Application and Server Security Sample Clauses

Application and Server Security. Department and ESYS are required to jointly file and maintain a server entry in the Information Security OMNI database and the campus vulnerability scanner. Any substantial changes to the security environment must be approved by the Information Security office and documented in OMNI. Application is defined as vendor supplied or custom application software. Application software is designed to interact with the users of the system. The Department authorizes authenticated Qualys scans of their servers, and allows scans for all respective web and non-web applications housed in the Data Center.
AutoNDA by SimpleDocs

Related to Application and Server Security

  • Reservation and Listing The Company shall at all times reserve and keep available out of its authorized Shares, solely for the purpose of issuance upon exercise of the Purchase Warrants, such number of Shares or other securities, properties or rights as shall be issuable upon the exercise thereof. The Company covenants and agrees that, upon exercise of the Purchase Warrants and payment of the Exercise Price therefor, in accordance with the terms hereby, all Shares and other securities issuable upon such exercise shall be duly and validly issued, fully paid and non-assessable and not subject to preemptive rights of any shareholder. The Company further covenants and agrees that upon exercise of the Purchase Warrants and payment of the exercise price therefor, all Shares and other securities issuable upon such exercise shall be duly and validly issued, fully paid and non-assessable and not subject to preemptive rights of any shareholder. As long as the Purchase Warrants shall be outstanding, the Company shall use its commercially reasonable efforts to cause all Shares issuable upon exercise of the Purchase Warrants to be listed (subject to official notice of issuance) on all national securities exchanges (or, if applicable, on the OTC Bulletin Board or any successor trading market) on which the Shares issued to the public in the Offering may then be listed and/or quoted.

  • Application of Takeover Protections; Rights Agreement The Company and its board of directors have taken all necessary action, if any, in order to render inapplicable any control share acquisition, interested stockholder, business combination, poison pill (including, without limitation, any distribution under a rights agreement), stockholder rights plan or other similar anti-takeover provision under the Certificate of Incorporation, Bylaws or other organizational documents or the laws of the jurisdiction of its incorporation or otherwise which is or could become applicable to any Buyer as a result of the transactions contemplated by this Agreement, including, without limitation, the Company’s issuance of the Securities and any Buyer’s ownership of the Securities. The Company and its board of directors have taken all necessary action, if any, in order to render inapplicable any stockholder rights plan or similar arrangement relating to accumulations of beneficial ownership of shares of Common Stock or a change in control of the Company or any of its Subsidiaries.

  • Registration and Listing 15 Section 3.3

  • Issue Description Execution Registration and Exchange of Notes SECTION 2.1. DESIGNATION, AMOUNT AND ISSUE OF NOTES. The Notes shall be designated as "6 3/4% Convertible Subordinated Notes due 2009." Notes not to exceed the aggregate principal amount of $37,285,000 upon the execution of this Indenture, or (except pursuant to Sections 2.5, 2.6, 3.3, 15.2 and 16.2) from time to time thereafter, may be executed by the Company and delivered to the Trustee for authentication, and the Trustee shall thereupon authenticate and deliver said Notes upon the written order of the Company, signed by the Company's (a) President, Executive Vice President or any Vice President (whether or not designated by a word or words added after the title "Vice President") and (b) Treasurer or Assistant Treasurer or its Secretary or any Assistant Secretary, without any further action by the Company hereunder other than the provision to the Trustee of an Officer's Certificate and Opinion of Counsel.

  • New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.

  • Reservation and Listing of Securities (a) The Company shall maintain a reserve from its duly authorized shares of Common Stock for issuance pursuant to the Transaction Documents in such amount as may then be required to fulfill its obligations in full under the Transaction Documents. (b) If, on any date, the number of authorized but unissued (and otherwise unreserved) shares of Common Stock is less than the Required Minimum on such date, then the Board of Directors shall use commercially reasonable efforts to amend the Company’s certificate or articles of incorporation to increase the number of authorized but unissued shares of Common Stock to at least the Required Minimum at such time, as soon as possible and in any event not later than the 75th day after such date. (c) The Company shall, if applicable: (i) in the time and manner required by the principal Trading Market, prepare and file with such Trading Market an additional shares listing application covering a number of shares of Common Stock at least equal to the Required Minimum on the date of such application, (ii) take all steps necessary to cause such shares of Common Stock to be approved for listing or quotation on such Trading Market as soon as possible thereafter, (iii) provide to the Purchasers evidence of such listing or quotation and (iv) maintain the listing or quotation of such Common Stock on any date at least equal to the Required Minimum on such date on such Trading Market or another Trading Market.

  • Application of Takeover Protections; Rights Agreements The Company and the Board of Directors have taken all necessary action, if any, in order to render inapplicable any control share acquisition, business combination, poison pill (including any distribution under a rights agreement) or other similar anti-takeover provision under the Company’s charter documents or the laws of its state of incorporation that is or could reasonably be expected to become applicable to any of the Purchasers as a result of the Purchasers and the Company fulfilling their obligations or exercising their rights under the Transaction Documents, including, without limitation, the Company’s issuance of the Securities and the Purchasers’ ownership of the Securities.

  • Registration and Indorsement It will ensure that all financial assets (other than cash) credited to the Collateral Account are registered in the name of the Financial Institution, indorsed to the Financial Institution or in blank or credited to another securities account maintained in the name of the Financial Institution and that no financial asset credited to the Collateral Account is registered in the name of the Grantor, payable to the order of the Grantor or specially indorsed to the Grantor unless it has been indorsed to the Financial Institution or in blank.

  • Creation and Designation There is hereby created a tranche of Card Series Class A Notes to be issued pursuant to the Indenture, the Asset Pool 1 Supplement and the Indenture Supplement to be known as the “Card Series Class A(2019-2) Notes.”

  • Domain and Designation The Top-­‐Level Domain to which this Agreement applies is .sew (the “TLD”). Upon the Effective Date and until the earlier of the expiration of the Term (as defined in Section 4.1) or the termination of this Agreement pursuant to Article 4, ICANN designates Registry Operator as the registry operator for the TLD, subject to the requirements and necessary approvals for delegation of the TLD and entry into the root-­‐zone.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!