Access Protections Sample Clauses

Access Protections. All Provider interconnectivity to Company computing systems and/or networks and all attempts at such interconnectivity shall be only through Company’s security gateways/firewalls. Provider will not access, and will not permit unauthorized persons or entities to access, Company computing systems and/or networks without Company’s express written authorization, and any such actual or attempted access shall be consistent with any such authorization.
AutoNDA by SimpleDocs
Access Protections. Customer will secure and protect the Services from unauthorized access, and Customer will use the Services in a manner consistent with Customer’s rights therein. Customer will take appropriate action to meet its obligations in this Agreement by instruction of or agreement with its employees, agents, subcontractors or others who are permitted access to the Services. Customer acknowledges and agrees that, as between Customer and Quantum, Customer shall be responsible for all acts and omissions of Authorized Users, including any act or omission by an Authorized User, which, if undertaken by Xxxxxxxx, would constitute a breach of this Agreement. Customer shall undertake reasonable efforts to make all Authorized Users aware of the provisions of this Agreement that are applicable their use of the XxxxX and shall cause them to comply with such provisions.
Access Protections. All interconnectivity by either party to the computing systems and/or networks of the other party, and all attempts at such interconnectivity, shall be only through the security gateways/firewalls of the other party and through other security systems, protocols or devices as agreed to by the parties. Neither party shall access, and will not permit unauthorized persons to access, the computing systems and/or networks of the other party without the other party's express written authorization, and any such actual or attempted access shall be consistent with any such authorization.
Access Protections. Licensee agrees to secure and protect the Software, Designated Systems and Documentation, and copies thereof, from unauthorized access and use in a manner consistent with Quantum’s rights therein, and to take appropriate action to meet its obligations in this XXXX by instruction of or agreement with its employees, agents, subcontractors or others who are permitted access to the Software, Documentation and Designated Systems. All derivative works, programs or copies developed by or for Licensee whether in compliance with, or in violation of, this XXXX, including translations, compilations, partial copies and up-dates, are owned by Quantum ab initio, or otherwise the proprietary rights thereto shall hereby be deemed automatically assigned to Quantum as of the moment of their creation.

Related to Access Protections

  • Fire Protection Contractor shall take adequate and reasonable precautions to protect the Work against damage by fire and smoke. For example, without limitation, Contractor shall do the following:

  • Whistleblower Protections and Trade Secrets Notwithstanding anything to the contrary contained herein, nothing in this Agreement prohibits Executive from reporting possible violations of federal law or regulation to any United States governmental agency or entity in accordance with the provisions of and rules promulgated under Section 21F of the Securities Exchange Act of 1934 or Section 806 of the Xxxxxxxx-Xxxxx Act of 2002, or any other whistleblower protection provisions of state or federal law or regulation (including the right to receive an award for information provided to any such government agencies). Furthermore, in accordance with 18 U.S.C. § 1833, notwithstanding anything to the contrary in this Agreement: (i) Executive shall not be in breach of this Agreement, and shall not be held criminally or civilly liable under any federal or state trade secret law (x) for the disclosure of a trade secret that is made in confidence to a federal, state, or local government official or to an attorney solely for the purpose of reporting or investigating a suspected violation of law, or (y) for the disclosure of a trade secret that is made in a complaint or other document filed in a lawsuit or other proceeding, if such filing is made under seal; and (ii) if Executive files a lawsuit for retaliation by the Company for reporting a suspected violation of law, Executive may disclose the trade secret to Executive’s attorney, and may use the trade secret information in the court proceeding, if Executive files any document containing the trade secret under seal, and does not disclose the trade secret, except pursuant to court order.

  • Data Protection All personal data contained in the agreement shall be processed in accordance with Regulation (EC) No 45/2001 of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data by the EU institutions and bodies and on the free movement of such data. Such data shall be processed solely in connection with the implementation and follow-up of the agreement by the sending institution, the National Agency and the European Commission, without prejudice to the possibility of passing the data to the bodies responsible for inspection and audit in accordance with EU legislation (Court of Auditors or European Antifraud Office (XXXX)). The participant may, on written request, gain access to his personal data and correct any information that is inaccurate or incomplete. He/she should address any questions regarding the processing of his/her personal data to the sending institution and/or the National Agency. The participant may lodge a complaint against the processing of his personal data with the [national supervising body for data protection] with regard to the use of these data by the sending institution, the National Agency, or to the European Data Protection Supervisor with regard to the use of the data by the European Commission.

  • Authorizations and Protections As agent for Company hereunder, Agent:

  • Privacy and Data Protection 8.1 The Receiving Party undertakes to comply with South Africa’s general privacy protection in terms Section 14 of the Xxxx of Rights in connection with this Bid and shall procure that its personnel shall observe the provisions of such Act [as applicable] or any amendments and re-enactments thereof and any regulations made pursuant thereto.

  • Whistleblower Protection Notwithstanding anything to the contrary contained herein, no provision of this Agreement shall be interpreted so as to impede the Employee (or any other individual) from reporting possible violations of federal law or regulation to any governmental agency or entity, including but not limited to the Department of Justice, the Securities and Exchange Commission, the Congress, and any agency Inspector General, or making other disclosures under the whistleblower provisions of federal law or regulation. The Employee does not need the prior authorization of the Company to make any such reports or disclosures and the Employee shall not be not required to notify the Company that such reports or disclosures have been made.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Further Protection The Pledgor will promptly give notice to the Secured Party of, and defend against, any suit, action, proceeding or lien that involves Posted Credit Support Transferred by the Pledgor or that could adversely affect the security interest and lien granted by it under Paragraph 2, unless that suit, action, proceeding or lien results from the exercise of the Secured Party’s rights under Paragraph 6(c).

  • Application of Takeover Protections The Company and the Board of Directors have taken all necessary action, if any, in order to render inapplicable any control share acquisition, business combination, poison pill (including any distribution under a rights agreement) or other similar anti-takeover provision under the Company’s certificate of incorporation (or similar charter documents) or the laws of its state of incorporation that is or could become applicable to the Purchasers as a result of the Purchasers and the Company fulfilling their obligations or exercising their rights under the Transaction Documents, including without limitation as a result of the Company’s issuance of the Securities and the Purchasers’ ownership of the Securities.

  • PATENT PROTECTION The vendor agrees to indemnify and defend the State of New Hampshire from alleged and actual patent infringements and further agrees to hold the State of New Hampshire harmless from any liability arising under RSA 382- A:2-312(3). (Uniform Commercial Code).

Time is Money Join Law Insider Premium to draft better contracts faster.