Workstation/Laptop encryption All workstations and laptops that process and/or store County PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Security Office.
Life support equipment (a) If a person living at your premises requires life support equipment, you must register the premises with your retailer or with us. To register, you will need to give written confirmation from a registered medical practitioner of the requirement for life support equipment at the premises. (b) You must tell us or your retailer if the life support equipment is no longer required at the premises.
Infrastructure Modification of the location and/or sizing of the infrastructure for the Project that does not materially change the functionality of the infrastructure.
Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.
Hardware NCR Voyix may offer you the option to purchase or subscribe to Hardware. Hardware provided may not be new but may be like-new, except for Hardware purchased from NCR Voyix, which will be new. Delivery of the Hardware will be made to your designated Licensed Site(s). All Hardware purchased by you directly from NCR Voyix or from a Reseller for use in the United States, including Alaska and Hawaii, includes a standard 30-day non-transferable warranty against defects in manufacture, beginning on the date of purchase. Damage from wear and tear, misuse and other factors are not covered.