Code Security Sample Clauses

Code Security. 8.2.1. All production code is digitally signed, using trusted third-party Public Key Infrastructure (PKI) services.
AutoNDA by SimpleDocs
Code Security. The UW Covered Component does not use or disclose the code or other means of record identification for any other purpose, and does not disclose the mechanism for re‐identification.
Code Security. The password or access code ("access code") that you select is for your security purposes. The access code is confidential and should not be disclosed to third parties or recorded. You are responsible for safekeeping your access code. You agree not to disclose or otherwise make your access code available to anyone not authorized to sign on your accounts. If you authorize anyone to use your access code, that authority shall continue until you specifically revoke such authority by changing your password and/or notifying the Credit Union. If you fail to maintain the security of these access codes and the Credit Union suffers a loss, we may terminate your Home Banking and account services immediately. You will be required to change the password assigned upon first access. If you want to discontinue access to these products, please notify the Credit Union at 000-000-0000 or 000-000-0000.
Code Security. Customer shall take appropriate steps to protect the use of such Customer Identification Code(s), and Vendor will provide all assistance reasonably required, including but not limited to changing such Customer Identification Code(s), at the written request of Customer. Customer shall be liable for all charges incurred under any additional Customer Identification Code(s) established by Vendor in accordance with this section. Customer shall notify Vendor of any authorized use of Customer Identification Code. Vendor shall not be responsible for any unauthorized access to, or alteration of, transmissions or data sent or received, regardless of whether data is actually received by Customer.

Related to Code Security

  • Site Security While providing services at a DSHS location, the Contractor, its agents, employees, or Subcontractors shall conform in all respects with physical, fire, or other security regulations specific to the DSHS location.

  • JOB SECURITY 23.01 Subject to the willingness and capacity of individual employees to accept relocation and retraining, the Employer will make every reasonable effort to ensure that any reduction in the work force will be accomplished through attrition.

  • Code Section 409A To the extent applicable, it is intended that this Agreement and any payment made hereunder shall comply with the requirements of Section 409A of the Code, or an exemption or exclusion therefrom and any related regulations or other guidance promulgated with respect to such Section by the U.S. Department of the Treasury or the Internal Revenue Service (“Code Section 409A”), provided that for the avoidance of doubt, this provision shall not be construed to require a gross-up payment in respect of any taxes, interest or penalties imposed on the Employee as a result of Code Section 409A. Any provision that would cause the Agreement or any payment hereof to fail to satisfy Code Section 409A shall have no force or effect until amended in the least restrictive manner necessary to comply with Code Section 409A, which amendment may be retroactive to the extent permitted by Code Section 409A. Each payment under this Agreement shall be treated as a separate payment for purposes of Code Section 409A. In no event may the Employee, directly or indirectly, designate the calendar year of any payment to be made under this Agreement. All reimbursements and in-kind benefits provided under this Agreement shall be made or provided in accordance with the requirements of Code Section 409A, including, without limitation, that (i) in no event shall reimbursements by the Company under this Agreement be made later than the end of the calendar year next following the calendar year in which the applicable fees and expenses were incurred; (ii) the amount of in-kind benefits that the Company is obligated to pay or provide in any given calendar year shall not affect the in-kind benefits that the Company is obligated to pay or provide in any other calendar year; (iii) the Employee’s right to have the Company pay or provide such reimbursements and in-kind benefits may not be liquidated or exchanged for any other benefit; and (iv) in no event shall the Company’s obligations to make such reimbursements or to provide such in-kind benefits apply later than the Employee’s remaining lifetime. The Employee acknowledges that he has been advised to consult with an attorney and any other advisors of the Employee’s choice prior to executing this Agreement, and the Employee further acknowledges that, in entering into this Agreement, he has not relied upon any representation or statement made by any agent or representative of Company or its affiliates that is not expressly set forth in this Agreement, including, without limitation, any representation with respect to the consequences or characterization (including for purpose of tax withholding and reporting) of the payment of any compensation or benefits hereunder under Code Section 409A and any similar sections of state tax law.

  • System Security (a) If any party hereto is given access to the other party’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party given access (the “Availed Party”) shall comply with all of the other party’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other party. The Availed Party shall access and use only those Systems of the other party for which it has been granted the right to access and use.

  • Network Security 10.1 Protection of Service and Property. Each Party shall exercise the same degree of care to prevent harm or damage to the other Party and any third parties, its employees, agents or End User Customers, or their property as it employs to protect its own personnel, End User Customers and property, etc.

  • Operations Security Supplier must enable logging and monitoring on all operating systems, databases, applications, and security and network devices that are involved in providing Deliverables. Supplier will maintain anti-malware controls that are designed to protect systems from malicious software, including malicious software that originates from public networks. In addition, Supplier will use anti-malware software (of Industry Standard or better quality), maintain such software at the then current major release, purchase maintenance & support available from the vendor for such software, and promptly implement new releases and versions of such software.

  • Tender Security 18.1 The Tenderer shall furnish as part of its Tender, either a Tender-Securing Declaration or a Tender Security, as specified in the TDS, in original form and, in the case of a Tender Security, in the amount and currency specified in the TDS.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!