Smartphones Sample Clauses

Smartphones. Service terminations before the end of the Minimum Service Term for an Advanced Device are subject to an early termination fee of up to $350 per device, in addition to any other Service charges that apply to the terminated Advanced Device.
AutoNDA by SimpleDocs
Smartphones. Advanced Devices are subject to an ETF of up to $350 per device, in addition to any other Service charges that apply to the terminated Advanced Device.
Smartphones. Each Resident will be offered a University-issued phone capable of running all applications needed to perform their jobs at no charge in accordance with the UCLA Health Policy on Personal Use of Electronic Communication Devices. Residents shall return the phone upon separation from employment with the University or when otherwise directed. If the phone is lost or damaged, the Resident is responsible for any associated costs for repair and/or replacement; the resident shall not be responsible for costs associated with normal wear and tear. In the event that the Resident opts to use his/her own phone, all University-required security measures must be installed. There is no reimbursement for a personal phone.
Smartphones. In smartphone based sensing realm the majority of the work has been focused only on proximity detection. In these approaches authors focused on estimating only which users are in proximity and did not take into consideration the directionality of the participants. The existing trend for detecting social interactions through proximity on mobile phone based sensing platforms has been based on data collection (simple discovery) achieves resolution proportional to the utilised technology mean, via Bluetooth, GSM signals or Wi-­Fi access points such as in [7], CenceMe [8], PeopleTones [9], Serendipity [10] and SoundSense [11]. As a result, there would be numerous occasions when being in proximity does not guarantee the existence of a F2F interaction, leading to a considerable amount of false positive error in social interaction detection. In order to improve the simple discovery approach, fine-­grain distance estimation was proposed in multiple works to improve the granularity. Among them is Comm2Sense [12], a client-­server implementation performing proximity detection by analysing WiFi RSSI. For the detection of nearby devices, each device must operate as a hotspot and then switch to normal WiFi. However, in order to be able to enable and disable the hotspot mode and set the transmission power to 0dBm, rooting of the Android device is required. By applying machine learning techniques on 20-­sample RSSI window for distance estimation, they claim of achieving a median error of 0.5m in indoor and outdoor environments. PhoneMonitor [13] is a monitoring application that logs various sensors of a mobile phone for the detection of F2F interactions based on proximity estimation. A number of experiments are performed in order to increase the accuracy of estimating the distance among the devices. A probabilistic model for the Bluetooth RSSI is proposed to classify if the users' interpersonal distance is suitable to perform F2F interaction. Although PhoneMonitor, estimates if the users are in proximity or not while they are required to hold the device in their hands, authors introduce privacy issues by performing off-­line analysis. MAUC [14] is a contact detection method for mobile phones that based on user's movements, detects start and ending point of a contact. The authors infer about the existence of social interaction through simple threshold on Bluetooth RSSI measurements, which is erroneous due to large fluctuation in RSSI values. However, MAUC is not able to de...
Smartphones. Supply new handsets required at start of contract. Approximate number of devices at contract start is 30, likely to grow to 40 in year one. The option to port existing numbers to new service provider. The option for replacement and upgrade of handsets through the life of the contract. The ability to add and remove users as required. The ability to add and remove handsets as required. International roaming is required for most handsets All smartphone devices have to be BlackBerry Enterprise able. The handset needs to support CESG recommended security policies for interoperability with ICO’s IL3 environment. Smartphone Services are to commence on 1 July 2013.

Related to Smartphones

  • Cell Phones The College follows the State’s Cell Phone Policy. Employees who receive cell phones from the College shall also abide by this Policy. The College shall provide the Policy to any employee who is given a cell phone. Employees are responsible for the cost of all personal calls. While the College anticipates some incidental personal use of cell phones, it is also expected that such use is infrequent.

  • Mobile Phones The Company’s expectations in relation to the use of Company provided mobile phones are outlined in Company policy HR-P13. If an Employee is provided with a mobile phone by the Company, the Employee shall be liable for the cost of excessive private telephone calls. Employees agree to make themselves contactable via their personal mobile phone to receive instructions from their supervisors, with the Company reimbursing Employees the cost of any such telephone calls. It is not a condition of employment to own a mobile phone. No Employee shall be engaged in private telephone conversations whilst at work with the exception of designated breaks and in emergency situations. The Company will not be liable for the repair or replacement of personal mobile phones.

  • Computers All computers, hardware, software, computer upgrades and maintenance in connection therewith shall be at Owner's expense.

  • Telephones The Unit may or may not have a telephone. If this is a material concern please check with Manager to determie if the Unit has phone service. Phones are for local calls only. LIMITED DAMAGE WAIVER PROGRAM

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Cameras j) Portable music player, headphones.

  • MOBILE DATA COMPUTERS 20 1. As part of the law enforcement services to be provided to CITY, COUNTY 21 has provided, or will provide, mobile data computers (hereinafter called 22 “MDCs”) that are or will be mounted in patrol vehicles and motorcycles, 23 designated by COUNTY for use within CITY limits.

  • Images If applicable, the CONSULTANT is prohibited from capturing on any visual medium images of any property, logo, student, or employee of the DISTRICT, or any image that represents the DISTRICT without express written consent from the DISTRICT.

  • Devices BNY Mellon will restrict the transfer of Customer Data from its network to mass storage devices. BNY Mellon will use a mobile device management system or equivalent tool when mobile computing is used to provide the services. Applications on such authenticated devices will be housed within an encrypted container and BNY Mellon will maintain the ability to remote wipe the contents of the container.

Time is Money Join Law Insider Premium to draft better contracts faster.