Tool means the tool developed in accordance with Section 35A-15-303.
Encryption means methods of rendering personally identifiable information unusable, unreadable, or indecipherable to unauthorized persons through the use of a technology or methodology specified or permitted by the Secretary of the United States Department of Health and Human Services in guidance issued under 42 USC Section 17932(h)(2).
Diagnostic mammography means a method of screening that
Cabinet radiography means industrial radiography conducted in an enclosure or cabinet shielded so that radiation levels at every location on the exterior meet the limitations specified in 641—40.26(136C).
Radiography means a technique for generating and recording an x-ray pattern for the purpose of providing the user with an image(s) after termination of the exposure.
Toolkit or “Development Toolkit” in the DS Offering name, or (ii) in the Transaction Document and/or the Product Portfolio. Extended Enterprise User means an employee of Customer’s affiliate(s), supplier(s) and/or customer(s) authorized to use Customer’s DS Offering for the sole and exclusive purpose of enabling the Extended Enterprise User(s) to conduct business with Customer. The use of the DS Offering by any such Extended Enterprise User(s) (1) shall be solely limited to use (a) as configured and deployed by Customer and (b) in connection with the Extended Enterprise User’s performance of services for and on behalf of Customer, and (2) shall exclude any use by Extended Enterprise User (a) for its own account or a third party’s account, or (b) for the purpose of modifying, otherwise using, maintaining or hosting the DS Offering. Extended Enterprise Users are authorized if so specified in the Product Portfolio. Machine means a device on which a DS Offering is executed and which is either (1) (i) (a) belonging to Customer or under its sole control or supervision and (b) located on Customer’s premises or according to Teleworking conditions, or (ii) authorized by Customer according to its own information technology charter or equivalent whereby third party devices (such as Users own devices) are specifically authorized, or (2) operated by a third party service provider as specifically authorized in the Agreement solely for and on behalf of Customer. Remote Access means, if so specified in the Product Portfolio, that Users and/or Extended Enterprise Users may access and use the DS Offering remotely via the Internet from any country (subject inter alia to the export and re-export laws and regulations provisions of the Agreement). Teleworking means any program authorized by and for the benefit of Customer to enable its employees to work outside its own premises, using information and communication technology (or equivalent program established by a Customer entitled to Academic Use of the DS Offerings for its Users). User means any (a) Customer’s employee, or (b) employee of Customer’s consultant(s) or subcontractor(s) (i) who accesses a DS Offering,
Mammography means radiography of the breast but, for the purposes of 641—41.6(136C), does not include:
Images means all types of visual content, including without limitation still photography, motion film or video and may include audio elements, whether generated optically, electronically, digitally or by any other means, and shall include all metadata, keywords, descriptions and captions associated therewith. Any reference to Images includes the whole or the part.
Contactless means a payment feature that provides You with a way to pay by tapping the Card on a point–of–sale terminal reader for transactions of up to a specified limit.
Metadata includes all information created manually or automatically to provide meaning or context to other data.
Industrial radiography means an examination of the structure of materials by the nondestructive method of utilizing ionizing radiation to make radiographic images.
Programming means the process of organisation, decision-making and allocation of financial resources in several stages, with the involvement of partners in accordance with Article 5, intended to implement, on a multi-annual basis, joint action by the Union and the Member States to achieve the objectives of the Union strategy for smart, sustainable and inclusive growth;
Flexographic printing means the application of words, designs, and pictures to a substrate by means of a roll printing technique in which the pattern to be applied is raised above the printing roll and the image carrier is made of rubber or other elastomeric materials.
Outputs means the goods or services that are produced by an entity or other person;
Networking means NSCC’s system that allows mutual funds and life insurance companies to exchange account level information electronically; and “Settling Bank” shall mean the entity appointed by the Trust or you, as applicable, to perform such settlement services on behalf of the Trust and you, as applicable, which entity agrees to abide by NSCC’s then current rules and procedures insofar as they relate to same day funds settlement. In all cases, processing and settlement of share transactions shall be done in a manner consistent with applicable law.
Database means the Commercial Driver Alcohol and Drug Testing Database of the Office of Driver Services of the Arkansas Department of Finance and Administration.
Digital Cross Connect System or "DCS" is a function which provides automated Cross Connection of Digital Signal Level 0 (DS0) or higher transmission bit rate digital channels within physical interface facilities. Types of DCS include but are not limited to DCS 1/0s, DCS 3/1s, and DCS 3/3s, where the nomenclature 1/0 denotes interfaces typically at the DS1 rate or greater with Cross Connection typically at the DS0 rate. This same nomenclature, at the appropriate rate substitution, extends to the other types of DCS specifically cited as 3/1 and 3/3. Types of DCS that cross connect Synchronous Transport Signal level 1 (STS-1 s) or other Synchronous Optical Network (SONET) signals (e.g., STS-3) are also DCS, although not denoted by this same type of nomenclature. DCS may provide the functionality of more than one of the aforementioned DCS types (e.g., DCS 3/3/1 which combines functionality of DCS 3/3 and DCS 3/1). For such DCS, the requirements will be, at least, the aggregation of requirements on the "component" DCS. In locations where automated Cross Connection capability does not exist, DCS will be defined as the combination of the functionality provided by a Digital Signal Cross Connect (DSX) or Light Guide Cross Connect (LGX) patch panels and D4 channel banks or other DS0 and above multiplexing equipment used to provide the function of a manual Cross Connection. Interconnection is between a DSX or LGX to a Switch, another Cross Connection, or other service platform device.
Devices means any and all devices owned or purchased from time to time by Party A and utilized for the purposes of the provision of the Services.
Capture means the process of buffering EDR data in a temporary, volatile storage where it is continuously updated at regular time intervals.
Cell means a single encased electrochemical unit containing one positive and one negative electrode which exhibits a voltage differential across its two terminals.
Game has the meaning ascribed to that term in the Control Act;
snippetLinks [{"key":"specifically","type":"clause","offset":[20,32]},{"key":"provided-herein","type":"clause","offset":[33,48]},{"key":"at-the-closing","type":"clause","offset":[50,64]},{"key":"the-parties-shall","type":"clause","offset":[65,82]},
Encrypted means the transformation of data into a form which results in a low probability of assigning meaning without the use of a protective process or key.
Training means instruction or teaching designed to impart a specific skill, as opposed to general knowledge.
Prosthesis means an artificial substitute for a missing body part.
Encrypt means to encode Confidential Information into a format that can only be read by those possessing a “key”; a password, digital certificate or other mechanism available only to authorized users. Encryption must use a key length of at least 256 bits for symmetric keys, or 2048 bits for asymmetric keys. When a symmetric key is used, the Advanced Encryption Standard (AES) must be used if available.