Spam Filtering Sample Clauses

Spam Filtering. 4.7 You acknowledge that without prior notice to you, we may filter email delivery for spam to accounts hosted by us. Due to the nature of spam filtering software, we cannot guarantee that all spam will be filtered and that all non-spam will not be filtered. You will need to monitor filtered email regularly. Memory limitations
AutoNDA by SimpleDocs
Spam Filtering. 3.7.9.1 SPAM filtering is provided by 3rd Party Solution.
Spam Filtering. Pathway provides an optional Junk Email (SPAM) filtering service. It is designed to help customers control the amount of un-wanted email reaching their mailboxes. We disclaim all warranties either expressed or implied as the warranty of merchantability or fitness for a particular purpose. We make no claims as to the completeness or accuracy of the filtering process.
Spam Filtering. Spam filtering will be administered by Contractor. Appropriate measures will be taken to provide protection from Spam. Contractor will take commercially reasonable spam filtering measures, including, at a minimum, those spam filtering measures Contractor takes to protect other clients and its own internal and external mailing lists.
Spam Filtering. Alenco provides an optional Junk Email (SPAM) filtering service. It is designed to help customers control the amount of un-wanted email reaching their mailboxes. We disclaim all warranties either expressed or implied as the warranty of merchantability or fitness for a particular purpose. We make no claims as to the completeness or accuracy of the filtering process.
Spam Filtering. FuseMail will block 99.9% of inbound spam. Measurement of the spam capture rate requires the prompt submission to the FuseMail support center by Customer of all spam missed by the Service. FuseMail will estimate the percentage of spam detected by the Service by dividing (a) the number of spam emails detected by the Service by (b) the sum of the number of spam emails detected by the Service and the number of verified spam emails reported as missed by Customer. Table 5 applies.

Related to Spam Filtering

  • Evaluation Software If the Software is an evaluation version or is provided to You for evaluation purposes, then, unless otherwise approved in writing by an authorized representative of Licensor, Your license to use the Software is limited solely for internal evaluation purposes in non-production use and in accordance with the terms of the evaluation offering under which You received the Software, and expires 90 days from installation (or such other period as may be indicated within the Software). Upon expiration of the evaluation period, You must discontinue use of the Software, return to an original state any actions performed by the Software, and delete the Software entirely from Your system and You may not download the Software again unless approved in writing by an authorized representative of Licensor. The Software may contain an automatic disabling mechanism that prevents its use after a certain period of time. RESTRICTIONS

  • COVID-19 Protocols Contractor will abide by all applicable COVID-19 protocols set forth in the District’s Reopening and COVID-19 Mitigation Plan and the safety guidelines for COVID-19 prevention established by the California Department of Public Health and the Ventura County Department of Public Health.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

  • Trunk Group Architecture and Traffic Routing The Parties shall jointly engineer and configure Local/IntraLATA Trunks over the physical Interconnection arrangements as follows:

  • Client Money Handling Rules 16.1. The Company will promptly place any Client money it receives into one or more segregated account(s) with reliable financial institutions (i.e. an affiliate, a bank, a market, a settlement agent, a clearing house or OTC counterparty) and the Client funds will be segregated from the Company’s own money and cannot be used in the course of its business. The Client money shall be treated, at all times, in accordance with the applicable ‘Client Money’ rules, as amended from time to time.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Computer Equipment Recycling Program If this Contract is for the purchase or lease of computer equipment, then Contractor certifies that it is in compliance with Subchapter Y, Chapter 361 of the Texas Health and Safety Code related to the Computer Equipment Recycling Program and the Texas Commission on Environmental Quality rules in 30 TAC Chapter 328.

  • Web site Information on registration for and use of the E-Verify program can be obtained via the Internet at the Department of Homeland Security Web site: xxxx://xxx.xxx.xxx/E-Verify.

Time is Money Join Law Insider Premium to draft better contracts faster.