Scans Sample Clauses

The "Scans" clause defines the terms and conditions under which scanning or inspection of goods, documents, or systems may occur within the context of the agreement. Typically, this clause outlines who is authorized to perform scans, the scope and frequency of such scans, and any requirements for advance notice or confidentiality. For example, it may allow a party to conduct security scans of delivered software or physical inspections of shipments to verify compliance with specifications. The core function of this clause is to ensure transparency and quality control by granting the right to verify that contractual obligations are being met.
Scans. In order to maintain the security of the Subscription Services, regular network and system scans are performed, including non-intrusive network scans on customer-facing infrastructure.
Scans. Scans in excess of ½ of print/copy volume accumulated during contract billing period will be charged @ $.003 per scan (example; 1000 chargeable scans @ .003 =
Scans. If Institution deems it necessary to perform security scans or other similar tests, the Institution must comply with the following mandatory requirements: (i) provide one week’s notice of intent to test; (ii) coordinate testing with Company staff; (iii) perform testing only during non-peak non-daytime hours; and (iv) compensate Company the greater of $2,500 or the Company’s Professional Services rate per staff hour for Company staff participation required, if any.
Scans. In order to maintain the security of the Subscription Services, Apttus will perform regular network and system scans, including non-intrusive network scans on web-facing infrastructure.
Scans. The parties understand that in connection with the performance of the Agreement, SureSmile may need the Customer to submit patient specific scans and other order specific details.
Scans. On a monthly basis, Arctic Wolf will use the Solution to conduct external vulnerability assessment scans of Customer’s environment. As part of these scans, vulnerability and exploit information will be normalized and correlated with other data sources in order to determine Customer’s Security Score and prioritization of any identified remediation strategies. Arctic Wolf will deliver to Customer a summary security report that includes Security Incident and Emergency notification activities on a monthly and quarterly basis. Configuration Score (aka Security Score). Customer’s Security Score is provided as part of the Solution is for illustrative and informational purposes only and may be used by Customer for internal benchmarking purposes. The Security Score is based on certain information related to the results of the Solution within Customer’s environment and is compiled using the Solutions Data made available to Arctic Wolf in conjunction with its delivery of the Solution. Customer’s Security Score will be communicated in Customer’s summary reports in addition to being available on Customer’s online Executive Dashboard. Customers may elect to compare their Security Score against industry averages from organizations in the same industry vertical to assess how Customer is performing against industry norms. Host Containment. Based upon the agreed upon escalation process and provided that the Arctic Wolf Agent is deployed by Customer, Arctic Wolf’s Security Services team will remotely isolate a Customer endpoint device(s) that shows evidence of compromise or other suspicious activity. When the Security Services team identifies certain indicators of attack on an endpoint, the containment action will be initiated systematically, in accordance with the agreed upon escalation process, to rapidly quarantine the suspected compromised system.
Scans. You assign to Align all right (including Intellectual Property), title, and interest in and to Scans. In the event such assignment fails, you grant the Align Group a non-exclusive worldwide, fully paid up, royalty free, irrevocable, perpetual, sub-licensable, transferable license and right to reproduce, create derivative works, distribute, display, publish, perform or otherwise use Scans, and any Intellectual Property directed to the Content, for the Align Purposes (“Scan License”).
Scans. AREAS OF COMPETENCIES The U.S. Department of Labor's Secretary's Commission on Achieving Necessary Skills (SCANS) to enter the workplace documentation has determined that a total of 43 competencies must be addressed and the method(s) of determining competency listed. #5-Acquire information Develop skills and techniques to implement the basic nursing process. Reflect knowledge of then nursing process in: a. class participation/case-studies b. theory exams #7-Organize information Able to assign acquired data to correct categories within the nursing process a. Theory exams b. Lab practicum/exams #30-Demonstrate reading competence Analyzes written/printed information to determine appropriate course of action. a. Case-Studies b. Multiple-choice question exams
Scans. On a monthly basis, Arctic Wolf will use the Solution to conduct external vulnerability assessment scans of Customer’s environment. As part of these scans, vulnerability and exploit information will be normalized and correlated with other data sources to determine Customer’s Security Score and prioritization of any identified remediation strategies. Arctic Wolf will deliver to Customer a summary security report that includes Security Incident and Emergency notification activities on a monthly and quarterly basis. Coverage Score (fka Configuration Score or Security Score). Customer’s Coverage Score is provided as part of the Solution for illustrative and informational purposes only and may be used by Customer for internal benchmarking. The Coverage Score is based on certain information related to the results of the Solution within Customer’s environment and is compiled using the Solutions Data made available to Arctic Wolf in conjunction with its delivery of the Solution. Customer’s Coverage Score will be communicated in Customer’s summary reports in addition to being available on Customer’s online Executive Dashboard. Customers may elect to compare their Coverage Score against industry averages from organizations in the same industry vertical to assess how Customer is performing against industry norms.

Related to Scans

  • Images If applicable, the CONSULTANT is prohibited from capturing on any visual medium images of any property, logo, student, or employee of the DISTRICT, or any image that represents the DISTRICT without express written consent from the DISTRICT.

  • Devices BNY Mellon will restrict the transfer of Customer Data from its network to mass storage devices. BNY Mellon will use a mobile device management system or equivalent tool when mobile computing is used to provide the services. Applications on such authenticated devices will be housed within an encrypted container and BNY Mellon will maintain the ability to remote wipe the contents of the container.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store County PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Security Office.

  • Cameras 3.2 NSP items may only be acquired through the Contractor or their Authorized Dealer and must be reported quarterly with all other sales under the Master Agreement. 3.3 NSP items must be priced at a minimum discount of 15% from MSRP or List Price. 3.4 NSP items may be offered to a Purchasing Entity as a stand-alone option, and the maximum allowable amount of all NSP items in a single Order shall be determined by the Participating State or Entity. 3.5 It shall be at the discretion of the Participating State or Entity to allow Open Market Items in their Participating Addendum.

  • Cell Phones The College follows the State’s Cell Phone Policy. Employees who receive cell phones from the College shall also abide by this Policy. The College shall provide the Policy to any employee who is given a cell phone. Employees are responsible for the cost of all personal calls. While the College anticipates some incidental personal use of cell phones, it is also expected that such use is infrequent.