vote, in place of its Member States, with a number of votes equal to the number of its Member States which are party to this Treaty. No such intergovernmental organization shall participate in the vote if any one of its Member States exercises its right to vote and vice versa. (4) The Assembly shall meet in ordinary session once every two years upon convocation by the Director General of WIPO. (5) The Assembly shall establish its own rules of procedure, including the convocation of extraordinary sessions, the requirements of a quorum and, subject to the provisions of this Treaty, the required majority for various kinds of decisions.
Apple and Android Devices The following terms apply when you use a mobile application obtained from either the Apple Store or Google Play (each an “App Distributor”) to access the Site: