Scans Sample Clauses

Scans. In order to maintain the security of the Subscription Services, regular network and system scans are performed, including non-intrusive network scans on customer-facing infrastructure.
AutoNDA by SimpleDocs
Scans. Scans in excess of ½ of print/copy volume accumulated during contract billing period will be charged @ $.003 per scan (example; 1000 chargeable scans @ .003 = $3.00).
Scans. If Institution deems it necessary to perform security scans or other similar tests, the Institution must comply with the following mandatory requirements: (i) provide one week’s notice of intent to test; (ii) coordinate testing with Company staff;
Scans. In order to maintain the security of the Subscription Services, Apttuswill perform regular network and system scans, including non-intrusive network scans on web-facing infrastructure.
Scans. AREAS OF COMPETENCIES The U.S. Department of Labor's Secretary's Commission on Achieving Necessary Skills (SCANS) to enter the workplace documentation has determined that a total of 43 competencies must be addressed and the method(s) of determining competency listed. Three competencies are assigned to RNSG 1413: Use Information Skills #5-Acquire information Develop skills and techniques to implement the basic nursing process. Reflect knowledge of then nursing process in:
Scans. Different Copayment and/or Coinsurance amounts may apply to these Covered Services. Please refer to your Attachment A Benefit Schedule.
Scans. Different Copayment and/or Coinsurance amounts may apply to these Covered Services. Please refer to your Attachment A Benefit Schedule. Pediatric Dental and Vision Services Covered Services are available to enrolled children up to age (19) when authorized by SHL’s Managed Care Program and ends the first of the month after the Insured’s 19th birthday. Pediatric Vision coverage includes services for: • Vision Examination; • Lenses Frames; • Contact Lenses; • Low Vision Exam; and • Optional Lenses and Treatments. Pediatric Dental coverage includes: • Diagnostic and Preventive Services; • Restorative Services; • Endodontic Services; • Periodontic Services; • Prosthodontic Services; • Orthodontic Services; and • Oral Surgery Services. (For a complete listing of Pediatric Dental Services and the associated limitations, please refer to the Nevada Division of Insurance website located at xxxx://xxx.xx.xxx/Healthcare-Reform/Individuals-Families/Essential-Health-Benefits/.) Please refer to the SHL Attachment A Benefit Schedule for the associated Insured cost share and limitations for Pediatric Dental and Vision Covered Services. Physician Surgical Services - Inpatient and Outpatient Covered Services include surgical services that are generally recognized and accepted procedures for diagnosing or treating an Illness or Injury. Post-Cataract Surgical Services Covered Services include Medically Necessary services provided for the initial prescription for corrective lenses (eyeglasses or contact lenses) and frames or intra-ocular lens implants for Post-Cataract Surgical Services. Contact lenses will be covered if an Insured’s visual acuity cannot be corrected to 20/70 in the better eye except for the use of contact lenses.
AutoNDA by SimpleDocs
Scans. On a monthly basis, Arctic Wolf will use the Solution to conduct external vulnerability assessment scans of Customer’s environment. As part of these scans, vulnerability and exploit information will be normalized and correlated with other data sources in order to determine Customer’s Security Score and prioritization of any identified remediation strategies. Arctic Wolf will deliver to Customer a summary security report that includes Security Incident and Emergency notification activities on a monthly and quarterly basis. Configuration Score (aka Security Score). Customer’s Security Score is provided as part of the Solution is for illustrative and informational purposes only and may be used by Customer for internal benchmarking purposes. The Security Score is based on certain information related to the results of the Solution within Customer’s environment and is compiled using the Solutions Data made available to Arctic Wolf in conjunction with its delivery of the Solution. Customer’s Security Score will be communicated in Customer’s summary reports in addition to being available on Customer’s online Executive Dashboard. Customers may elect to compare their Security Score against industry averages from organizations in the same industry vertical to assess how Customer is performing against industry norms. Host Containment. Based upon the agreed upon escalation process and provided that the Arctic Wolf Agent is deployed by Customer, Arctic Wolf’s Security Services team will remotely isolate a Customer endpoint device(s) that shows evidence of compromise or other suspicious activity. When the Security Services team identifies certain indicators of attack on an endpoint, the containment action will be initiated systematically, in accordance with the agreed upon escalation process, to rapidly quarantine the suspected compromised system. The indicators of attack that may drive containment actions include those relating to ransomware (and other types of advanced malware), malicious command-and-control (C2) activity, or active data exfiltration attempts. When an endpoint is in a contained state, only essential control traffic between the Arctic Wolf Agent and the Arctic Wolf server will be allowed in order to enable forensics investigations. The endpoints under containment will receive a containment notification and the containment action will be detailed in an incident ticket. The customer portal will display the Customer endpoints that are currently in a contai...

Related to Scans

  • Images If applicable, the CONSULTANT is prohibited from capturing on any visual medium images of any property, logo, student, or employee of the DISTRICT, or any image that represents the DISTRICT without express written consent from the DISTRICT.

  • Devices BNY Mellon will restrict the transfer of Customer Data from its network to mass storage devices. BNY Mellon will use a mobile device management system or equivalent tool when mobile computing is used to provide the services. Applications on such authenticated devices will be housed within an encrypted container and BNY Mellon will maintain the ability to remote wipe the contents of the container.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Cameras j) Portable music player, headphones.

  • Cell Phones The College follows the State’s Cell Phone Policy. Employees who receive cell phones from the College shall also abide by this Policy. The College shall provide the Policy to any employee who is given a cell phone. Employees are responsible for the cost of all personal calls. While the College anticipates some incidental personal use of cell phones, it is also expected that such use is infrequent.

  • Encryption The Fund acknowledges and agrees that encryption may not be available for every communication through the System, or for all data. The Fund agrees that Custodian may deactivate any encryption features at any time, without notice or liability to the Fund, for the purpose of maintaining, repairing or troubleshooting the System or the Software.

  • MOBILE DATA COMPUTERS 20 1. As part of the law enforcement services to be provided to CITY, COUNTY 21 has provided, or will provide, mobile data computers (hereinafter called 22 “MDCs”) that are or will be mounted in patrol vehicles and motorcycles, 23 designated by COUNTY for use within CITY limits.

  • Workspace Whenever an academic or student union building is planned for construction or renovation, there shall be consideration of the needs for office space of graduate student employees in relevant departments. The University shall provide to all graduate student employees an on-campus mailbox. With approval of their department chair, graduate student employees shall be given key access into the buildings in which their offices or labs are housed for the purpose of performing assistantship work in said office or lab which is permitted by the department chair to be done outside of regular business hours. Department chairs may deny key access into buildings and/or offices/labs in order to minimize access to confidential materials or to minimize the risk of theft, fire/explosion hazards, personal harm, and other security/safety issues. Denial shall not be arbitrary or capricious. If key access is denied, the reason will be provided to the graduate student employee(s) involved. All departmental policies related to the issuance of keys to TOs shall apply equally to TOs in the Division of Continuing Education. Graduate student employees shall have reasonable access to photocopiers for copying related to their employment within departmental guidelines for usage. The parties agree to the creation of a joint committee, composed of equal numbers of representatives of the Union and the University, that will attempt to develop a plan to provide appropriate telephone access for bargaining unit members in connection with their employment responsibilities. The University will provide to this committee a report on the offices assigned to bargaining unit members during the 2005-2006 academic year and the proximity of those offices to a University telephone available for use by the respective bargaining unit member.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

Time is Money Join Law Insider Premium to draft better contracts faster.