Login/logout Sample Clauses

Login/logout. The User must be able to login into the interface with their HEROES credentials (username, organization, and password). Once logged in, through their active session they have access to all the features they are entitled to in their Organization. The User must be able to manually logout, to prevent any further action with their current session. Logout can also happen automatically after a period of inactivity. The following use cases all consider as a prerequisite that the User is connected and has an active session.
AutoNDA by SimpleDocs

Related to Login/logout

  • Hyperlinks 12.1 You must not link to any material using or by means of the Services that would, if it were made available through the Services, breach the provisions of this Policy.

  • DNS Registry Operator shall comply with relevant existing RFCs and those published in the future by the Internet Engineering Task Force (IETF), including all successor standards, modifications or additions thereto relating to the DNS and name server operations including without limitation RFCs 1034, 1035, 1123, 1982, 2181, 2182, 2671, 3226, 3596, 3597, 4343, and 5966. DNS labels may only include hyphens in the third and fourth position if they represent valid IDNs (as specified above) in their ASCII encoding (e.g., “xn-­‐-­‐ndk061n”).

  • Data Integrity Contractor shall implement policies and procedures reasonably intended to ensure that Protected Health Information and Personally Identifiable Information in its possession is complete, accurate, and current, to the extent necessary for the Contractor’s intended purposes, and has not been altered or destroyed in an unauthorized manner.

  • Web Site Information on registration for and use of the E-Verify program can be obtained via the Internet at the Department of Homeland Security Web site: xxxx://xxx.xxx.xxx/E-Verify.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Use of the Card 1. The Cardmember must sign the Card in ink, using a ball point pen, as soon as he or she receives it; the Cardmember must also safeguard the Card and preserve any PIN in extreme secrecy and keep it separate from his or her Card. The Cardmember must not use the Card after the expiration of the validity period embossed on it, and not use the Card after it has been damaged, withdrawn or cancelled.

  • Searchability Offering searchability capabilities on the Directory Services is optional but if offered by the Registry Operator it shall comply with the specification described in this section.

  • Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.

  • Domain Name Data 1.5.1 Query format: whois EXAMPLE.TLD

  • Catalog Information about Community Regional Medical Center – Diagnostic Medical Sonography Program (CRMC-DMSP) is published in a school catalog that contains a description of certain policies, procedures, and other information about the school. CRMC-DMSP reserves the right to change any provision of the catalog at any time. Notice of changes will be communicated in a revised catalog, an addendum or supplement to the catalog, or other written format. Students are expected to read and be familiar with the information contained in the school catalog, in any revisions, supplements and addenda to the catalog, and with all school policies. By enrolling in CRMC-DMSP, the Student agrees to abide by the terms stated in the catalog and all school policies.

Time is Money Join Law Insider Premium to draft better contracts faster.