Architecture The Private Improvements shall have architectural features, detailing, and design elements in accordance with the Project Schematic Drawings. All accessory screening walls or fences, if necessary, shall use similar primary material, color, and detailing as on the Private Improvements.
Vlastnictví Zdravotnické zařízení si ponechá a bude uchovávat Zdravotní záznamy. Zdravotnické zařízení a Zkoušející převedou na Zadavatele veškerá svá práva, nároky a tituly, včetně práv duševního vlastnictví k Důvěrným informacím (ve smyslu níže uvedeném) a k jakýmkoli jiným Studijním datům a údajům.
Library Borrowing privileges available without charge. Upon retirement an employee shall be issued a permanent individual library card.
Firmware 7.1 The Supplier must deliver the equipment, Goods or hardware equipped with all the firmware required to use all the Goods or hardware’s functions. Any software embedded in the equipment, Goods or hardware, including the firmware, is provided to the Local Government with a license to use this software, with all license costs and royalties being included in the Fee Schedule (Schedule C). All firmware will be the most recent version available at the time of shipping.
Moonlighting Employment as a physician in a professional capacity outside of what is outlined in this Agreement, whether temporary special medical activity (“TSMA”) or external moonlighting, must be approved in writing, in advance, by the Departmental Chair, Program Director and Director of Graduate Medical Education (or designee). Even if approved, professional and general liability insurance as outlined in Section 5.4 is not provided to Trainee engaged in external moonlighting. Trainee acknowledges he or she has the responsibility to obtain insurance for such engagement. TSMA and external moonlighting must be included and reported as part of Trainee's hours spent on clinical experience and education. Trainee shall not be required to engage in any outside work.
Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.
Cryptography Supplier will maintain policies and standards on the use of cryptographic controls that are implemented to protect Accenture Data.
Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.
Software Inclusions Restrictions
Přetrvající platnost This Section 3 “