Content Security Sample Clauses

Content Security. If NVIDIA discovers a security flaw in Content and requests you to correct the flaw, you shall respond to NVIDIA within 24 hours of such request with a resolution or a written resolution plan and the estimated time for delivery of a resolution.
AutoNDA by SimpleDocs
Content Security. Except as otherwise provided in the Terms and Conditions, the Customer is solely responsible for the security of its content, including any access to content that the Customer may provide to its employees, clients, or other third parties, and when such content is in transit to and from the Service. The Customer agrees to implement such security measures as are reasonable for its use of the Service and shall maintain appropriate steps regarding the protection and backup of its content. The Customer is responsible for complying with any laws or regulations that might apply to its content and is responsible for any losses or other consequences arising from its failure to encrypt or back up its content.
Content Security. During the Term of this agreement, MNP will implement and maintain commercially reasonable administrative, physical and technical safeguards and measures to protect against unauthorized access to your data on the Client Portal.
Content Security. Because it is not possible to guarantee data security, you acknowledge that it may be possible for an unauthorized third party to access your Content, and you agree that, in such event, any loss that you may suffer is subject to the limitation of liability section of these Terms.
Content Security. Turbo Flash Publications shall ensure that the content provided by you shall be kept confidential. Neither Turbo Flash Publications nor any third parties associated with Turbo Flash Publications shall involve in any act that would compromise the security of the content before, during and after the work is published.
Content Security. Except as otherwise provided in the Terms and Conditions, the Member is solely responsible for the security of its content, including any access to content that the Member may provide to its employees, clients, or other third parties, and when such content is in transit to and from the Service. The Member agrees to implement such security measures as are reasonable for its use of the Service and shall maintain appropriate steps regarding the protection and backup of its content. The Member is responsible for complying with any laws or regulations that might apply to its content and is responsible for any losses or other consequences arising from its failure to encrypt or back up its content.
Content Security a. Licensee shall promptly take all steps reasonably necessary to protect the copyright in the Package (and each Picture) and protect all material manufactured or delivered hereunder to prevent the unauthorized exploitation of the Package or the doing of any act which infringes upon any rights in or to the Package, or any materials manufactured or delivered hereunder. Licensee shall exercise all due care in handling, storing and safe-guarding all such material in order to prevent loss or damage thereto and unauthorized duplication or reproductions of the Package. Violation of this clause with respect to the Package shall constitute cause for termination of any and all rights granted herein to Licensee if such violation is not cured within five (5) days of receipt of notice from FilmBuff specifying the violation. b. Licensee will use industry standard (i.e., approved by at least one major or “mini-major” motion picture studio or major television network, as such terms are commonly understood in the entertainment business in the United States) security measures intended to prevent theft, pirating, unauthorized exhibition, unauthorized copying, or unauthorized duplication of the Package. c. Licensee shall ensure that no Picture is transmitted (and shall ensure that no transmission of the Package “spills over”), or otherwise made available, in any area that is not within the Territory. Licensee shall utilize, and will ensure that all third parties authorized to exhibit, transmit, or distribute the Package in the Territory utilize “IP address look-up” or similar technology that is designed to determine whether a viewer or purchaser’s IP address is within the Territory. If the IP address look-up technology indicates that the viewer’s IP address is not within the Territory, the exhibition or transmission of the Package to such viewer shall not be permitted. Where IP address look-up is not used to determine a viewer’s location, a comparable technology must be used to ensure that the viewer or purchaser is located within the Territory. d. The content security technologies that are applied to the Package in connection with Licensee’s exploitation of the Package, or used by any third party authorized to exhibit the Package in the Territory, shall offer the best available level of protection that is applied to the content of any other party licensor of audiovisual content to Licensee, provided that such measures must at minimum be industry standard (i.e., approved by ...
AutoNDA by SimpleDocs

Related to Content Security

  • Payment Security To secure all of CAISO’s payment obligations to Owner under this Agreement, CAISO agrees to grant Owner a security interest and lien in the following collateral (collectively, the “Collateral”): (a) all past, present and future accounts and other amounts Responsible Utility owes CAISO at any time pursuant to Section 41 of the CAISO Tariff attributable to invoices submitted by Owner under this Agreement (collectively, the “Accounts”), (b) the RMR Owner Facility Trust Account, all funds in the RMR Owner Facility Trust Account at any time, and all funds paid on account of any Accounts, (c) all proceeds of the Collateral, if any, and (d) all of CAISO’s right, title and interest in the Collateral. CAISO represents and warrants to Owner that (a) CAISO has the authority to grant such security interest, (b) CAISO will have good, marketable and exclusive title to all of the Collateral, (c) such security interest and lien will at all times be a valid, enforceable and first-priority lien on the Collateral, and (d) such security interest will be duly perfected by the filing of a financing statement under the California Uniform Commercial Code describing the Collateral in the office of the Secretary of State of California and the delivery of a written notice of Owner’s security interest to the bank with which the RMR Owner Facility Trust Account is maintained. If CAISO defaults on its obligation to pay under this Agreement, Owner shall be entitled to enforce such securityinterest, to exercise its rights in the Collateral, to collect the Accounts from Responsible Utility, to collect all funds in the RMR Owner Facility Trust Account, and to exercise all other rights and remedies under the California Uniform Commercial Code. CAISO agrees to promptly execute and deliver all financing statements and other documents Owner reasonably requests, including but not limited to a written notice of Owner’s security interest in the Collateral to the bank with which the RMR Owner Facility Trust Account is maintained, in order to maintain, perfect and enforce such security interest.

  • MANAGEMENT SECURITY Section 1. The Federation hereby accepts liability for any damage to or loss of state property that is the proximate cause of action taken by striking employees of any bargaining unit, provided however, that liability under this Section shall be restricted to physical damage to real and personal property, and shall not include any alleged loss of revenue or other incidental or punitive damage sought by the Employer.

  • Employment Security 28.1 The parties to this agreement agree to maximise the continuity of employment for existing and future employees and to ensure that permanent employment opportunities and the opportunity for promotion transfer and re-training or upskilling are not eliminated, reduced or eroded. 28.2 The Employer recognises that the use of subcontractors and labour hire may affect the job security of current and future employees covered by this Agreement. 28.3 As soon as practicable after being awarded a contract and prior to engaging subcontractors to perform work in the classifications covered by this agreement, the employer shall inform the Union Delegate (where applicable) which subcontractors it intends to use for the project. 28.4 The application of this Employment Security clause shall recognise geographical and commercial circumstances. In these circumstances the Employer and the Union may agree to vary the requirements of clause 28 on a project-by-project basis. Negotiations are to be conducted in good faith and agreement will not be unreasonably withheld.

  • Replacement Securities If the Holder of a Security claims that the Security has been mutilated, destroyed, lost or stolen, the Corporation may issue and the Trustee shall authenticate a replacement Security with identical terms as the Securities exchanged if the requirements of Section 8-405 of the Uniform Commercial Code (or any successor provision) are met. Such Holder shall furnish an indemnity bond sufficient in the judgment of the Corporation and the Trustee to protect the Corporation, the Trustee, the Paying Agent, the Registrar and any co-registrar from any loss which any of them may suffer if a Security is replaced. The Corporation and the Trustee may charge for their expenses in replacing a Security. In case any such mutilated, destroyed, lost or stolen Security has become due and payable, the Corporation in its discretion may, instead of issuing a new Security, pay such Security (without surrender thereof except in the case of a mutilated Security) if the applicant for such payment shall furnish to the Corporation, the Trustee, the Paying Agent, the Registrar and any co-registrar for such Security such security or indemnity as may be required by them to hold each of them harmless, and in case of destruction, loss or theft, evidence satisfactory to the Corporation, the Trustee, the Paying Agent, the Registrar and any co-registrar, and any agent of any of them, of the destruction, loss or theft of such Security and the ownership thereof. Upon the issuance of any new Security under this Section 2.09, the Corporation may require the payment of a sum sufficient to cover any tax or other governmental charge that may be imposed in relation thereto and any other expenses (including all fees and expenses of the Trustee, the Paying Agent, the Registrar and any co-registrar for such Security) connected therewith. Every new Security issued pursuant to this Section 2.09 in lieu of any destroyed, lost or stolen Security or in exchange for any mutilated Security, shall constitute an original additional obligation of the Corporation, whether or not the destroyed, lost or stolen Security shall be at any time enforceable by anyone, and shall be entitled to all the benefits of this Indenture equally and proportionately with any and all other Securities. The provisions of this Section 2.09 are exclusive and shall preclude (to the extent lawful) all other rights and remedies with respect to the replacement or payment of mutilated, destroyed, lost or stolen Securities.

  • Internet Security The Service utilizes a comprehensive security strategy to protect your accounts and transactions conducted over the Internet. Prior to activating your access to the Service, our Internet Banking Department will verify your identity and authorization against information associated with the Eligible Account (s) that you request to be linked to the Service. Access IDs and Passcodes - One of the main security features protecting the Service is the unique combination of your Access Identification Code (Access ID) and Passcode. During the enrollment process, you will be asked to select a unique Access ID, and then choose a Passcode that will be used to gain access to the Service. You determine your own Passcode, which is encrypted in our database. Neither this Institution nor its Service Providers have access to this information. The Service will automatically deactivate your account after three unsuccessful login attempts within a 24-hour time frame. You may reset your passcode online or you may contact this Institution for assistance. Because your Passcode is used to access your accounts, you should treat it as you would any other sensitive personal data. • You should carefully select a Passcode that is hard to guess. • You should not use words based on your name, address or other personal information. • Special characters may be used to increase security. • Do NOT use dictionary words. The “Help” link within the Service will offer tips on choosing a secure Passcode that you can remember. • Keep your Passcode safe. • Memorize your Passcode and do NOT write it down. • You should also change your Passcode occasionally, such as every 90 days. • A Passcode should be changed immediately if you suspect that your Passcode has been compromised. This can be done at any time from the “User Services” menu after you log on to the Service. NEITHER THIS INSTITUTION NOR ITS SERVICE PROVIDERS WILL CONTACT YOU VIA TELEPHONE OR EMAIL REQUESTING PERSONAL INFORMATION, YOUR ACCESS ID, OR YOUR PASSCODE. IF YOU ARE CONTACTED BY ANYONE REQUESTING THIS INFORMATION, PLEASE CONTACT US IMMEDIATELY.

  • Mobile Deposit Security You will complete each deposit promptly. If you are unable to complete your deposit promptly, you will ensure that your mobile device remains securely in your possession until the deposit has been completed. It is your responsibility to establish and maintain procedures to safeguard against unauthorized deposits. You will notify us immediately by telephone with written confirmation if you learn of any loss or theft of original checks. You will ensure the safety and integrity of original checks from the time of receipt until the time of destruction. If warranted in our reasonable judgment, we may audit and monitor you, and you agree to cooperate with us to permit such monitoring, to confirm that you have satisfied your obligations under this Agreement.

  • Government Securities 16 Guarantee................................................... 16 Guarantor................................................... 17 Holder...................................................... 17 Incur....................................................... 17

  • E7 Security The Authority shall be responsible for maintaining the security of the Authority premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority premises, and shall ensure that all Staff comply with such requirements.

  • Bid Security 2.1 Bid security, as a guarantee of good faith, in the form of a certified check, cashier's check, or bidder's bond, may be required to be submitted with this bid document, as indicated on the bid. 2.1.1 Bid security, if required, shall be in the amount specified on the bid. The bid security must be scanned and attached to the “Response Attachments” section of your response or it can be faxed to the Purchasing Office at 000-000-0000. The original bid security should then be sent or delivered to the office of the Purchasing Division, 000 X. 0xx Xx., Xxx. 000, Xxxxxxx, XX 00000 to be received within three (3) days of bid closing. 2.1.2 If bid security is not received in the Office of the Purchasing Division as stated above, the vendor may be determined to be non-responsive. 2.2 If alternates are submitted, only one bid security will be required, provided the bid security is based on the amount of the highest gross bid. 2.3 Such bid security will be returned to the unsuccessful Bidders when the award of bid is made. 2.4 Bid security will be returned to the successful Bidder(s) as follows: 2.4.1 For single order bids with specified quantities: upon the delivery of all equipment or merchandise, and upon final acceptance by the Owners. 2.4.2 For all other contracts: upon approval by the Owners of the executed contract and bonds. 2.5 Owners shall have the right to retain the bid security of Bidders to whom an award is being considered until either: 2.5.1 A contract has been executed and bonds have been furnished. 2.5.2 The specified time has elapsed so that the bids may be withdrawn. 2.5.3 All bids have been rejected. 2.6 Bid security will be forfeited to the Owners as full liquidated damages, but not as a penalty, for any of the following reasons, as pertains to this specification document: 2.6.1 If the Bidder fails or refuses to enter into a contract on forms provided by the Owners, and/or if the Bidder fails to provide sufficient bonds or insurance within the time period as established in this specification document.

  • Airport Security The Contractor shall be familiar with and conduct its operations in accordance with all regulations and directives of the Authority and the Transportation Security Administration, and any other federal, state or local government having jurisdiction over the airport, with respect to the maintenance of airport security.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!