Cellular Transmissions Sample Clauses

Cellular Transmissions. Badger Meter cellular endpoints conform to the AES256 encryption standards or the latest AES standard in effect. Customer acknowledges that neither Badger Meter nor its Suppliers can guarantee the privacy or security of any cellular transmissions as part of the Service. Customer acknowledges that cellular transmissions are capable of being intercepted by third parties without the knowledge or permission of Badger Meter or its Suppliers. Badger Meter and its Suppliers shall not be liable to Customer, the Authorized Users, the Authorized Consumers or any third party for interception or unauthorized use of any data transmitted through the cellular network, as part of the Service.
AutoNDA by SimpleDocs

Related to Cellular Transmissions

  • Transmissions 10.1. Personal Data transmitted by the Data Processor in connection with the Service through the Internet shall be reasonably encrypted. The Parties acknowledge, however, that the security of transmissions over the Internet cannot be guaranteed. The Data Processor will not be responsible for Data Controller’s access to the Internet, for any interception or interruption of any communications through the Internet, or for changes to or losses of Personal Data through the Internet.

  • Data Transmission The procedures for transmitting load obligation data to PJM for DS Supplier’s DS Load shall be as set forth by PJM.

  • Transmission Service Point-To-Point Transmission Service provided under Part II of the Tariff on a firm and non-firm basis.

  • Transmisión A. El Software Apple adquirido en la Mac App Store no es transferible. Si vende su hardware de marca Apple a un xxxxxxx, xxxxx xxxxxx quitar el Software Apple del mismo.

  • Transmission The Custodian and the Fund shall comply with SWIFT’s authentication procedures. The Custodian will act on FT Instructions received via SWIFT provided the instruction is authenticated by the SWIFT system. § Written Instructions. Instructions may be transmitted in an original writing that bears the manual signature of an Authorized Person(s).

  • Merchant Transmission Facilities “Controllable A.C. Merchant Transmission Facilities” shall mean transmission facilities that (1) employ technology which Transmission Provider reviews and verifies will permit control of the amount and/or direction of power flow on such facilities to such extent as to effectively enable the controllable facilities to be operated as if they were direct current transmission facilities, and

  • Transmission encryption All data transmissions of County PHI or PI outside the secure internal network must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as AES. Encryption can be end to end at the network level, or the data files containing PHI can be encrypted. This requirement pertains to any type of PHI or PI in motion such as website access, file transfer, and E-Mail.

  • Firm Point-To-Point Transmission Service “Non-Firm Point-To-Point Transmission Service” shall mean Point-To-Point Transmission Service under the Tariff that is reserved and scheduled on an as-available basis and is subject to Curtailment or Interruption as set forth in Tariff, Part II, section 14.7. Non-Firm Point-To-Point Transmission Service is available on a stand-alone basis for periods ranging from one hour to one month. Non-Firm Sale:

  • Facsimile Transmission A FT Instruction transmitted to the Custodian by facsimile transmission must be transmitted by the Fund to a telephone number specified from time to time by the Custodian for such purposes. The Custodian will then follow one of the procedures below:

  • Transmission Control In-transit: We make HTTPS encryption (also referred to as SSL or TLS) available on every one of its login interfaces and for free on every customer site hosted on the HubSpot products. Our HTTPS implementation uses industry standard algorithms and certificates. At-rest: We store user passwords following policies that follow industry standard practices for security. We have implemented technologies to ensure that stored data is encrypted at rest.

Time is Money Join Law Insider Premium to draft better contracts faster.