Application of Protective Measures Sample Clauses

Application of Protective Measures. 1.22.1 Supplier shall apply Protective Measures aimed at preventing accidental or unlawful destruction, loss, alteration or unauthorized disclosure or access to Buyer Personal Data and Service Personal Data as set forth in the security document to be included in Annex 1 of Schedule 7 (GDPR Information) or as otherwise referenced or included within the Call-Off Contract.
AutoNDA by SimpleDocs

Related to Application of Protective Measures

  • Interim Measures of Protection A Tribunal may order an interim measure of protection to preserve the rights of a disputing party, or to facilitate the conduct of arbitral proceedings, including an order to preserve evidence in the possession or control of a disputing party. A Tribunal may not order attachment or enjoin the application of the measure alleged to constitute a breach referred to in paragraph 1 of Article 76.

  • Protective Measures We have implemented and will maintain appropriate technical and organisational measures in relation to the Services taking into account the state of the art, the costs of implementation, and the nature, scope, context and purposes of Processing, as well as the likelihood and severity of risk to the rights and freedoms of data subjects. This includes measures relating to the physical security of Our facilities used to deliver them, measures to control access rights to Our assets and relevant networks, and processes for testing these measures. In accordance with Our obligations under applicable law, We may undertake digital forensic investigations in relation to the use of the Services and Subscriptions. You are responsible for using, and ensuring that your Users use, the controls and advice provided by the Services correctly and consistently.

  • Corrective Measures If the Participating Generator fails to meet or maintain the requirements set forth in this Agreement and/or the CAISO Tariff, the CAISO shall be permitted to take any of the measures, contained or referenced in the CAISO Tariff, which the CAISO deems to be necessary to correct the situation.

  • Rights Protection Mechanisms and Abuse Mitigation ­‐ Registry Operator commits to implementing and performing the following protections for the TLD:

  • CORRECTIVE MEASURE The contractor shall repair any deficiencies in excess of the performance guideline.

  • Environmental Protection Measures 5.1.1 All private storm water facilities shall be maintained in good order in order to maintain full storage capacity by the owner of the lot on which they are situated.

  • Protective Protocols Either Party may use protective network traffic management controls such as 7-digit and 10-digit code gaps on traffic toward each other’s network, when required to protect the public switched network from congestion due to facility failures, switch congestion or failure or focused overload. CLEC and Sprint will immediately notify each other of any protective control action planned or executed.

  • Application of other Rules If the provisions of law of either Contracting Party or obligations under international law existing at present or established hereafter between the Contracting Parties in addition to the present Agreement contain rules, whether general or specific, entitling investments by investors of the other Contracting Party to a treatment more favourable than is provided for by the present Agreement, such rules shall to the extent that they are more favourable prevail over the present Agreement.

  • Freedom of Information and Protection of Privacy Act ‌ The Supplier acknowledges that the City is subject to the Freedom of Information and Protection of Privacy Act (British Columbia), which imposes significant obligations on the City’s contractors to protect all personal information acquired from the City in the course of providing any service to the City.

  • Rights Protection Mechanisms Registry Operator shall implement and adhere to the rights protection mechanisms (“RPMs”) specified in this Specification. In addition to such RPMs, Registry Operator may develop and implement additional RPMs that discourage or prevent registration of domain names that violate or abuse another party’s legal rights. Registry Operator will include all RPMs required by this Specification 7 and any additional RPMs developed and implemented by Registry Operator in the registry-­‐registrar agreement entered into by ICANN-­‐accredited registrars authorized to register names in the TLD. Registry Operator shall implement in accordance with requirements set forth therein each of the mandatory RPMs set forth in the Trademark Clearinghouse as of the date hereof, as posted at xxxx://xxx.xxxxx.xxx/en/resources/registries/tmch-­‐requirements (the “Trademark Clearinghouse Requirements”), which may be revised in immaterial respects by ICANN from time to time. Registry Operator shall not mandate that any owner of applicable intellectual property rights use any other trademark information aggregation, notification, or validation service in addition to or instead of the ICANN-­‐

Time is Money Join Law Insider Premium to draft better contracts faster.