Technical Interfaces 3.2.6.1 The Interconnection facilities provided by each Party shall be formatted using either Alternate Xxxx Inversion (AMI) line code with Superframe format framing or Bipolar 8-Zero Substitution with Extended Superframe (B8ZS ESF) format framing or any mutually agreeable line coding and framing.
Research Independence The Company acknowledges that each Underwriter’s research analysts and research departments, if any, are required to be independent from their respective investment banking divisions and are subject to certain regulations and internal policies, and that such Underwriter’s research analysts may hold and make statements or investment recommendations and/or publish research reports with respect to the Company and/or the offering that differ from the views of its investment bankers. The Company hereby waives and releases, to the fullest extent permitted by law, any claims that the Company may have against such Underwriter with respect to any conflict of interest that may arise from the fact that the views expressed by their independent research analysts and research departments may be different from or inconsistent with the views or advice communicated to the Company by such Underwriter’s investment banking divisions. The Company acknowledges that the Representative is a full service securities firm and as such from time to time, subject to applicable securities laws, may effect transactions for its own account or the account of its customers and hold long or short position in debt or equity securities of the Company.
Database The LERG is available through Telcordia. ICONN is available through the Qwest web site.
Third Party Technology Customer is hereby notified that third parties have licensed certain technology to Company, which is contained in the Software. Notwithstanding anything herein to the contrary, Customer hereby consents to the disclosure of Customer’s identity, and such other terms of this Agreement as necessary, to such third party licensors for the purpose of enabling Company to comply with the terms and conditions of such third party licenses. Any such Customer information will be provided pursuant to an obligation of confidentiality and nondisclosure at least as stringent as that imposed by this Agreement.
Technology Discoveries, innovations, Know-How and inventions, whether patentable or not, including computer software, recognized under U.S. law as intellectual creations to which rights of ownership accrue, including, but not limited to, patents, trade secrets, maskworks and copyrights developed under this Agreement.
Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.
Library CONTRACTOR shall provide an inmate law library in compliance with Rule 33-501.301, F.A.C., FDC’s Policy 501.301, and ACA Standards.
Program Integrity The state must have processes in place to ensure that there is no duplication of federal funding for any aspect of the demonstration.
Librarians The normal work week for librarians is 35 hours per week. The maximum for reference desk coverage is 20 hours per week. Individual faculty members may elect to exceed this maximum. Where librarians are involved in instructional modes listed in Article 12.03, these shall be pro-rated. For part-time regular and non-regular type 2 librarians, part of their assignment shall be scheduled as non reference desk duties as agreed upon by the librarian and the administrator responsible. Scheduling work shall follow past practices and shall be delivered in cooperation with the administrator responsible.
Integrity 2.1 Transmission control ☒ VPN connections ☒ The use of private storage media is prohibited ☒ Special protection when physically transporting data media