Digital Identifiers Sample Clauses

The Digital Identifiers clause establishes the rules and responsibilities regarding the use of unique electronic identifiers, such as usernames, digital signatures, or access credentials, within the context of the agreement. It typically specifies how these identifiers are assigned, managed, and used to authenticate parties or authorize actions in digital transactions. By clearly defining the use and management of digital identifiers, this clause helps ensure secure and reliable identification of parties, reducing the risk of unauthorized access or disputes over digital actions.
Digital Identifiers. The Represented Member shall assign or re-assign (as the case may be) a Digital Identifier (as provided by PILA technical specifications, as may be modified from time to time) to each of its Original Works, and shall provide the same to PILA, and PILA shall register the same within the PILA System and elsewhere consistent with its business practice.

Related to Digital Identifiers

  • Indirect Identifiers Any information that, either alone or in aggregate, would allow a reasonable person to be able to identify a student to a reasonable certainty Information in the Student’s Educational Record Information in the Student’s Email

  • Workstation/Laptop encryption All workstations and laptops that process and/or store County PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Security Office.

  • Web Site Information on registration for and use of the E-Verify program can be obtained via the Internet at the Department of Homeland Security Web site: ▇▇▇▇://▇▇▇.▇▇▇.▇▇▇/E-Verify.

  • Hyperlinks 12.1 You must not link to any material using or by means of the Services that would, if it were made available through the Services, breach the provisions of this Policy.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.