Add Domain Sample Clauses

Add Domain. ‌ To add a domain to an account enter the domain name. It is recommended only to add the main domain and no sub domains as certificates for sub domains can be created if the main domain belongs to the account. If you like to add a Punycode domain you need to have the code signing ability which can be obtained if your identity is proven.
AutoNDA by SimpleDocs

Related to Add Domain

  • Personal Data Breaches 5.7.1 The Data Processor shall give immediate notice to the Data Controller if a breach occurs, that can lead to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of or access to, personal data transmitted, stored or otherwise processed re the Personal Data processed on behalf of the Data Controller (a “Personal Data Breach”). 5.7.2 The Data Processor shall make reasonable efforts to identify the cause of such a breach and take those steps as they deem necessary to establish the cause, and to prevent such a breach from reoccurring.

  • Personal Data Breach 7.1 Processor shall notify Company without undue delay upon Processor becoming aware of a Personal Data Breach affecting Company Personal Data, providing Company with sufficient information to allow the Company to meet any obligations to report or inform Data Subjects of the Personal Data Breach under the Data Protection Laws. 7.2 Processor shall co-operate with the Company and take reasonable commercial steps as are directed by Company to assist in the investigation, mitigation and remediation of each such Personal Data Breach.

  • Anti-Piracy In order to prevent theft, piracy, unauthorized retransmissions, redistribution or exhibition, copying or duplication of any Channel, in whole or in part, (hereinafter collectively referred to as “Piracy”), the IPTV Operator shall, prior to the commencement of the Term of the agreement and at all times during such Term, employ, maintain, and enforce fully effective conditional access system delivery and content protection and security systems, and related physical security and operational procedures (hereinafter collectively referred to as the “Security Systems”) as may be specified (security specifications), in a non-discriminatory manner in writing, from time to time, by ZEEL. The IPTV Operator shall comply with the Anti-Piracy Requirements set out in Clause VI and VII in ANNEXURE XII and also provide full and complete information for conducting Technical Audit by the auditors, empaneled by the Authority for conducting such audit, by furnishing details outlined in Clause I, II, III, IV and V of ANNEXURE XII attached herewith. The IPTV Operator shall deploy finger printing mechanisms to detect any piracy, violation of copyright and unauthorized viewing of the Channels, distributed / transmitted through its Platform at least every 10 minutes on 24 x 7 x 365(6) basis. The IPTV Operator shall not authorize, cause or suffer any portion of any of the Zee Group Channels to be recorded, duplicated, cablecast, exhibited or otherwise used for any purpose other than for distribution by the IPTV Operator at the time these Channels are made available. If the IPTV Operator becomes aware that any unauthorized third party is recording, duplicating, cablecasting, exhibiting or otherwise using any or all of the Zee Group Channels for any other purpose, the IPTV Operator shall within ten minutes of so becoming aware of such recording, duplicating, cablecasting, exhibiting or otherwise using any or all of the Zee Group Channels for any other purpose, notify ZEEL and the IPTV Operator shall also switch off the concerned Set Top Box to prevent such unauthorized use. However, use of a Set Top Box with Personal Video Recorder/ Digital Video Recorder facility which has been supplied by the IPTV Operator shall not be treated as unauthorized use, as long as such Set Top Box is used in accordance with the terms and conditions of the subscription agreement between the IPTV Operator and the subscriber. The IPTV Operator shall comply with the specifications for Set Top Box, Conditional Access System and Subscriber Management System as set out in ANNEXURE X attached herewith. If so instructed by Information (as defined below) by ZEEL, the IPTV Operator shall shut off or de-authorize the transmission to any unauthorized subscriber/ subscriber indulging in piracy, within ten minutes from the time it receives such instruction from ZEEL. Any communication under this Clause shall be considered as valid Information only if (i) the information is sent through e-mail in a format as mutually agreed by the parties and (ii) the information is sent by a person(s) who is designated to send such information. However, the “information” may even be provided by ZEEL representatives through other means of communications such as telephonic message, fax etc. and the said “information” shall later be confirmed by ZEEL through e-mail and the IPTV Operator shall be under obligation to act upon such information.

  • Personal Data Breach Notification SAP will notify Customer without undue delay after becoming aware of any Personal Data Breach and provide reasonable information in its possession to assist Customer to meet Customer’s obligations to report a Personal Data Breach as required under Data Protection Law. SAP may provide such information in phases as it becomes available. Such notification shall not be interpreted or construed as an admission of fault or liability by SAP.

  • Data Disclosing an Invention If the Parties exchange Data disclosing an invention for which patent protection is being considered, and the furnishing Party identifies the Data as such when providing it to the Receiving Party, the Receiving Party shall withhold it from public disclosure for a reasonable time (one (1) year unless otherwise agreed or the Data is restricted for a longer period herein).

  • Protection of Customer Data The Supplier shall not delete or remove any proprietary notices contained within or relating to the Customer Data. The Supplier shall not store, copy, disclose, or use the Customer Data except as necessary for the performance by the Supplier of its obligations under this Call Off Contract or as otherwise Approved by the Customer. To the extent that the Customer Data is held and/or Processed by the Supplier, the Supplier shall supply that Customer Data to the Customer as requested by the Customer and in the format (if any) specified by the Customer in the Call Off Order Form and, in any event, as specified by the Customer from time to time in writing. The Supplier shall take responsibility for preserving the integrity of Customer Data and preventing the corruption or loss of Customer Data. The Supplier shall perform secure back-ups of all Customer Data and shall ensure that up-to-date back-ups are stored off-site at an Approved location in accordance with any BCDR Plan or otherwise. The Supplier shall ensure that such back-ups are available to the Customer (or to such other person as the Customer may direct) at all times upon request and are delivered to the Customer at no less than six (6) Monthly intervals (or such other intervals as may be agreed in writing between the Parties). The Supplier shall ensure that any system on which the Supplier holds any Customer Data, including back-up data, is a secure system that complies with the Security Policy and the Security Management Plan (if any). If at any time the Supplier suspects or has reason to believe that the Customer Data is corrupted, lost or sufficiently degraded in any way for any reason, then the Supplier shall notify the Customer immediately and inform the Customer of the remedial action the Supplier proposes to take. If the Customer Data is corrupted, lost or sufficiently degraded as a result of a Default so as to be unusable, the Supplier may: require the Supplier (at the Supplier's expense) to restore or procure the restoration of Customer Data to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer, and the Supplier shall do so as soon as practicable but not later than five (5) Working Days from the date of receipt of the Customer’s notice; and/or itself restore or procure the restoration of Customer Data, and shall be repaid by the Supplier any reasonable expenses incurred in doing so to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer.

  • Return or Destruction of Confidential Information If an Interconnection Party provides any Confidential Information to another Interconnection Party in the course of an audit or inspection, the providing Interconnection Party may request the other party to return or destroy such Confidential Information after the termination of the audit period and the resolution of all matters relating to that audit. Each Interconnection Party shall make Reasonable Efforts to comply with any such requests for return or destruction within ten days of receiving the request and shall certify in writing to the other Interconnection Party that it has complied with such request.

  • CONFIDENTIAL/TRADE SECRET MATERIALS a. Contractor Confidential, trade secret or proprietary materials as defined by the laws of the State of New York must be clearly marked and identified as such upon submission by the Bidder. Marking the Bid as “confidential” or “proprietary” on its face or in the document header or footer shall not be considered by the Commissioner or Authorized User to be sufficient without specific justification as to why disclosure of particular information in the Bid would cause substantial injury to the competitive position of the Bidder. Bidders/Contractors intending to seek an exemption from disclosure of these materials under the Freedom of Information Law must request the exemption in writing, setting forth the reasons for the claimed exemption. Acceptance of the claimed materials does not constitute a determination on the exemption request, which determination will be made in accordance with statutory procedures. Properly identified information that has been designated confidential, trade secret, or proprietary by the Bidder will not be disclosed except as may be required by the Freedom of Information Law or other applicable State and federal laws.

  • Notification of personal data breach 1. In case of any personal data breach, the data processor shall, without undue delay after having become aware of it, notify the data controller of the personal data breach. 2. The data processor’s notification to the data controller shall, if possible, take place within 24 hours after the data processor has become aware of the personal data breach to enable the data controller to comply with the data controller’s obligation to notify the personal data breach to the competent supervisory authority, cf. Article 33

  • Domain Name Data 1.5.1 Query format: whois EXAMPLE.TLD 1.5.2 Response format:

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!