Non-locked transmissions Clause Samples

The Non-locked transmissions clause defines the conditions under which transmissions or communications that are not secured or locked can be used or are permitted within the scope of an agreement. Typically, this clause clarifies whether parties may send information, data, or materials over unsecured channels, such as unencrypted emails or open networks, and may outline any associated responsibilities or limitations. Its core function is to allocate risk and clarify liability related to the use of non-secure transmission methods, ensuring both parties understand the implications and responsibilities when using such channels.
Non-locked transmissions. In case of non-locked transmission conditions, the test may include a gear change to a lower range and a higher acceleration under accelerated conditions. A gear change to a higher range could occur under cruise and low load acceleration conditions. Such upshifts shall be avoided. The authority present during the test shall modify operation conditions so that these upshifts are avoided between AA' and BB'. In the approach to line AA', the vehicle shall be driven in a way to allow the transmission to stabilize the gear.

Related to Non-locked transmissions

  • Data Transmission The procedures for transmitting load obligation data to PJM for DS Supplier’s DS Load shall be as set forth by PJM.

  • Loop Transmission Types 3.1 Subject to the conditions set forth in Section 1 of this Attachment, Verizon shall allow CBB to access Loops unbundled from local switching and local transport, in accordance with this Section 3 and the rates and charges provided in the Pricing Attachment. Verizon shall allow CBB access to Loops in accordance with, but only to extent required by, Applicable Law. The available Loop types are as set forth below:

  • Transmission encryption All data transmissions of County PHI or PI outside the secure internal network must be encrypted using a FIPS 140-2 certified algorithm which is 128-bit or higher, such as AES. Encryption can be end to end at the network level, or the data files containing PHI can be encrypted. This requirement pertains to any type of PHI or PI in motion such as website access, file transfer, and E-Mail.

  • Data Transmission Control Except as necessary for the provision of the Cloud Services in accordance with the Agreement, Personal Data must not be read, copied, modified or removed without authorization during transfer. Where data carriers are physically transported, adequate measures are implemented at SAP to provide the agreed-upon service levels (for example, encryption and lead-lined containers).

  • Information Transmission The Provider, on behalf of itself and its respective Subsidiaries, shall use commercially reasonable efforts to provide or make available, or cause to be provided or made available, to the Recipient, in accordance with Section 6.1 of the Separation and Distribution Agreement, any Information received or computed by the Provider for the benefit of the Recipient concerning the relevant Service during the Service Period; provided, however, that, except as otherwise agreed to in writing by the Parties (a) the Provider shall not have any obligation to provide, or cause to be provided, Information in any non-standard format, (b) the Provider and its Subsidiaries shall be reimbursed for their reasonable costs in accordance with Section 6.3 of the Separation and Distribution Agreement for creating, gathering, copying, transporting and otherwise providing such Information, and (c) the Provider shall use commercially reasonable efforts to maintain any such Information in accordance with Section 6.4 of the Separation and Distribution Agreement.