Sentences with phrase «access to a communication network»

As the Directive itself does not list any further criteria, and other language versions of the Directive do not suggest another interpretation, the CJEU concluded, in order to safeguard a uniform interpretation and application of the Directive, that no further requirements beyond that of providing access to a communication network are necessary to qualify for an exemption under Article 12 (1)(paras 52 - 53).

Not exact matches

With everyone on the team able to access the same network, cheap and efficient communication is always readily available.
To secure a segment containing sensitive information or data, an enterprise would simply prevent all communication and physical access, including but not limited to emails, websites, file sharing, cloud services and any external devices such as storage or mobile devices that have both external access and access to the networTo secure a segment containing sensitive information or data, an enterprise would simply prevent all communication and physical access, including but not limited to emails, websites, file sharing, cloud services and any external devices such as storage or mobile devices that have both external access and access to the networto emails, websites, file sharing, cloud services and any external devices such as storage or mobile devices that have both external access and access to the networto the network.
That meant that even company employees could not see messages, phone calls, photos or videos sent across the WhatsApp network, and the company had no way of complying with any court order demanding access to those communications.
Asset Management Equity Financing and Placement Debt Financing and Placement Mergers and Acquisitions Corporate Partnering and Strategic Alliances Restructuring and Workouts Startups and Management Alternative Finance Strategies Advice on Capital Markets Corporate Shareholder Communications Access to Retail, Institutional, and Accredited Investors Database Strategic Introductions to Global Network ConnectInvest - one - on - one Meetings with Global Investors Advice and Introductions on Capital Raises Media and Press Release Distribution Event Creation and Management Representation in Trade Shows and Conferences for Media Exposure
Many factors could cause BlackBerry's actual results, performance or achievements to differ materially from those expressed or implied by the forward - looking statements, including, without limitation: BlackBerry's ability to enhance its current products and services, or develop new products and services in a timely manner or at competitive prices, including risks related to new product introductions; risks related to BlackBerry's ability to mitigate the impact of the anticipated decline in BlackBerry's infrastructure access fees on its consolidated revenue by developing an integrated services and software offering; intense competition, rapid change and significant strategic alliances within BlackBerry's industry; BlackBerry's reliance on carrier partners and distributors; risks associated with BlackBerry's foreign operations, including risks related to recent political and economic developments in Venezuela and the impact of foreign currency restrictions; risks relating to network disruptions and other business interruptions, including costs, potential liabilities, lost revenues and reputational damage associated with service interruptions; risks related to BlackBerry's ability to implement and to realize the anticipated benefits of its CORE program; BlackBerry's ability to maintain or increase its cash balance; security risks; BlackBerry's ability to attract and retain key personnel; risks related to intellectual property rights; BlackBerry's ability to expand and manage BlackBerry ® World ™; risks related to the collection, storage, transmission, use and disclosure of confidential and personal information; BlackBerry's ability to manage inventory and asset risk; BlackBerry's reliance on suppliers of functional components for its products and risks relating to its supply chain; BlackBerry's ability to obtain rights to use software or components supplied by third parties; BlackBerry's ability to successfully maintain and enhance its brand; risks related to government regulations, including regulations relating to encryption technology; BlackBerry's ability to continue to adapt to recent board and management changes and headcount reductions; reliance on strategic alliances with third - party network infrastructure developers, software platform vendors and service platform vendors; BlackBerry's reliance on third - party manufacturers; potential defects and vulnerabilities in BlackBerry's products; risks related to litigation, including litigation claims arising from BlackBerry's practice of providing forward - looking guidance; potential charges relating to the impairment of intangible assets recorded on BlackBerry's balance sheet; risks as a result of actions of activist shareholders; government regulation of wireless spectrum and radio frequencies; risks related to economic and geopolitical conditions; risks associated with acquisitions; foreign exchange risks; and difficulties in forecasting BlackBerry's financial results given the rapid technological changes, evolving industry standards, intense competition and short product life cycles that characterize the wireless communications industry.
Calgary - based Shaw Communications Inc. has agreed to buy Canada's second largest television network and related specialty channels out of bankruptcy protection, giving it access to enhanced content for its new mobile communicatCommunications Inc. has agreed to buy Canada's second largest television network and related specialty channels out of bankruptcy protection, giving it access to enhanced content for its new mobile communicationscommunications platform.
Verizon is a leading global communications company that operates as three main entities: Verizon Wireless, the nation's most reliable 4G LTE network; Verizon Enterprise Services, providing Internet and phone services to large businesses in over 150 countries; and Verizon Residential Solutions, offering landline, digital TV, and Internet access to customers across the U.S.
They're developing a global network of satellite communications ground systems that will provide commercial and startup ventures on - demand access to their space - bound assets.
For background, AngelList is a hybrid social network, communication and crowdsourcing platform that allows startups to access investors, and has also become a resource for investors looking to boost deal flow and connect with other investors.
The firm has developed a broad communications network which makes access to their website as well as to their customer service support team a cinch.
ACCESS Integrated Networks provides local exchange, long distance and other communications services to small and mid-sized businesses in nine Southeastern states.
Interactive networks could offer a communication process empowering individuals and groups to deal with many ethical dilemmas of the «Information Age» such as: how to provide more equitable access to information technologies information overload; privacy; and unemployment caused by technology.
The Internet is just one example of this, a computer network allowing next - to - instant access and communication with people, groups and data libraries next door or on the other side of the world.
Mr Blankson entreated officials of the telcos to «grant access to Messrs Subah Infosolutions Ghana Limited» to their physical network nodes in accordance with the Communications Service Tax (Amendment) Act, 2013 (Act 864).
Background To give a brief background, the Ministry of Communications (MOC) requested from the NCA, policy advice on Clearinghouse, International Wholesale Carriers, Mobile Virtual Network Operators and Fixed Access Service Operators.
Our mission: The Rochester College Access Network supports college access and success through communication, coalition and advocacy for students in Rochester to enable students to meet their full poteAccess Network supports college access and success through communication, coalition and advocacy for students in Rochester to enable students to meet their full poteaccess and success through communication, coalition and advocacy for students in Rochester to enable students to meet their full potential.
Roads, buildings, and communications networks were destroyed and access to electricity and fresh water severely impaired.
In the new paper, the technique the researchers have dubbed «aIR - Jumper» also enables the creation of bidirectional, covert, optical communication between air - gapped internal networks, which are computers isolated and disconnected from the internet that do not allow for remote access to the organization.
Second, it has immense computational power with 1024 multipliers and accumulators operating in parallel and is capable of directly transferring the temporal results to each other without accessing to the external memory or on - chip communication network.
Note: According to Wagner, the seven survival skills are critical thinking and problem solving; collaboration across networks and leading by influence; agility and adaptability; initiative and entrepreneurship; effective oral and written communication; accessing and analyzing information; and curiosity and imagination.
Communication Planning Toolkit - Download for free Communicating the appropriate message to explain the network, college access movement and urgency for change can be challenging, especially if you are not a seasoned public relations professional and are unsure where to start.
Our mission: The Rochester College Access Network supports college access and success through communication, coalition and advocacy for students in Rochester to enable students to meet their full poteAccess Network supports college access and success through communication, coalition and advocacy for students in Rochester to enable students to meet their full poteaccess and success through communication, coalition and advocacy for students in Rochester to enable students to meet their full potential.
ICT literacy focuses on using digital technology, communication tools, and networks to access, manage, integrate, evaluate, and create information.
K12 will provide comprehensive wraparound services targeted to individual student needs and for the benefit of the school community: development of strong community within the virtual academy; access to the best and most current virtual instruction curriculum, assessment and instruction based on solid research; customizing each student's education to their own individual learning plan; academic success at the school and individual student levels resulting from teachers» instruction and constant monitoring of student growth and achievement with interventions as needed; national and local parent trainings and networking; frequent (i.e., every two to three week) teacher / parent communication through emails and scheduled meetings; establishment of unique settings for students and parents to interact; connecting students on a regular basis with students across the United States in similar virtual academies and across the world through networking and K12 national competitions (e.g., art contest and spelling bees) and International Clubs; access to the entire K12 suite of services and instructional curriculum (currently including K12, Aventa, A +, and powerspeak12) to include world languages, credit recovery courses, remedial courses, and AP courses; participation in a national advanced learners programs; a comprehensive Title I program that will provide additional services for students; school led trips, for example, visits to colleges, grade level specific trips such as student summer trips overseas, etc.; School prom; school graduation ceremonies; national college guidance through a network of K12 counselors; school community service opportunities; student developed student body council; school extracurricular activities: possibilities would include the development of a golf club, chess club, bowling club.
NSPRA membership gives school executives access to the largest network of leading school - communication practitioners in North America.
Disseminate data and research: MCAN has access to a variety of data to demonstrate Michigan's progress toward reaching the Big Goal, as well as the communications network to disseminate research to partners and community stakeholders.
The new CX - 5 adopts Mazda Connect *, the advanced car connectivity system that works in conjunction with smartphones and other mobile devices to make it easier to connect to the internet, access to social networking services and use other communications functions.
The online information tends to be more comprehensive, the onboard information can be accessed quickly and reliably - even in locations where there is no mobile communications network.
The Reliance 3G Tab is pre-loaded with 15 most popular applications to provide information services (browsing, navigation maps and search), communication services (email, blog, SMS, and MMS), entertainment services (music, video, and games), and social networking services (Facebook, Twitter, and Orkut) and access to thousands of applications provided through the Android Market.
These capabilities are combined with the advantages of the BlackBerry Enterprise Solution, offering real - time communication via true push technology; cost - effective data usage; efficiency over carrier networks; easy Web - based administration of smartphones, servers, users, groups and applications; single sign - on; and secure wireless access to enterprise systems.
Verizon delivers integrated IT and communications solutions via its global IP and mobility networks to enable businesses to securely access information, share content and communicate.
Connectivity Ultra-fast 4G connectivity via Verizon's network Wireless - N Wi - Fi networking (802.11 b / g / n) for accessing home and corporate networks as well as hotspots while on the go Mobile Hotspot capable enabling you to connect to up to eight devices — from tablets to gaming devices — to the phone's 4G cellular connection via Wi - Fi Preloaded VZ Navigator for navigation and location services Bluetooth profiles supported Headset, Hands Free, Serial Port, Stereo, Audio / Video Remote Control, Generic Audio / Video Distribution, Advanced Audio Distribution, Audio / Video Control Transport, Object Push ProfileObject Push (Vcard, Music, Album, Cal — Push only), Phone Book Access Profile Bluetooth connectivity (version 3.1) Hardware 1.5 GHz dual - core processor speeds up everything — from playing games to watching shows to opening files from work 4.3 - inch, 720P HD super LCD2 Corning Gorilla Glass 2 display with 341 ppi Preinstalled 3FF SIM card Battery Capacity 1800 mAh, non-removable Usage time up to 15 hours Standby time up to 12.5 days Communications & Internet Microsoft Internet Explorer 10 for accessing real websites Text (SMS) and picture / video (MMS) messaging with threaded feature Access to popular instant messaging services Personal and work e-mail supports Microsoft Exchange, Gmail, Yahoo, AOL, Window Live Hotmail, POP3 / IMAP
read more Details Elegantly designed quad - band GSM phone with 3 - inch touchscreen featuring intuitive controls Access AT&T's speedy dual - band 3G network; compatible with AT&T Mobile TV, AT&T Music and Video Share services 2 - megapixel camera with video recording, Bluetooth for communication headsets and stereo headphones, microSD expansion to 4 GB Up to 3 hours of talk time, up to 250 hours (10.5 days) of standby time; measures 4.25 x 2.16 x 0.51 inches (HxWxD)
In 2003, Disnat launched Disnat Direct, a direct access service giving investors instant contact with stock exchanges and parallel markets (ECNs — Electronic Communication Networks), where they could quickly direct their orders to the best market.
Since intraday trading means securing a trading position within the day, if you look forward to after - hour trades, you should be a client of a brokerage firm that has access to ECNs or Electronic Communication Networks, which are trading platforms that permit after business hours trading in major stock exchanges.
Site users are prohibited from violating or attempting to violate the security of this Site, including without limitation: (1) accessing data not intended for such user or logging onto a server or an account which the user is not authorized to access; (2) using this Site for unintended purposes or trying to change the behavior of this Site; (3) attempting to probe, scan or test the vulnerability of a system or network or breach security or authentication measures without proper authorization; (4) attempting to interfere with service to any user, host or network, including without limitation, via means of submitting a virus to this Site, overloading, «flooding,» «spamming,» «mailbombing» or «crashing»; (5) forging any TCP / IP packet header or any part of the header information in any e-mail or newsgroup posting; and (6) forging communications on behalf of this Site (impersonating this site) or to this Site (impersonating a legitimate user).
You will not, and will not allow or authorize others to, use the Services, the Sites or any Materials therein to take any actions that: (i) infringe on PetSmart Charities» or any third party's copyright, patent, trademark, trade secret or other intellectual or proprietary rights, or rights of publicity or privacy; (ii) violate any applicable law, statute, ordinance or regulation (including those regarding export control); (iii) are defamatory, trade libelous, threatening, harassing, invasive of privacy, stalking, harassment, abusive, tortuous, hateful, constitute discrimination based on race, religion, ethnicity, gender, sex, disability or other protected grounds, or are pornographic or obscene; (iv) interfere with or disrupt any services or equipment with the intent of causing an excessive or disproportionate load on PetSmart Charities or its licensors or suppliers» infrastructure; (v) involve knowingly distributing viruses, Trojan horses, worms, or other similar harmful or deleterious programming routines; (vi) involve the preparation and / or distribution of «junk mail», «spam», «chain letters», «pyramid schemes» or other deceptive online marketing practices, or any unsolicited bulk email or unsolicited commercial email or otherwise in a manner that violate any applicable «anti-spam» legislation, including that commonly referred to as «CASL»; (vii) would be or encourage conduct that could constitute a criminal offense, give rise to civil liability or otherwise violate any applicable local, state, national or international laws or regulations; (viii) involve the unauthorized entry to any machine accessible via the Services or interference with the Sites or any servers or networks connected to the Sites or disobey any requirements, procedures, policies or regulations of networks connected to the Sites, or attempt to breach the security of or disrupt Internet communications on the Sites (including without limitation accessing data to which you are not the intended recipient or logging into a server or account for which you are not expressly authorized); (ix) impersonate any person or entity, including, without limitation, one of PetSmart Charities» or another party's officers or employees, or falsely state or otherwise misrepresent your affiliation with a person or entity; (x) forge headers or otherwise manipulate identifiers in order to disguise the origin of any information transmitted through the Sites; (xi) collect or store personal data about other account users or attempt to gain access to other account users» accounts or otherwise mine information about other account users or the Sites, or interfere with any other user's ability to access or use the Sites; (xii) execute any form of network monitoring or run a network analyzer or packet sniffer or other technology to intercept, decode, mine or display any packets used to communicate between the Sites» servers or any data not intended for you; (xiii) attempt to circumvent authentication or security of any content, host, network or account («cracking») on or from the Sites; or (xiv) in PetSmart Charities» sole discretion, are contrary to PetSmart Charities» public image, goodwill, reputation or mission, or otherwise not in furtherance of our Vision of a lifelong, loving home for every pet.
You will not, and will not allow or authorize others to, use the Services or the Sites to take any actions that: (i) infringe on any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy; (ii) violate any applicable law, statute, ordinance or regulation (including those regarding export control); (iii) are defamatory, trade libelous, threatening, harassing, invasive of privacy, stalking, harassment, abusive, tortuous, hateful, discriminatory based on race, ethnicity, gender, sex or disability, pornographic or obscene; (iv) interfere with or disrupt any services or equipment with the intent of causing an excessive or disproportionate load on the Animal League or its licensors or suppliers» infrastructure; (v) involve knowingly distributing viruses, Trojan horses, worms, or other similar harmful or deleterious programming routines; (vi) involve the preparation and / or distribution of «junk mail», «spam», «chain letters», «pyramid schemes» or other deceptive online marketing practices or any unsolicited bulk email or unsolicited commercial email or otherwise in a manner that violate the Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN - SPAM Act of 2003); (vii) would encourage conduct that could constitute a criminal offense, give rise to civil liability or otherwise violate any applicable local, state, federal or international laws, rules or regulations; (viii) involve the unauthorized entry to any machine accessible via the Services or interfere with the Sites or any servers or networks connected to the Sites or disobey any requirements, procedures, policies or regulations of networks connected to the Sites, or attempt to breach the security of or disrupt Internet communications on the Sites (including without limitation accessing data to which you are not the intended recipient or logging into a server or account for which you are not expressly authorized); (ix) impersonate any person or entity, including, without limitation, one of the Animal League's or other's officers or employees, or falsely state or otherwise misrepresent your affiliation with a person or entity; (x) forge headers or otherwise manipulate identifiers in order to disguise the origin of any information transmitted through the Sites; (xi) collect or store personal data about other Animal League members, Site users or attempt to gain access to other Animal League members information, or otherwise mine information about Animal League members, Site users, or the Sites; (xii) execute any form of network monitoring or run a network analyzer or packet sniffer or other technology to intercept, decode, mine or display any packets used to communicate between the Sites» servers or any data not intended for you; (xiii) attempt to circumvent authentication or security of any content, host, network or account («cracking») on or from the Sites; or (xiv) are contrary to the Animal League's public image, goodwill, reputation or mission or otherwise not in furtherance of the Animal Leagues stated purposes.
A high - speed network will supply a smooth and fast streaming of photos and videos and it will give all clients access to web data and online communication.
The Federal Communications Commission fined Marriott International for blocking rival Wi - Fi networks at a Nashville resort in order to force guests to pay for access to the hotel's Internet service.
From free communication apps for staying in touch with loved ones to having access to online travel communities for research and networking — there is an abundance of support to help you prepare for your exciting solo journey.
You can post about your game experiences on Miiverse, our unique network communication service, get access to great downloadable content from Nintendo eShop, and much more!
«PS Vita users will not only be able to enjoy the immersive rich gaming content but through the addition of these social networking services and communications widely used around the globe will also have an easy access and greater opportunity to enjoy communicating with friends by simply selecting the dedicated application,» says Sony.
Branch Arts is an umbrella organisation bringing together two core services: Creative Branch: an art advisory service for private clients and organisations, as well as curating and producing art projects around the world, and Branch Out: offering specialist arts communications and access to our extensive networks of creatives.
New Era explores the technological ambivalence of contemporary culture, raising philosophical questions about the challenges of immediate access to communication and network while we distance ourselves from our metaphysical being.
Smartlet Communications Network: Provides a high reliability meshed network using 802.15.4 technology and GSM / GRPS technology to communicate with the Network Operating System for user authentication, access control, energy flow control and energy meNetwork: Provides a high reliability meshed network using 802.15.4 technology and GSM / GRPS technology to communicate with the Network Operating System for user authentication, access control, energy flow control and energy menetwork using 802.15.4 technology and GSM / GRPS technology to communicate with the Network Operating System for user authentication, access control, energy flow control and energy meNetwork Operating System for user authentication, access control, energy flow control and energy metering.
Strand 3 topics 3.1 Hardware 3.2 Software 3.3 Networks 3.4 / It is important to discuss the social impacts and ethical issues relating to health implications of mobile devices, unauthorized access to wireless networks, interception of communications, storage of personal communications for security purposes / the areas that will be affected by coastal flooding as a result of different levels of global warming Introduction to project management Application software that allows a user to plan, schedule, traNetworks 3.4 / It is important to discuss the social impacts and ethical issues relating to health implications of mobile devices, unauthorized access to wireless networks, interception of communications, storage of personal communications for security purposes / the areas that will be affected by coastal flooding as a result of different levels of global warming Introduction to project management Application software that allows a user to plan, schedule, tranetworks, interception of communications, storage of personal communications for security purposes / the areas that will be affected by coastal flooding as a result of different levels of global warming Introduction to project management Application software that allows a user to plan, schedule, track and /
The Committee then listed six different situations where lawyers might consider a more secure communication method than email, including when: 1) communicating highly sensitive or confidential information via email or unencrypted email connections, 2) sending an email to or from an account that the email sender or recipient shares with others, 3) sending an email to a client when it is possible that a third person (such as a spouse in a divorce case) knows the password to the email account, or to an individual client at that client's work email account, especially if the email relates to a client's employment dispute with his employer 4) sending an email from a public computer or a borrowed computer or where the lawyer knows that the emails may be read on a public or borrowed computer or on an unsecure network, 5) sending an email if the lawyer knows that the recipient may access it on devices that are potentially accessible to third persons or are not protected by a password, or 6) sending an email if the lawyer is concerned that the NSA or other law enforcement agency may read the email, with or without a warrant.
But by permitting owners of businesses to operate open Wi - Fi networks ancillary to their commercial activities, without requiring them to monitor all communications through their networks, users of such networks can use them to access information without having to fear that their private data are being collected.
a b c d e f g h i j k l m n o p q r s t u v w x y z