External Email Use Sample Clauses

External Email Use. Group Manager: Corporate & Customer Services and Information Services Manager Approved
AutoNDA by SimpleDocs

Related to External Email Use

  • Internal Use You will use the Services for Your own internal business, non-residential and non-personal use. You acknowledge and agree that You will not allow any third party, including Your vendors and service providers, to access or use the Services unless such third party is allowed access for the purpose of providing authorized customer support services or in connection with Your appropriate use of the Services for Your own business purposes.

  • External monitoring The external monitoring and audit referred to in Articles 11.1, 11.2, 11.3 and 11.4 of the Regulation shall not in any way relieve the National Focal Point or the Programme Operator of their obligations under the legal framework regarding monitoring of the Programme and/or its projects, financial control and audit.

  • INTERNAL MAIL 1. The Association shall have reasonable access to inter-school mail.

  • Substance Use Disorder counseling shall be provided by a QCC, or Chemical Dependency Counselor Intern. Substance use disorder education and life skills training shall be provided by counselors or individuals who have been trained in the education. All counselor interns shall work under the direct supervision of a QCC.

  • PROHIBITION ON CERTAIN TELECOMMUNICATIONS AND VIDEO SURVEILLANCE SERVICES OR EQUIPMENT To the extent applicable, Supplier certifies that during the term of this Contract it will comply with applicable requirements of 2 C.F.R. § 200.216.

  • Alcohol Use Alcohol use is the consumption of any beverage, mixture or preparation including any medication containing alcohol.

  • Software Casos de Uso Red Hat Enterprise Linux Desktop Red Hat Enterprise Linux Workstation Sistemas de computadoras personales con el fin principal de ejecutar aplicaciones y/o servicios para un usuario único que por lo general trabaja con una conexión directa al teclado y la pantalla. Nota: La implantación de autorizaciones asociadas de sistema Red Hat Network o Módulos de Gestión Inteligente en un sistema que no sea Red Hat Enterprise Linux Desktop o Workstation no es un Caso de Uso soportado.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Authoritative Root Database To the extent that ICANN is authorized to set policy with regard to an authoritative root server system (the “Authoritative Root Server System”), ICANN shall use commercially reasonable efforts to (a) ensure that the authoritative root will point to the top-­‐level domain nameservers designated by Registry Operator for the TLD, (b) maintain a stable, secure, and authoritative publicly available database of relevant information about the TLD, in accordance with ICANN publicly available policies and procedures, and (c) coordinate the Authoritative Root Server System so that it is operated and maintained in a stable and secure manner; provided, that ICANN shall not be in breach of this Agreement and ICANN shall have no liability in the event that any third party (including any governmental entity or internet service provider) blocks or restricts access to the TLD in any jurisdiction.

Time is Money Join Law Insider Premium to draft better contracts faster.