Transmitting Sample Clauses

Transmitting posting, receiving, retrieving, storing or otherwise reproducing, distributing or providing access to any program or information constituting or encouraging conduct that would constitute a criminal offence or give rise to civil liability.
Transmitting information securely When sharing information both the sender and the receiver should deal with the information according to its protective marking. See Appendix 2 for handling requirements in line with protective marking. Secure e-mail Lincolnshire Police documents must display the Protective marking at the top and bottom of the relevant text or attachments. Insecure e-mail should not be used for any personalised information. The below secure e-mail addresses may be used for information protectively marked up to and including RESTRICTED: a) CJSM b) PNN c) GSI d) GSX e) f) GCSX g)
Transmitting and receiving permission-to-present requests in a multi-point session To request permission to present, a TIP endpoint MUST send a REQTOSEND packet on the video session setting the flag parameter to indicate a “request to transmit” and setting a single or dual auxiliary (aka, AUX/Presentation) video positions in the video position parameter. If the request is granted, the multi-point device will send a REQTOSEND ACK packet on the video session setting the video positions that are granted. The endpoint SHOULD start its transmission once it has received the REQTOSEND ACK packet. If the multi-point device denies the request due to conflict with another endpoint that already has permission to transmit, the multi-point device will deny the request by sending a REQTOSEND ACK packet setting video position to 0. A TIP endpoint receiving a REQTOSEND MUST grant the request as long as it includes a video position satisfying the current TIP session’s negotiated capability. The request is granted via ACK-ing it and starting the presentation receivers. If the endpoint was already transmitting presentation prior to receiving the REQTOSEND, it MUST stop its presentation transmission on both audio and video channels, ACK the request and start its presentation receivers. TIP endpoints SHOULD only deny a REQTOSEND packet if the REQTOSEND does not include a video position that satisfies the current TIP session’s negotiated capabilities. A presentation (AUX) conflict can occur when a REQTOSEND is received from the multipoint device requesting permission to present at the same time that a local REQTOSEND has been sent from the endpoint. In that case, the TIP endpoint should assume it is the winner of the conflict and wait for the REQTOSEND ACK to come from the remote peer before sending media on the presentation/AUX stream.
Transmitting the transferring of data electronically, such as via email.
Transmitting and receiving e-mail to and from friends, family, faculty, and staff is permitted.
Transmitting posting, sending, uploading, distributing, submitting or otherwise making available any viruses, Trojan horses or other harmful, disruptive or destructive files or material that interferes with any third party's use and enjoyment of the Site;
Transmitting. Finally, the High Command tribunal held that a commander was responsible for ordering a crime if he transmitted an unlawful order issued by one of his superiors to officers subordinate to himself. “The transmittal through the chain of command constitutes an implementation of an order. Such orders carry the authoritative weight of the superior who issues them and of the subordinate commanders who pass them on for compliance.”39 Transmission was criminal for two different kinds of orders. When an order was criminal on its face, the mere act of transmission qualified as ordering. Xxx Xxxxxxx, for example, was convicted for passing an obviously illegal order down the chain of command that required the execution of any civilian found in the vicinity of partisan activity.40 The issue was more complicated when an order (or part of an order) was not criminal on its face, but was capable of being applied in a criminal manner. The High Command tribunal held that, in such situations, it was criminal for a commander to transmit the order “without proper safeguards as to its application.”41 Xxx Xxxx was thus convicted for participating in the Barbarossa Jurisdiction Order because there was no evidence that “it was in any way clarified or that instructions were given in any way to prevent its illegal application.“42 Although the High Command tribunal took a broad approach to transmission, it insisted that a commander could not be held responsible for transmitting an illegal order if he was outside the chain of command. The rationale for criminalizing transmission was, as noted, that the 34 Id. at 665. 35 Id. at 693. 36 Hostage, XI TWC 1288. 37 High Command, XI TWC 515. 38 Id. at 665. 39 Id. at 510. 40 Id. at 617. 41 Id. at 525. 42 Id. at 560-61. subordinate commander lent his authority to an unlawful order by passing it along. That rationale did not apply when a superior authority simply used a subordinate commander‟s headquarters to distribute an illegal order to military units in the field. In such a situation, the transmission was a “mere intermediate administrative function” for which the commander could not be held responsible.43
Transmitting a. Any program delivered from SLCS, for the purpose of educating children, shall be taught by a volunteer from the bargaining unit. The bargaining unit will provide at least one unit member who is certified to teach a full year course on the system at the District’s request. During the 1997-98 school year, if no volunteer is available, then SLCS may utilize staff outside the bargaining unit. Due to the interactive nature of the technology, the transmission must be live; subsequent use of taped recordings of the live transmission must be for the purposes of student review for participating students and/or for the completion of makeup work.
Transmitting posting, publishing, disseminating, receiving, retrieving, storing or otherwise reproducing, distributing or providing access to any files, program or information designed to assist users in defeating copy-protection, registration and any other anti-theft mechanisms associated with commercial or shareware programs.
Transmitting posting, sending, uploading, distributing, submitting or otherwise making available through the Site any content containing any solicitation for funds, promotion, advertising, or solicitation for goods or services. You also hereby acknowledge and agree that you are prohibited from soliciting other users on of this website to join or become members of any commercial institution, online service or organization;