Encryption of Information Sample Clauses

Encryption of Information. Use industry-standard encryption techniques (for example, public encryption algorithms such as 3DES, RC4 RC5, IDEA, RSA and AES) at cipher strengths no less than 128-bit or equivalent for Customer Confidential Information. Computershare shall use industry standard authentication practices for Customer Confidential Information.
AutoNDA by SimpleDocs
Encryption of Information. Industry-standard encryption techniques (for example, public encryption algorithms such as, RC5, IDEA, RSA and AES) shall be used at cipher strengths no less than 256- bit or equivalent for applicable Customer Content. RSA shall use industry standard authentication practices to authenticate parties and secure messages and/or communications involving Customer Content.‌

Related to Encryption of Information

  • Protection of Information E1 Data Protection Xxx X0 Official Secrets Acts 1911, 1989, Section 182 of the Finance Xxx 0000 E3 Confidentiality E4 Freedom of Information E5 Security of Confidential Information E6 Publicity, Media and Official Enquiries E7 Security E8 Intellectual Property Rights and Assigned Deliverables E9 Audit and the National Audit Office

  • Dissemination of Information The Borrower authorizes each Lender to disclose to any Participant or Purchaser or any other Person acquiring an interest in the Loan Documents by operation of law (each a "Transferee") and any prospective Transferee any and all information in such Lender's possession concerning the creditworthiness of the Borrower and its Subsidiaries, including without limitation any information contained in any Reports; provided that each Transferee and prospective Transferee agrees to be bound by Section 9.11 of this Agreement.

  • Preservation of Information The Trustee shall preserve, in as current a form as is reasonably practicable, the names and addresses of Certificateholders contained in the most recent list furnished to the Trustee as provided in Section 7.14, and the names and addresses of Certificateholders received by the Trustee in its capacity as Registrar, if so acting. The Trustee may destroy any list furnished to it as provided in Section 7.14, upon receipt of a new list so furnished.

  • Provision of Information (a) For so long as any of the Certificates of any Series or Class are “restricted securities” within the meaning of Rule 144(a)(3) under the Act, each of the Depositor, the Master Servicer and the Trustee agree to cooperate with each other to provide to any Certificateholders, and to any prospective purchaser of Certificates designated by such holder, upon the request of such holder or prospective purchaser, any information required to be provided to such holder or prospective purchaser to satisfy the condition set forth in Rule 144A(d)(4) under the Act. Any reasonable, out-of-pocket expenses incurred by the Trustee in providing such information shall be reimbursed by the Depositor.

  • Return of Information Upon written request by the disclosing Party, all of the disclosing Party’s Confidential Information in whatever form shall be returned to the disclosing Party upon termination of this Agreement or destroyed with destruction certified by the receiving Party, without the receiving Party retaining copies thereof except that one copy of all such Confidential Information may be retained by a Party’s legal department for purposes of resolving any dispute that may arise hereunder or for complying with Applicable Law or the rules of any securities exchange applicable to the Party, and the receiving Party shall be entitled to retain any Confidential Information in electronic form stored on automatic computer back-up archiving systems during the period such backup or archived materials are retained under such Party’s customary procedures and policies; provided, however, that any Confidential Information retained by the receiving Party shall be maintained subject to confidentiality pursuant to the terms of this Section 8.6, and such archived or back-up Confidential Information shall not be accessed except as required by Applicable Law.

  • Supply of Information The Republic agrees to deliver or cause to be delivered to each Stock Exchange copies of such documents as may be reasonably required for the purpose of obtaining such listing.

  • Furnishing of Information Until the earliest of the time that (i) no Purchaser owns Securities or (ii) the Warrants have expired, the Company covenants to timely file (or obtain extensions in respect thereof and file within the applicable grace period) all reports required to be filed by the Company after the date hereof pursuant to the Exchange Act even if the Company is not then subject to the reporting requirements of the Exchange Act.

  • Preservation of Information; Communications to Holders (a) The Trustee shall preserve, in as current a form as is reasonably practicable, the names and addresses of Holders contained in the most recent list furnished to the Trustee as provided in Section 7.1 and the names and addresses of Holders received by the Trustee in its capacity as Securities Registrar. The Trustee may destroy any list furnished to it as provided in Section 7.1 upon receipt of a new list so furnished.

  • Availability of Information To make DHCS PI and PII available to the DHCS and/or 15 COUNTY for purposes of oversight, inspection, amendment, and response to requests for records, 16 injunctions, judgments, and orders for production of DHCS PI and PII. If CONTRACTOR receives 17 DHCS PII, upon request by COUNTY and/or DHCS, CONTRACTOR shall provide COUNTY and/or 18 DHCS with a list of all employees, contractors and agents who have access to DHCS PII, including 19 employees, contractors and agents of its subcontractors and agents.

Time is Money Join Law Insider Premium to draft better contracts faster.