External Email Use Clause Samples

External Email Use. Group Manager: Corporate & Customer Services and Information Services Manager Approved

Related to External Email Use

  • Public/Private Information The Borrower shall cooperate with the Administrative Agent in connection with the publication of certain materials and/or information provided by or on behalf of the Borrower. Documents required to be delivered pursuant to the Loan Documents shall be delivered by or on behalf of the Borrower to the Administrative Agent and the Lenders (collectively, “Information Materials”) pursuant to this Article and the Borrower shall designate Information Materials (a) that are either available to the public or not material with respect to the Borrower and its Subsidiaries or any of their respective securities for purposes of United States federal and state securities laws, as “Public Information” and (b) that are not Public Information as “Private Information”.

  • PROHIBITION ON CERTAIN TELECOMMUNICATIONS AND VIDEO SURVEILLANCE SERVICES OR EQUIPMENT To the extent applicable, Supplier certifies that during the term of this Contract it will comply with applicable requirements of 2 C.F.R. § 200.216.

  • Software The Software is licensed to you subject to any terms and conditions presented when you downloaded it from a source authorized by NCR Voyix, as well as those contained in this Agreement. If there is a conflict, this Agreement will control. You are licensed to use the Software only with the Service and with Hardware purchased or subscribed from NCR Voyix or its Resellers. Your license to any Software will end when your subscription to the Service ends. The Software is copyrighted and licensed, not sold, and is NCR Voyix’s confidential and unpublished information. You will retain any copyright notices and proprietary legends on all copies of the Software and the media on which it is delivered. Any attempt to transfer the Software is void and will automatically cause your license to end.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store County PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Security Office.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.