Laptops and PDA Sample Clauses

Laptops and PDA. If End User is employing portable devices to transmit Confidential Data said devices must be encrypted and password-protected.
AutoNDA by SimpleDocs

Related to Laptops and PDA

  • Passwords Passwords are an important aspect of computer security. A poorly chosen password may result in unauthorized access and/or exploitation of Placer County’s resources. All users, including contractors and vendors with access to the County’s systems, are responsible for the creation and protection of passwords and additionally any updates to County Password policies must be followed. Users must not use the same password for Placer County accounts and personal accounts. The reliability of passwords for maintaining confidentiality cannot be guaranteed. Always assume that someone, in addition to the intended or designated recipient, may read any and all messages and files. Any user suspecting that his/her password may have been compromised must, without delay, report the incident to Placer County IT.

  • Training Materials Training Materials will be provided for each student. Training Materials may be used only for either (i) the individual student’s reference during Boeing provided training and for review thereafter or (ii) Customer’s provision of training to individuals directly employed by the Customer.

  • LOGOS, AND FLAGS The Supplier cannot use the seal(s), logos, crests, or reproductions of flags or likenesses of Federal agency officials without specific pre-approval.

  • Telephone Monitoring/Recording From time to time we may monitor and/or record telephone calls between you and us to assure the quality of our customer service or as required by applicable law.

  • Devices BNY Mellon will restrict the transfer of Customer Data from its network to mass storage devices. BNY Mellon will use a mobile device management system or equivalent tool when mobile computing is used to provide the services. Applications on such authenticated devices will be housed within an encrypted container and BNY Mellon will maintain the ability to remote wipe the contents of the container.

  • Background Data The Disclosing Party's Background Data, if any, will be identified in a separate technical document.

Time is Money Join Law Insider Premium to draft better contracts faster.