Mobile Computing Sample Clauses

The Mobile Computing clause defines the rules and expectations regarding the use of mobile devices and related technologies within an organization or under a contract. It typically outlines which devices are permitted, the security protocols users must follow, and any restrictions on accessing company data from mobile platforms. For example, it may require employees to use password protection, encryption, or specific apps when accessing sensitive information remotely. The core function of this clause is to protect organizational data and systems from security risks associated with mobile device usage, ensuring that mobile computing does not compromise confidentiality or integrity.
Mobile Computing. Designated Custodian must maintain a written mobile device/computing management (MDM) policy that has been approved by management and communicated to all appropriate personnel. This policy must reflect current and best practices, specifying parameters including but not limited to: (i) Approved and prohibited applications; (ii) Cryptographic mechanisms to ensure data security; (iii) Identity and access management requirements; and, (iv) Software updates;
Mobile Computing. Mobile computing (where permitted) is performed exclusively over encrypted channels. Wireless Access Points (WAP) only allows authorized users to connect.
Mobile Computing. Only Oracle-approved portable computing devices may be used to access Oracle information resources. To access the Internet, the mobile device must be compliant with the IEEE 802.11b or IEEE 802.11g protocols. Mobile computing devices at Oracle must adhere to the following: • All remote access connections made to the Oracle environment must be made through the approved remote access tools provided by Oracle. • Remote access connections made to Oracle will include an industry-acceptable form of encryption, e.g. https with 2048-bit keys, SSL with 2048-bit key, or VPN. • Non-Oracle computer systems that require network connectivity must conform to Oracle’s IT standards.
Mobile Computing. The Supplier shall ensure that it adopts a policy to protect against the risk of using mobile computing, teleworking activities and communication facilities where these are used to deliver Services to Lloyd’s.
Mobile Computing. Special care should be taken when mobile computing equipment is placed in cars or other forms of transportation, public spaces, hotel rooms, meeting spaces, conference centres, and other unprotected areas outside ▇▇▇▇▇▇▇ Group premises. Employees, contractors, suppliers, stakeholders or other third parties taking mobile computing equipment off-premises must follow these rules: • Mobile computing equipment storing important, confidential or critical information must not be left unattended and, if possible, should be physically locked away in a secure location • When using mobile computing equipment in public places, take care to ensure data cannot be read by unauthorised persons • ‘Strictly Confidential’ information on mobile computing devices must be password protected with a strong password • Ensure Confidential and Strictly Confidential information is stored on mobile computing devices that are encrypted. • Access corporate files via VPN utilising two factor authentication and avoid storing files locally whenever possible

Related to Mobile Computing

  • Automobile Expense When a State-owned vehicle is not available and a supervisor is required to use his/her personal automobile to conduct authorized State business, the Appointing Authority shall reimburse the Supervisor at the then current IRS reimbursement rate for mileage on the most direct route according to Transportation Department records. When a State- owned vehicle is offered and declined by the supervisor, mileage shall be paid at the rate of seven

  • Leading Hand Allowance A person appointed as a leading hand shall be paid at the rate of the undermentioned hourly amounts above the hourly rates of the highest classification supervised in accordance with the number of persons supervised. In charge of not more than one person $0.38 per hour In charge of two and not more than five persons $0.83 per hour In charge of six and not more than 10 persons $1.06 per hour In charge of more than 10 persons $1.41 per hour

  • Automobile Allowance The Company shall provide the Executive with an automobile allowance in the amount of $1,000.00 per month to be allocated at the Executive’s discretion, or such other monthly amount designated by the Board, and that allowance shall be payable in regular installments in accordance with the Company’s general payroll practices.

  • Searchable Whois Notwithstanding anything else in this Agreement, Registry Operator must offer a searchable Whois service compliant with the requirements described in Section 1.10 of Specification 4 of this Agreement. Registry Operator must make available the services only to authenticated users after they logged in by supplying proper credentials (i.e., user name and password). Registry Operator must issue such credentials exclusively to eligible users and institutions that supply sufficient proof of their legitimate interest in this feature (e.g., law enforcement agencies).

  • Compressed Work Week The Company and Union recognize the concept of the compressed work week. It is further understood that the compressed work week conditions will apply only to those departments that are on the compressed work week.