Voicemail Transcription Sample Clauses

Voicemail Transcription. The voicemail transcription feature transcribes a voicemail into text that is delivered via email. The quality of transcripts varies and in certain cases this feature may not be available. An additional charge applies.
AutoNDA by SimpleDocs

Related to Voicemail Transcription

  • Video This restriction includes, but is not limited to, use of the Beat and/or New Song in television, commercials, film/movies, theatrical works, video games, and in any other form on the Internet which is not expressly permitted herein.

  • Message Screening 9.4.4.1 BellSouth shall set message screening parameters so as to accept valid messages from Global Connection local or tandem switching systems destined to any signaling point within BellSouth’s SS7 network where the Global Connection switching system has a valid signaling relationship.

  • Images If applicable, the CONSULTANT is prohibited from capturing on any visual medium images of any property, logo, student, or employee of the DISTRICT, or any image that represents the DISTRICT without express written consent from the DISTRICT.

  • Computer The Contractor shall maintain at its office for its use a computer with, at a minimum, a 1 GHz processor and an internet connection. The Contractor shall maintain individual email accounts for each of its project managers.

  • Messages If you need to contact your therapist outside of your scheduled appointment, you may contact him / her by calling the direct dial phone number, or you may contact the front desk at 000-000-0000 between 8:30am and 4:30pm, Monday through Friday. After hours, you may contact the front desk and select option 4 for the staff directory. Messages are reviewed by the following business day. If you experience a mental health crisis, please review the section on emergencies below. Please discuss with your therapist any questions about how he / she handles messages.

  • Electronic Delivery The Company may, in its sole discretion, decide to deliver any documents related to the Award or other awards granted to the Participant under the Plan by electronic means. The Participant hereby consents to receive such documents by electronic delivery and agrees to participate in the Plan through an on-line or electronic system established and maintained by the Company or a third party designated by the Company.

  • Electronic Devices No electronic devices that may hinder job performance or safety (especially cell phones), may be carried on employees’ person, or be used by employees during working hours.

  • Cryptography Supplier will maintain policies and standards on the use of cryptographic controls that are implemented to protect Accenture Data.

  • Bibliography [Ben83] Xxxxxxx Xxx-Or. Another advantage of free choice (extended ab- stract): Completely asynchronous agreement protocols. In Proceed- ings of the second annual ACM symposium on Principles of distrib- uted computing, pages 27–30. ACM, 1983. [BG89] Xxxxx Xxxxxx and Xxxx X Xxxxx. Asymptotically optimal distributed consensus. Springer, 1989. [BGP89] Xxxxx Xxxxxx, Xxxx X. Xxxxx, and Xxxxxxx X. Xxxxx. Towards optimal distributed consensus (extended abstract). In 30th Annual Symposium on Foundations of Computer Science, Research Triangle Park, North Carolina, USA, 30 October - 1 November 1989, pages 410–415, 1989. [BT85] Xxxxxxx Xxxxxx and Xxx Xxxxx. Asynchronous consensus and broadcast protocols. Journal of the ACM (JACM), 32(4):824–840, 1985. [DGM+11] Xxxxxxxx Xxxxx, Xxxxxx Xxx Xxxxxxxx, Xxxxxx Xxxxxx, Xxxxxx Xxxxxxxxx, and Xxxxxxxxx Xxxxxxxxxx. Stabilizing Consensus with the Power of Two Choices. In Proceedings of the Twenty-third Annual ACM Symposium on Parallelism in Algorithms and Architectures, SPAA, June 2011. [DS83] Xxxxx Xxxxx and X. Xxxxxxx Xxxxxx. Authenticated algorithms for byzantine agreement. SIAM Journal on Computing, 12(4):656–666, 1983. [FG03] Xxxxxxxx Xxxxx and Xxxx X Xxxxx. Efficient player-optimal protocols for strong and differential consensus. In Proceedings of the twenty- second annual symposium on Principles of distributed computing, pages 211–220. ACM, 2003.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

Time is Money Join Law Insider Premium to draft better contracts faster.