Video Surveillance All video surveillance will be directed by the YSU police department.
Surveillance The COR will receive and document all complaints from Government personnel regarding the services provided. If appropriate, the COR will send the complaints to the Contractor for corrective action.
Cameras NSP items may only be acquired through the Contractor(s) or their Authorized Dealer(s) and must be reported quarterly with all other sales under the resulting Master Agreement(s). NSP items must be priced at a minimum discount of 15% from MSRP or List Price. NSP items shall not be offered to a Purchasing Entity as a stand-alone option, and the maximum allowable amount of all NSP items in a single Order shall be determined by the Participating State or Entity.
Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.
Internet Use Customer assumes total responsibility for its and its users’ use of the Internet. Masergy specifically disclaims any warranties, endorsements or representations regarding any merchandise, information, software, products, data, files, or services provided through the Internet.
Program Monitoring The Contractor will make all records and documents required under this Agreement as outlined here, in OEC Policies and NHECC Policies available to the SRO or its designee, the SR Fiscal Officer or their designee and the OEC. Scheduled monitoring visits will take place twice a year. The SRO and OEC reserve the right to make unannounced visits.
Video This restriction includes, but is not limited to, use of the Beat and/or New Song in television, commercials, film/movies, theatrical works, video games, and in any other form on the Internet which is not expressly permitted herein.
Cell Phones The College follows the State’s Cell Phone Policy. Employees who receive cell phones from the College shall also abide by this Policy. The College shall provide the Policy to any employee who is given a cell phone. Employees are responsible for the cost of all personal calls. While the College anticipates some incidental personal use of cell phones, it is also expected that such use is infrequent.
Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.
Internet Traffic Any traffic that is transmitted to or returned from the Internet at any point during the duration of the transmission.