Windows Media Buffering Sample Clauses

Windows Media Buffering select the buffer 1seconds <-> 5 seconds
AutoNDA by SimpleDocs

Related to Windows Media Buffering

  • Removable media devices All electronic files that contain County PHI or PI data must be encrypted when stored on any removable media or portable device (i.e. USB thumb drives, floppies, CD/DVD, smartphones, backup tapes etc.). Encryption must be a FIPS 140-2 certified algorithm which is 128bit or higher, such as AES.

  • Vlastnictví Zdravotnické zařízení si ponechá a bude uchovávat Zdravotní záznamy. Zdravotnické zařízení a Zkoušející převedou na Zadavatele veškerá svá práva, nároky a tituly, včetně práv duševního vlastnictví k Důvěrným informacím (ve smyslu níže uvedeném) a k jakýmkoli jiným Studijním datům a údajům.

  • Signaling Link Transport 9.2.1 Signaling Link Transport is a set of two or four dedicated 56 kbps transmission paths between Global Connection-designated Signaling Points of Interconnection that provide appropriate physical diversity.

  • Publikace a) The Institution and the Investigator agree that the Sponsor shall have the sole and exclusive right to the first publication of the results of the Study. Such Sponsor publication is intended to be a multi-center publication of the Study results, collected from all investigators and institutions participating in the Study (the “Multi- Center Publication”). If the Investigator is interested in contributing to or participating in the Multi-Center Publication, he or she must contact the Sponsor. Selection of authors/participants will be governed by the Sponsor, considering individuals’ contribution to the Study.

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

  • Modern Slavery You hereby affirm your compliance with the Modern Slavery Xxx 0000 and associated guidance. You confirm (a) that you have read, are familiar with and shall not perform an act or omission which is in contravention with, the letter or spirit of the Act; and (b) you carry out regular, meaningful and comprehensive due diligence procedures and have internal policies in place to address any suspected human rights abuse in your business and Group where applicable.

  • Network Etiquette You are expected to abide by the generally accepted rules of network etiquette. These include but are not limited to the following:

  • Dewatering 4.7.1 Where a part of a site is affected by surface water following a period of rain, thus rendering some areas unsafe for productive work, consistent with the Employer’s obligations under the OH&S Act, all non- trades employees shall assist in ‘dewatering’ their own work site or area if it is so affected. Such work to be paid at single time rates. Productive work will continue in areas not so affected.

  • Drainage Systems (1) Clear culvert inlets, outlets, and sediment catching basins.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

Time is Money Join Law Insider Premium to draft better contracts faster.