Surveillance The COR will receive and document all complaints from Government personnel regarding the services provided. If appropriate, the COR will send the complaints to the Contractor for corrective action.
Video Surveillance All video surveillance will be directed by the YSU police department.
Cameras NSP items may only be acquired through the Contractor(s) or their Authorized Dealer(s) and must be reported quarterly with all other sales under the resulting Master Agreement(s). NSP items must be priced at a minimum discount of 15% from MSRP or List Price. NSP items shall not be offered to a Purchasing Entity as a stand-alone option, and the maximum allowable amount of all NSP items in a single Order shall be determined by the Participating State or Entity.
Program Monitoring The Contractor will make all records and documents required under this Agreement as outlined here, in OEC Policies and NHECC Policies available to the SRO or its designee, the SR Fiscal Officer or their designee and the OEC. Scheduled monitoring visits will take place twice a year. The SRO and OEC reserve the right to make unannounced visits.
Video This restriction includes, but is not limited to, use of the Beat and/or New Song in television, commercials, film/movies, theatrical works, video games, and in any other form on the Internet which is not expressly permitted herein.
Monitoring In each case in which the Foreign Custody Manager maintains Foreign Assets with an Eligible Foreign Custodian selected by the Foreign Custody Manager, the Foreign Custody Manager shall establish a system to monitor (i) the appropriateness of maintaining the Foreign Assets with such Eligible Foreign Custodian and (ii) the contract governing the custody arrangements established by the Foreign Custody Manager with the Eligible Foreign Custodian. In the event the Foreign Custody Manager determines that the custody arrangements with an Eligible Foreign Custodian it has selected are no longer appropriate, the Foreign Custody Manager shall notify the Board in accordance with Section 3.2.5 hereunder.
Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.
Analytics 1.1. IFS may track and analyze the usage of the IFS Offering for purposes of determining usage made of the IFS Offering, for the purposes of security, to assist customers, and for improving the Software and Services and the user experience in using such Software and Services. For example, IFS may use this information to help customers derive more value from the Software and Services, to understand and analyze trends, or to track which features are used most often in order to improve the Software and Services. IFS may share anonymous usage data with its service providers for the purpose of helping in such tracking, analysis and improvements. Additionally, IFS may share such anonymous usage data on an aggregate basis in the normal course of operating their business; for example, IFS may share information publicly to show trends about the general use of its software and services. TERMS - SERVICES
Generelt A. Apple Inc. (“Apple”) giver hermed licenstager licens til at bruge Apple-softwaren, evt. tredjepartssoftware, dokumentation, , grænseflader, indhold, skrifter og evt. data, som følger med denne licens, uanset om de er præinstalleret på Apple-hardware, forefindes på disk, som ROM (Read Only Memory), på andet medie eller i anden form (under et kaldet “Apple-softwaren”) i henhold til betingelserne i denne licensaftale. Apple og/eller Apples licensgivere bevarer ejendomsretten til selve Apple-softwaren og forbeholder sig alle de rettigheder, som ikke udtrykkeligt er givet til licenstager. B. Apple vil efter eget valg evt. frigive fremtidige opgraderinger eller opdateringer til Apple-softwaren til licenstagers computer fra Apple. Evt. opgraderinger og opdateringer inkluderer ikke nødvendigvis alle de eksisterende softwarefunktioner eller nye funktioner, som Apple frigiver til nyere modeller af computere fra Apple. Licenstagers rettigheder i henhold til denne licens omfatter alle de softwareopgraderinger eller -opdateringer leveret af Apple til Apple-softwareproduktet, medmindre opgraderingerne eller opdateringerne indeholder en separat licens, i hvilket fald licenstager erklærer sig indforstået med, at betingelserne i den licens er gældende for sådanne opgraderinger eller opdateringer.
Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.