Attacks Sample Clauses

Attacks. A. Whenever an employee shall be rendered unable to perform regular duties by reason of an unprovoked attack while on duty, the Board shall pay such person's full salary up to but not exceeding one (1) year. For purposes of this Article, “while on duty” means arising in the course of employment, but does not include attacks by a third person intended to injure the employee because of reasons personal to the employee and not directed against the employee as an employee or because of the employment.
AutoNDA by SimpleDocs
Attacks. Dig 1, Set 2, Over When you see the attack developing, call it! Don't wait for the result - an attack is an at- tack, the result will come later. This will help you and your spotter best keep up with the flow of the game. Press result code "A" to indicate an attack. Follow the "ATTACK" call with a uniform number and then the result code for the attack. Possible attack result codes are: Dig: Press "D" to indicate a defensive "DIG". The ball is automatically switched to the de fensive team's side of the court. You can also press "S" set, "A" attack, or "O" overpass as the result code for an attack. All of these indicate a zero attack and switch the ball to the defensive team's side of the court. In each case, the attacker is credited with a zero attack. Kill: Press "K" to indicate a kill. Error: Press "E" to indicate an attack error. Block: Press "B" to indicate a block result. Then press "S" for a block solo, "A" for a block assist, or "E" for a blocking error. In each case you then enter the required uniform number(s). For a block solo/assist, an attack error is automatically credited to the at xxxxxx. For a blocking error, a kill is automatically credited to the attacker. Continue: Press "C" to indicate the ball was blocked back and the attacking team "CON- TINUE"s with play. The attacker is awarded with a zero attack.
Attacks. Example of a KILL: The spotter calls "DIG 5, ATTACK 7, KILL, ASSIST 12". The inputter presses:
Attacks. While We will take all reasonable steps to prevent and mitigate attacks, there may be attacks on Your Wallet or the VulaCoin Portal in spite of Us taking such steps, and in the event of such an attack there may be nothing that We can reasonably do to prevent its consequences. If We are able to confirm that Your Wallet has been compromised or is under attack, We may immediately halt the provision of the services, the functioning of VulaCoin, and any transactions involving Your Wallet. No technology is ever perfect and there is no way of Us preventing all cybersecurity attacks. Accordingly, No representation or warranty is made by Us regarding the safety or security of Your Wallet. We shall be liable for any lost value or stolen property, unless and only to the extent that wilful or gross negligence can be proven in the failure by Us to implement reasonable security measures.
Attacks. 13.1. While We will take all reasonable steps to prevent and mitigate attacks and breaches, there will sometimes be attacks on the Software or the Services in spite of Us taking such steps, and in the event of such an attack there may be nothing that We can reasonably do to prevent its consequences. With respect to the Software, if We are able to confirm that any funds or that Your Wallet or Account has been compromised or is under attack, We may immediately halt the provision of the Services, the functioning of the Software, and any transactions involving Your Wallet or Account. In the event of such an attack, We shall do Our best to do what a reasonable person in Our place would have done, considering the circumstances and what is commercially viable and reasonable. 13.2. No technology or software is ever perfect or error free, as a result there is no way of Us preventing all cybersecurity attacks. Accordingly, We make no representation and do not warrant or guarantee the safety or security of the Software or the Services and are not liable for any lost value or stolen property, unless and only to the extent that We wilfully or grossly negligently failed to implement reasonably security measures.
Attacks. 15.1 While We will take all reasonable steps to prevent and mitigate attacks, there will sometimes be attacks on the Software or the Services in spite of Us taking such steps, and in the event of such an attack there may be nothing that We can reasonably do to prevent its consequences. With respect to the Software, if we are able to confirm that any funds or that Your Wallet has been compromised or is under attack, we may immediately halt the provision of the Services, the functioning of the Software, and any transactions involving Your Wallet. In the event of such an attack, we shall do Our best to do what a reasonable person in Our place would have done, considering the circumstances and what is commercially viable and reasonable. 15.2 No technology is ever perfect and there is no way of Us preventing all cybersecurity attacks. Accordingly, we make no representation and do not warrant the safety or security of the Software or the Services and are not liable for any lost value or stolen property, unless and only to the extent that We wilfully or grossly negligently failed to implement reasonably security measures.
Attacks. All of the AWS APIs are available via SSL- protected endpoints which provide server authentication. Amazon Elastic Compute Cloud (EC2) Amazon Machine Images (AMIs) automatically generate new Secure Shell (SSH) host certificates on first boot and log them to the instance’s console.
AutoNDA by SimpleDocs
Attacks. Critical Describe how you intend to secure the service or product, and any other aspects of your, and your supply chain network, on which the service or product depends, against Denial of Service and Distributed Denial of Service attacks.
Attacks. Customer is prohibited from interfering or attempting to interfere with service to any other user, host, or network on the Internet ("denial of service attacks"). Examples of such prohibited activity include without limitation (a) sending massive quantities of data with the intent of filling circuits, overloading systems, and/or crashing hosts, (b) attempting to attack or disable any user, host, or site, or (c) using, distributing, or propagating any type of program, script, or command designed to interfere with the use, functionality, or connectivity of any Internet user, host, system, or site (for example, by propagating messages, via e-mail, Usenet posting, or otherwise, that contain computer worms, viruses, control characters or trojan horses).
Attacks. Customer is prohibited from interfering or attempting to interfere with service to any other user, host, or network on the Internet ("denial of service attacks"). Examples of such prohibited activity include without limitation (a) sending massive quantities of data with the intent of filling circuits, overloading systems, and/or crashing hosts, (b) attempting to attack or disable any user, host, or site, or (c) using, distributing, or propagating any type of program, script, or command designed to interfere with the use, functionality, or connectivity of any Internet user, host, system, or site (for example, by propagating messages, via e-mail, Usenet posting, or otherwise, that contain computer worms, viruses, control characters or trojan horses). FOR Xxxxx://XxxxxxxxxXx.xxxxxxxxx.xxx One project is to organize registered voters who are not cancelled and the other project is to maintain the registered voters and their applicable voter status. Both projects contain the following indexed metadata for searching and retrieving. 1) VUID 2) Last Name 3) First Name
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!