Digital Only Token Sample Clauses

Digital Only Token. A Source Device shall not set the Digital Only Token to DOT asserted except where the encoding upstream from the Source Device directs the Source Device to assert the Digital Only Token in the Source Device. For the avoidance of doubt, the Source Device need not set such token to asserted where such DT Data has not been encoded in accordance with the requirements of the Encoding Rules.
AutoNDA by SimpleDocs
Digital Only Token. A Licensed Content Producer making Licensed Content Products shall not embed the Digital Only Token, and Content Participants/Providers shall not direct Licensed Content Producers to embed the Digital Only Token in Licensed Content Products. Note: Content Participants and Providers will be able to direct Licensed Content Producers to embed the Digital Only Token under certain conditions under the Final Content Participant and Final Content Provider Agreements.

Related to Digital Only Token

  • Use of the Card 1. The Cardmember must sign the Card in ink, using a ball point pen, as soon as he or she receives it; the Cardmember must also safeguard the Card and preserve any PIN in extreme secrecy and keep it separate from his or her Card. The Cardmember must not use the Card after the expiration of the validity period embossed on it, and not use the Card after it has been damaged, withdrawn or cancelled.

  • Usage for Voice Mail Message Service 6.1.2 Rated Incollects (originated in BellSouth and from other companies) can also be on Optional Daily Usage File. Rated Incollects will be intermingled with BellSouth recorded rated and unrated usage. Rated Incollects will not be packed separately.

  • AT WEBSITE XXX XXXXXXXXXXXXXXXX.XXX Prospective bidders may submit bids for the property online via xxx.xxxxxxxxxxxxxxxx.xxx (For online bidding, please register at least one (1) working day before auction day for registration & verification purposes)

  • Use of Cookies 5.1 We use cookies to ensure that our website works effectively and to support your trading activities. Cookies are small text files sent from our web server to your computer. Our cookies do not contain any personal data, account numbers, or passwords.

  • Internet Use 7.1. Customer is prohibited from posting or transmitting unlawful material on or via the Internet or the World Wide Web.

  • INFORMATION OF LOCKHEED XXXXXX (a) Information provided by LOCKHEED XXXXXX to SELLER remains the property of LOCKHEED XXXXXX. XXXXXX agrees to comply with the terms of any proprietary information agreement with LOCKHEED XXXXXX and to comply with all proprietary information markings and restrictive legends applied by LOCKHEED XXXXXX to anything provided hereunder to SELLER. XXXXXX agrees not to use any LOCKHEED XXXXXX provided information for any purpose except to perform this Contract and agrees not to disclose such information to third parties without the prior written consent of LOCKHEED XXXXXX. SELLER shall maintain data protection processes and systems sufficient to adequately protect LOCKHEED XXXXXX provided information and comply with any law or regulation applicable to such information.

  • Xxxxxxx INTERNET Xxxxxx.Xxxxxxx@xxx.xxx TELEPHONE: (000) 000-0000 FAX: (000) 000-0000 /RA Xxxxxx Xxxxx for/ Xxxxx X. XxXxxxxxx, Director Division of Materials Safety and State Agreements Office of Federal and State Materials and Environmental Management Programs Enclosures:

  • DS3 Loop DS3 Loop is a two-point digital transmission path which provides for simultaneous two-way transmission of serial, bipolar, return-to-zero isochronous digital electrical signals at a transmission rate of 44.736 megabits per second (Mbps) that is dedicated to the use of the ordering CLEC in its provisioning of local exchange and associated exchange access services. It may provide transport for twenty-eight (28) DS1 channels, each of which provides the digital equivalent of twenty-four (24) analog voice grade channels. The interface to unbundled dedicated DS3 transport is a metallic-based electrical interface.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Internet Banking service by means of which it is possible for the client to exercise various transactions posted by the Bank on the special web page of the bank xxx.xxxxxxxxx.xx (without visiting the Bank), according to the regulations established by the Bank;

Time is Money Join Law Insider Premium to draft better contracts faster.