Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.
Procedures for Providing NP Through Full NXX Code Migration Where a Party has activated an entire NXX for a single Customer, or activated at least eighty percent (80%) of an NXX for a single Customer, with the remaining numbers in that NXX either reserved for future use by that Customer or otherwise unused, if such Customer chooses to receive Telephone Exchange Service from the other Party, the first Party shall cooperate with the second Party to have the entire NXX reassigned in the LERG (and associated industry databases, routing tables, etc.) to an End Office operated by the second Party. Such transfer will be accomplished with appropriate coordination between the Parties and subject to appropriate industry lead times for movements of NXXs from one switch to another. Neither Party shall charge the other in connection with this coordinated transfer.
Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.
Malicious Use of Orphan Glue Records Registry Operator shall take action to remove orphan glue records (as defined at xxxx://xxx.xxxxx.xxx/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct.
Trunk Group Architecture and Traffic Routing 5.2.1 The Parties shall jointly establish Access Toll Connecting Trunks between CLEC and CBT by which they will jointly provide Tandem-transported Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic from and to CLEC's Customers. 5.2.2 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access and non-translated Toll Free traffic (e.g., 800/888) to allow CLEC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier that is connected to the CBT access Tandem. 5.2.3 The Access Toll Connecting Trunks shall be one-way or two-way trunks, as mutually agreed, connecting an End Office Switch that CLEC utilizes to provide Telephone Exchange Service and Switched Exchange Access Service in the given LATA to an access Tandem Switch CBT utilizes to provide Exchange Access in the LATA.
Use of Verizon Telecommunications Services 2.1 Verizon Telecommunications Services may be purchased by Z-Tel under this Resale Attachment only for the purpose of resale by Z-Tel as a Telecommunications Carrier. Verizon Telecommunications Services to be purchased by Z-Tel for other purposes (including, but not limited to, Z-Tel’s own use) must be purchased by Z-Tel pursuant to other applicable Attachments to this Agreement (if any), or separate written agreements, including, but not limited to, applicable Verizon Tariffs. 2.2 Z-Tel shall not resell: 2.2.1 Residential service to persons not eligible to subscribe to such service from Verizon (including, but not limited to, business or other nonresidential Customers); 2.2.2 Lifeline, Link Up America, or other means-tested service offerings, to persons not eligible to subscribe to such service offerings from Verizon; 2.2.3 Grandfathered or discontinued service offerings to persons not eligible to subscribe to such service offerings from Verizon; or 2.2.4 Any other Verizon service in violation of a restriction stated in this Agreement (including, but not limited to, a Verizon Tariff) that is not prohibited by Applicable Law. 2.2.5 In addition to any other actions taken by Z-Tel to comply with this Section 2.2, Z-Tel shall take those actions required by Applicable Law to determine the eligibility of Z-Tel Customers to purchase a service, including, but not limited to, obtaining any proof or certification of eligibility to purchase Lifeline, Link Up America, or other means-tested services, required by Applicable Law. Z-Tel shall indemnify Verizon from any Claims resulting from Z-Tel’s failure to take such actions required by Applicable Law. 2.2.6 Verizon may perform audits to confirm Z-Tel’s conformity to the provisions of this Section 2.2. Such audits may be performed twice per calendar year and shall be performed in accordance with Sections 4.4.2 through 4.4.4 of the General Terms and Conditions. 2.3 Z-Tel shall be subject to the same limitations that Verizon’s Customers are subject to with respect to any Telecommunications Service that Verizon grandfathers or discontinues offering. Without limiting the foregoing, except to the extent that Verizon follows a different practice for Verizon Customers in regard to a grandfathered Telecommunications Service, such grandfathered Telecommunications Service: (a) shall be available only to a Customer that already has such Telecommunications Service; (b) may not be moved to a new service location; and, (c) will be furnished only to the extent that facilities continue to be available to provide such Telecommunications Service. 2.4 Z-Tel shall not be eligible to participate in any Verizon plan or program under which Verizon Customers may obtain products or services which are not Verizon Telecommunications Services, in return for trying, agreeing to purchase, purchasing, or using, Verizon Telecommunications Services. 2.5 In accordance with 47 CFR § 51.617(b), Verizon shall be entitled to all charges for Verizon Exchange Access services used by interexchange carriers to provide service to Z-Tel Customers.
Switching System Hierarchy and Trunking Requirements For purposes of routing ECI traffic to Verizon, the subtending arrangements between Verizon Tandem Switches and Verizon End Office Switches shall be the same as the Tandem/End Office subtending arrangements Verizon maintains for the routing of its own or other carriers’ traffic (i.e., traffic will be routed to the appropriate Verizon Tandem subtended by the terminating End Office serving the Verizon Customer). For purposes of routing Verizon traffic to ECI, the subtending arrangements between ECI Tandem Switches and ECI End Office Switches shall be the same as the Tandem/End Office subtending arrangements that ECI maintains for the routing of its own or other carriers’ traffic.
Testing Procedure Limitations The Asset Representations Reviewer will only be required to perform the testing procedures listed under “Tests” in Schedule A, and will have no obligation to perform additional procedures on any Subject Lease or to provide any information other than a Review Report indicating for each Subject Lease whether there was a Test Pass or a Test Fail for each Test, or whether the Subject Lease was a Test Complete and the related reason. However, the Asset Representations Reviewer may provide additional information about any Subject Lease that it determines in good faith to be material to the Review.
SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes. 11.2 We may (i) compile statistical and other information related to the performance, operation and use of the Services, and (ii) use data from the Services in aggregated form for security and operations management, to create statistical analyses, and for research and development purposes (clauses i and ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly available; however, Service Analyses will not incorporate Your Content, Personal Data or Confidential Information in a form that could serve to identify You or any individual. We retain all intellectual property rights in Service Analyses. 11.3 We may provide You with the ability to obtain certain Oracle Software (as defined below) for use with the Services. If we provide Oracle Software to You and do not specify separate terms for such software, then such Oracle Software is provided as part of the Services and You have the non-exclusive, worldwide, limited right to use such Oracle Software, subject to the terms of this Agreement and Your order (except for separately licensed elements of the Oracle Software, which separately licensed elements are governed by the applicable separate terms), solely to facilitate Your use of the Services. You may allow Your Users to use the Oracle Software for this purpose, and You are responsible for their compliance with the license terms. Your right to use any Oracle Software will terminate upon the earlier of our notice (by web posting or otherwise) or the end of the Services associated with the Oracle Software. Notwithstanding the foregoing, if Oracle Software is licensed to You under separate terms, then Your use of such software is governed by the separate terms. Your right to use any part of the Oracle Software that is licensed under the separate terms is not restricted in any way by this Agreement.
Moonlighting Employment as a physician in a professional capacity outside of what is outlined in this Agreement, whether temporary special medical activity (“TSMA”) or external moonlighting, must be approved in writing, in advance, by the Departmental Chair, Program Director and Director of Graduate Medical Education (or designee). Even if approved, professional and general liability insurance as outlined in Section 5.4 is not provided to Trainee engaged in external moonlighting. Trainee acknowledges he or she has the responsibility to obtain insurance for such engagement. TSMA and external moonlighting must be included and reported as part of Trainee's hours spent on clinical experience and education. Trainee shall not be required to engage in any outside work.