Transmitting Sample Clauses

Transmitting the transferring of data electronically, such as via email.
AutoNDA by SimpleDocs
Transmitting posting, receiving, retrieving, storing or otherwise reproducing, distributing or providing access to any program or information constituting or encouraging conduct that would constitute a criminal offence or give rise to civil liability.
Transmitting information securely When sharing information both the sender and the receiver should deal with the information according to its protective marking. See Appendix 2 for handling requirements in line with protective marking. Secure e-mail Lincolnshire Police documents must display the Protective marking at the top and bottom of the relevant text or attachments. Insecure e-mail should not be used for any personalised information. The below secure e-mail addresses may be used for information protectively marked up to and including OFFICIAL-SENSITIVE: a) CJSM b) PNN c) GSI d) GSX e) XXX.xxx f) GCSX g)
Transmitting a. Any program delivered from SLCS, for the purpose of educating children, shall be taught by a volunteer from the bargaining unit. The bargaining unit will provide at least one unit member who is certified to teach a full year course on the system at the District’s request. During the 1997-98 school year, if no volunteer is available, then SLCS may utilize staff outside the bargaining unit. Due to the interactive nature of the technology, the transmission must be live; subsequent use of taped recordings of the live transmission must be for the purposes of student review for participating students and/or for the completion of makeup work.
Transmitting and receiving permission-to-present requests in a multi-point session To request permission to present, a TIP endpoint MUST send a REQTOSEND packet on the video session setting the flag parameter to indicate a “request to transmit” and setting a single or dual auxiliary (aka, AUX/Presentation) video positions in the video position parameter. If the request is granted, the multi-point device will send a REQTOSEND ACK packet on the video session setting the video positions that are granted. The endpoint SHOULD start its transmission once it has received the REQTOSEND ACK packet. If the multi-point device denies the request due to conflict with another endpoint that already has permission to transmit, the multi-point device will deny the request by sending a REQTOSEND ACK packet setting video position to 0. A TIP endpoint receiving a REQTOSEND MUST grant the request as long as it includes a video position satisfying the current TIP session’s negotiated capability. The request is granted via ACK-ing it and starting the presentation receivers. If the endpoint was already transmitting presentation prior to receiving the REQTOSEND, it MUST stop its presentation transmission on both audio and video channels, ACK the request and start its presentation receivers. TIP endpoints SHOULD only deny a REQTOSEND packet if the REQTOSEND does not include a video position that satisfies the current TIP session’s negotiated capabilities. A presentation (AUX) conflict can occur when a REQTOSEND is received from the multipoint device requesting permission to present at the same time that a local REQTOSEND has been sent from the endpoint. In that case, the TIP endpoint should assume it is the winner of the conflict and wait for the REQTOSEND ACK to come from the remote peer before sending media on the presentation/AUX stream.
Transmitting. 16.1.2 Authorising the transmission of or
Transmitting using, or communicating cheats, bots (and any other computer program intended for performance of forbidden actions or getting additional advantages), as well as any other computer program or technical means that interfere with normal Services functioning, or aimed at getting additional advantages, which are not provided for by the rules, logics or technical capabilities of the Services;
AutoNDA by SimpleDocs
Transmitting information securely When sharing information both the sender and the receiver should deal with the information according to its protective marking. See Appendix 2 for handling requirements in line with information classification. Any e-mail or attachment containing personal data must be sent via a secure encrypted e-mail system. Where the partner does not have access to a secure encrypted e-mail system, the information must be encrypted via some other means, such as Windows password encryption, and the password sent via other means, such as telephone.
Transmitting. A. Participation in the program as an instructor will be strictly voluntary.
Transmitting posting, publishing, disseminating, receiving, retrieving, storing or otherwise reproducing, distributing or providing access to any files, program or information designed to assist users in defeating copy-protection, registration and any other anti-theft mechanisms associated with commercial or shareware programs.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!