Cloud Access Security Broker Sample Clauses

Cloud Access Security Broker. (CASB): The CASB service uses the USS infrastructure, notably two databases - LogDB and CoreDB - for log data and policy/rule/configuration data respectively - described in clause 2 of this Module B.
AutoNDA by SimpleDocs

Related to Cloud Access Security Broker

  • Registration Data Directory Services Until ICANN requires a different protocol, Registry Operator will operate a WHOIS service available via port 43 in accordance with XXX 0000, and a web-­‐based Directory Service at <whois.nic.TLD> providing free public query-­‐based access to at least the following elements in the following format. ICANN reserves the right to specify alternative formats and protocols, and upon such specification, the Registry Operator will implement such alternative specification as soon as reasonably practicable. Registry Operator shall implement a new standard supporting access to domain name registration data (SAC 051) no later than one hundred thirty-­‐five (135) days after it is requested by ICANN if: 1) the IETF produces a standard (i.e., it is published, at least, as a Proposed Standard RFC as specified in RFC 2026); and 2) its implementation is commercially reasonable in the context of the overall operation of the registry.

  • Online Banking Services We may provide Online Banking Services to you during the Term from time to time as described in this Agreement. You understand and agree that we may, and you authorize us to, provide Online Banking Services through one or more third party vendors. This Agreement does not apply to services provided under separate agreements with third party vendors that do not specifically reference this Agreement or that are not specifically referenced in this Agreement. Please refer to the online help and instructions on how to use our Online Banking Services. Such instructions are part of this Agreement. Please note that during your use of Online Banking Services, we may provide you with additional requirements and limitations regarding the use of Online Banking Services through the system by which we may provide Online Banking Services. You agree to be bound by any and all such additional requirements and limitations. You also agree to be bound by any and all of our published policies and procedures, whether published on the Web Site, through the Online Banking Services, or otherwise. Any and all such policies and procedures shall be a part of this Agreement.

  • Indemnification and Assumption of Risk – Vendor Data VENDOR AGREES THAT IT IS VOLUNTARILY PROVIDING DATA (INCLUDING BUT NOT LIMITED TO: VENDOR INFORMATION, VENDOR DOCUMENTATION, VENDOR’S PROPOSALS, VENDOR PRICING SUBMITTED OR PROVIDED TO TIPS, TIPS CONTRACT DOCUMENTS, TIPS CORRESPONDENCE, VENDOR LOGOS AND IMAGES, VENDOR’S CONTACT INFORMATION, VENDOR’S BROCHURES AND COMMERCIAL INFORMATION, VENDOR’S FINANCIAL INFORMATION, VENDOR’S CERTIFICATIONS, AND ANY OTHER VENDOR INFORMATION OR DOCUMENTATION, INCLUDING WITHOUT LIMITATION SOFTWARE AND SOURCE CODE UTILIZED BY VENDOR, SUBMITTED TO TIPS BY VENDOR AND ITS AGENTS) (“VENDOR DATA”) TO TIPS. FOR THE SAKE OF CLARITY, AND WITHOUT LIMITING THE BREADTH OF THE INDEMNITY OBLIGATIONS IN SECTION 14 ABOVE, VENDOR AGREES TO PROTECT, INDEMNIFY, AND HOLD THE TIPS INDEMNITEES HARMLESS FROM AND AGAINST ANY AND ALL LOSSES, CLAIMS, ACTIONS, DEMANDS, ALLEGATIONS, SUITS, JUDGMENTS, COSTS, EXPENSES, FEES, INCLUDING COURT COSTS, ATTORNEY’S FEES, AND EXPERT FEES AND ALL OTHER LIABILITY OF ANY NATURE WHATSOEVER ARISING OUT OF OR RELATING TO: (I) ANY UNAUTHORIZED, NEGLIGENT OR WRONGFUL USE OF, OR CYBER DATA BREACH INCIDENT AND VIRUSES OR OTHER CORRUPTING AGENTS INVOLVING, VENDOR’S DATA, PRICING, AND INFORMATION, COMPUTERS, OR OTHER HARDWARE OR SOFTWARE SYSTEMS, AND; (II) ALLEGATIONS OR CLAIMS THAT ANY VENDOR DATA INFRINGES ON THE INTELLECTUAL PROPERTY RIGHTS OF A THIRD-PARTY OR VENDOR.

  • Project Manager, County The County shall appoint a Project Manager to act as liaison between the County and the Subrecipient during the term of this Contract. The County’s Project Manager shall coordinate the activities of the County staff assigned to work with the Subrecipient. The County’s Project Manager, in consultation and agreement with the County, shall have the right to require the removal and replacement of the Subrecipient’s Project Manager and key personnel. The County’s Project Manager shall notify the Subrecipient in writing of such action. The Subrecipient shall accomplish the removal within three (3) business days after written notice from the County’s Project Manager. The County is not required to provide any additional information, reason or rationale in the event it requires the removal of Subrecipient’s Project Manager from providing further services under the Contract.

  • Verizon OSS Services Access to Verizon Operations Support Systems functions. The term “Verizon OSS Services” includes, but is not limited to: (a) Verizon’s provision of PNG Usage Information to PNG pursuant to Section 8.3 of this Attachment; and, (b) “Verizon OSS Information”, as defined in Section 8.1.4 of this Attachment.

  • Beta Services From time to time, We may invite You to try Beta Services at no charge. You may accept or decline any such trial in Your sole discretion. Beta Services will be clearly designated as beta, pilot, limited release, developer preview, non-production, evaluation or by a description of similar import. Beta Services are for evaluation purposes and not for production use, are not considered “Services” under this Agreement, are not supported, and may be subject to additional terms. Unless otherwise stated, any Beta Services trial period will expire upon the earlier of one year from the trial start date or the date that a version of the Beta Services becomes generally available. We may discontinue Beta Services at any time in Our sole discretion and may never make them generally available. We will have no liability for any harm or damage arising out of or in connection with a Beta Service.

  • Operator’s Security Contact Information Xxxxxxx X. Xxxxxxx Named Security Contact xxxxxxxx@xxxxxxxxx.xxx Email of Security Contact (000) 000-0000 Phone Number of Security Contact

  • Data Processing Agreement The Data Processing Agreement, including the Approved Data Transfer Mechanisms (as defined in the Data Processing Agreement) that apply to your use of the Services and transfer of Personal Data, is incorporated into this Agreement by this reference. Each party will comply with the terms of the Data Processing Agreement and will train its employees on DP Law.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!