Common use of Acknowledgement of Responsibilities Clause in Contracts

Acknowledgement of Responsibilities. I acknowledge receiving instructions and shared secrets necessary to generate my public and private keys and download my certificates and will comply with the following obligations:  I will not disclose the instructions or shared secrets (any information created as part of the registration process) to anyone or leave them where they might be observed.  I will keep a copy of this Subscriber Agreement in my personal records.  I will use my certificates and private keys only for official purposes.  I will be the sole possessor of my private keys,  I will not back up my private keys,  I will create or store my private keys only onto approved devices and applications.  I will comply with the supplied guidelines for selecting a strong password, o At least eight characters; o At least one numeric character; o At least one uppercase character; o At least one lowercase character; o At least one special character; and o No repetition of the previous 12 passwords.  I will not disclose my password or PIN to anyone or leave it where it might be observed,  If I record the password or PIN protecting my private keys, I will protect the written password or PIN from disclosure by sealing it in an envelope and storing it in a locked cabinet or desk, and store the password or PIN separately from the token containing my private keys.  I will take all reasonable measures to prevent the loss, disclosure, modification or unauthorized use of any issued tokens.  I will promptly notify my local Trusted Agent or the GPO Registration Authority of any known or suspected private key, certificate, token, or password compromise.  I will promptly notify my local Trusted Agent or the GPO Registration Authority, if information in my certificate changes (name, e-mail address, organization).  I will promptly notify my local Trusted Agent or the GPO Registration Authority, and surrender any smartcards or tokens, if I leave the organization for which the certificate was issued.  I acknowledge that, when the GPO issues me the information permitting me to generate a certificate, the GPO will keep a copy of my private key corresponding to the public key of my encryption certificate, and the GPO will not disclose this key except with my consent, or where required by law.  I acknowledge that I am responsible for all use of the GPO certificates bearing my name or identification.  I acknowledge that I may ask for my certificate to be revoked at any time.  (For Sponsors, representing devices that have been issued tokens) I will inform my local Trusted Authority or the GPO Registration Authority if responsibility for the device that has been issued a certificate/token is changed.

Appears in 3 contracts

Samples: www.gpo.gov, www.gpo.gov, www.gpo.gov

AutoNDA by SimpleDocs

Acknowledgement of Responsibilities. I acknowledge receiving instructions and shared secrets necessary to generate my public and private keys and download my recovered user’s certificates and will comply with the following obligations:  I will not disclose the instructions or shared secrets (any information created as part of the registration process) to anyone or leave them where they might be observed.  I will keep a copy of this Subscriber Public Key Infrastructure Third-Party Requestor Recovery Agreement in my personal records.  I will use my recovered user certificates and private keys only for official purposes.  I will be the sole possessor of my recovered user’s private keys,  I will not back up my recovered user’s private keys,  I will create or store my recovered user private keys only onto approved devices and applications.  I will comply with the supplied guidelines for selecting a strong password, o At least eight characters; o At least one numeric character; o At least one uppercase character; o At least one lowercase character; o At least one special character; and o No repetition of the previous 12 passwords.  I will not disclose my recovered user password or PIN to anyone or leave it where it might be observed,  If I record the password or PIN protecting my recovered user private keys, I will protect the written password or PIN from disclosure by sealing it in an envelope and storing it in a locked cabinet or desk, and store the password or PIN separately from the token containing my recovered user private keys.  I will take all reasonable measures to prevent the loss, disclosure, modification or unauthorized use of any issued tokens.  I will promptly notify my local Trusted Agent or the GPO Registration Authority of any known or suspected private key, certificate, token, or password compromise.  I will promptly notify my local Trusted Agent or the GPO Registration Authority, if information in my certificate changes (name, e-mail address, organization).  I will promptly notify my local Trusted Agent or the GPO Registration Authority, and surrender any smartcards or tokens, if I leave the organization for which the certificate was issued.  I acknowledge that, when the GPO issues me the information permitting me to generate a certificate, the GPO will keep a copy of my private key corresponding to the public key of my encryption certificate, and the GPO will not disclose this key except with my consent, or where required by law.  I acknowledge that I am responsible for all use of the GPO certificates bearing my the recovered user’s name or identification.  I acknowledge that I may ask for my the recovered certificate to be revoked at any time.  (For Sponsors, representing devices that have been issued tokens) I will inform my local Trusted Authority or the GPO Registration Authority if responsibility for the device that has been issued a certificate/token is changed.  Requestors shall protect Subscribers’ recovered key(s) from compromise. Requestors shall use a combination of computer security, cryptographic, network security, physical security, personnel security, and procedural security controls to protect their keys and recovered Subscribers’ keys.  Third-party Requestors shall destroy Subscribers’ keys when no longer required (i.e., when the data has been recovered).  Requestors shall request and use the Subscriber’s escrowed key(s) only to recover Subscriber’s data they are authorized to access.  Requestors shall accurately represent themselves to all entities during any key recovery service.  When the request is made to the KRA, the Requestor shall provide accurate identification and authentication information at least to the same level required for issuing new PKI certificates at the level of the key being requested (e.g. the Requestor sends a digitally signed request using the credential issued by the Entity PKI at the same or higher assurance level as the key being recovered).  The Third-Party Requestor shall protect information concerning each key recovery operation.  The Third-Party Requestor shall communicate information concerning the recovery to the Subscriber when appropriate as determined by the reason for the recovery. The decision to notify the Subscriber shall be based on the law and the Issuing Organization’s policies and procedures for third party information access.  In the event that the Third-Party Requestor notifies the Subscriber of a key recovery, the Requestor shall consult with the Subscriber to determine whether or not the recovery circumstances warrant revoking the associated public key certificate.  As a condition of receiving a recovered key, a Requestor shall sign an acknowledgement of agreement to follow the law and the Issuing Organization’s policies relating to protection and release of the recovered key.

Appears in 1 contract

Samples: www.gpo.gov

Acknowledgement of Responsibilities. I acknowledge receiving instructions and shared secrets necessary to generate my public and private keys and download my recovered user’s certificates and will comply with the following obligations: I will not disclose the instructions or shared secrets (any information created as part of the registration process) to anyone or leave them where they might be observed. I will keep a copy of this Subscriber Public Key Infrastructure Third-Party Requestor Recovery Agreement in my personal records. I will use my recovered user certificates and private keys only for official purposes. I will be the sole possessor of my recovered user’s private keys, I will not back up my recovered user’s private keys, I will create or store my recovered user private keys only onto approved devices and applications. I will comply with the supplied guidelines for selecting a strong password, o At least eight characters; o At least one numeric character; o At least one uppercase character; o At least one lowercase character; o At least one special character; and o No repetition of the previous 12 passwords. I will not disclose my recovered user password or PIN to anyone or leave it where it might be observed, If I record the password or PIN protecting my recovered user private keys, I will protect the written password or PIN from disclosure by sealing it in an envelope and storing it in a locked cabinet or desk, and store the password or PIN separately from the token containing my recovered user private keys. I will take all reasonable measures to prevent the loss, disclosure, modification or unauthorized use of any issued tokens. I will promptly notify my local Trusted Agent or the GPO Registration Authority of any known or suspected private key, certificate, token, or password compromise. I will promptly notify my local Trusted Agent or the GPO Registration Authority, if information in my certificate changes (name, e-mail address, organization). I will promptly notify my local Trusted Agent or the GPO Registration Authority, and surrender any smartcards or tokens, if I leave the organization for which the certificate was issued.  I acknowledge that, when the GPO issues me the information permitting me to generate a certificate, the GPO will keep a copy of my private key corresponding to the public key of my encryption certificate, and the GPO will not disclose this key except with my consent, or where required by law.  I acknowledge that I am responsible for all use of the GPO certificates bearing my the recovered user’s name or identification. I acknowledge that I may ask for my the recovered certificate to be revoked at any time. (For Sponsors, representing devices that have been issued tokens) I will inform my local Trusted Authority or the GPO Registration Authority if responsibility for the device that has been issued a certificate/token is changed. • Requestors shall protect Subscribers’ recovered key(s) from compromise. Requestors shall use a combination of computer security, cryptographic, network security, physical security, personnel security, and procedural security controls to protect their keys and recovered Subscribers’ keys. • Third-party Requestors shall destroy Subscribers’ keys when no longer required (i.e., when the data has been recovered). • Requestors shall request and use the Subscriber’s escrowed key(s) only to recover Subscriber’s data they are authorized to access. • Requestors shall accurately represent themselves to all entities during any key recovery service. • When the request is made to the KRA, the Requestor shall provide accurate identification and authentication information at least to the same level required for issuing new PKI certificates at the level of the key being requested (e.g. the Requestor sends a digitally signed request using the credential issued by the Entity PKI at the same or higher assurance level as the key being recovered). • The Third-Party Requestor shall protect information concerning each key recovery operation. • The Third-Party Requestor shall communicate information concerning the recovery to the Subscriber when appropriate as determined by the reason for the recovery. The decision to notify the Subscriber shall be based on the law and the Issuing Organization’s policies and procedures for third party information access. • In the event that the Third-Party Requestor notifies the Subscriber of a key recovery, the Requestor shall consult with the Subscriber to determine whether or not the recovery circumstances warrant revoking the associated public key certificate. • As a condition of receiving a recovered key, a Requestor shall sign an acknowledgement of agreement to follow the law and the Issuing Organization’s policies relating to protection and release of the recovered key.

Appears in 1 contract

Samples: www.gpo.gov

AutoNDA by SimpleDocs

Acknowledgement of Responsibilities. I acknowledge receiving instructions and shared secrets necessary to generate my public and private keys and download my certificates and will comply with the following obligations: I will not disclose the instructions or shared secrets (any information created as part of the registration process) to anyone or leave them where they might be observed. I will keep a copy of this Subscriber Agreement in my personal records. I will use my certificates and private keys only for official purposes. I will be the sole possessor of my private keys, I will not back up my private keys, I will create or store my private keys only onto approved devices and applications. I will comply with the supplied guidelines for selecting a strong password, o At least eight characters; o At least one numeric character; o At least one uppercase character; o At least one lowercase character; o At least one special character; and o No repetition of the previous 12 passwords. I will not disclose my password or PIN to anyone or leave it where it might be observed, If I record the password or PIN protecting my private keys, I will protect the written password or PIN from disclosure by sealing it in an envelope and storing it in a locked cabinet or desk, and store the password or PIN separately from the token containing my private keys. I will take all reasonable measures to prevent the loss, disclosure, modification or unauthorized use of any issued tokens. I will promptly notify my local Trusted Agent or the GPO Registration Authority of any known or suspected private key, certificate, token, or password compromise. I will promptly notify my local Trusted Agent or the GPO Registration Authority, if information in my certificate changes (name, e-mail address, organization). I will promptly notify my local Trusted Agent or the GPO Registration Authority, and surrender any smartcards or tokens, if I leave the organization for which the certificate was issued. I acknowledge that, when the GPO issues me the information permitting me to generate a certificate, the GPO will keep a copy of my private key corresponding to the public key of my encryption certificate, and the GPO will not disclose this key except with my consent, or where required by law. I acknowledge that I am responsible for all use of the GPO certificates bearing my name or identification. I acknowledge that I may ask for my certificate to be revoked at any time. (For Sponsors, representing devices that have been issued tokens) I will inform my local Trusted Authority or the GPO Registration Authority if responsibility for the device that has been issued a certificate/token is changed.

Appears in 1 contract

Samples: www.gpo.gov

Time is Money Join Law Insider Premium to draft better contracts faster.