Custody and Title of Cryptocurrency Sample Clauses

Custody and Title of Cryptocurrency. Unless otherwise stated herein, all cryptocurrency obtained by you from cryptocurrency transactions or deposits are custodial assets held by Zero Hash for your benefit, as described in further detail below.
AutoNDA by SimpleDocs

Related to Custody and Title of Cryptocurrency

  • New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to:

  • Format and Signing of Tender 19.1 The Tenderer shall prepare one original of the documents comprising the Tender as described in ITT 11 and clearly mark it “ORIGINAL.” Alternative Tenders, if permitted in accordance with ITT 12, shall be clearly marked “ALTERNATIVE.” In addition, the Tenderer shall submit copies of the Tender, in the number specified in the TDS and clearly mark them “COPY.” In the event of any discrepancy between the original and the copies, the original shall prevail.

  • Data Security Requirements Without limiting Contractor’s obligation of confidentiality as further described in this Contract, Contractor must establish, maintain, and enforce a data privacy program and an information and cyber security program, including safety, physical, and technical security and resiliency policies and procedures, that comply with the requirements set forth in this Contract and, to the extent such programs are consistent with and not less protective than the requirements set forth in this Contract and are at least equal to applicable best industry practices and standards (NIST 800-53). Contractor also shall provide technical and organizational safeguards against accidental, unlawful, or unauthorized access or use, destruction, loss, alteration, disclosure, transfer, commingling, or processing of such information that ensure a level of security appropriate to the risks presented by the processing of County Data, Contractor personnel and/or subcontractor personnel and affiliates approved by County to perform work under this Contract may use or disclose County personal and confidential information only as permitted in this Contract. Any other use or disclosure requires express approval in writing by the County of Orange. No Contractor personnel and/or subcontractor personnel or affiliate shall duplicate, disseminate, market, sell, or disclose County personal and confidential information except as allowed in this Contract. Contractor personnel and/or subcontractor personnel or affiliate who access, disclose, market, sell, or use County personal and confidential information in a manner or for a purpose not authorized by this Contract may be subject to civil and criminal sanctions contained in applicable federal and state statutes. Contractor shall take all reasonable measures to secure and defend all locations, equipment, systems, and other materials and facilities employed in connection with the Services against hackers and others who may seek, without authorization, to disrupt, damage, modify, access, or otherwise use Contractor systems or the information found therein; and prevent County data from being commingled with or contaminated by the data of other customers or their users of the Services and unauthorized access to any of County data. Contractor shall also continuously monitor its systems for potential areas where security could be breached. In no case shall the safeguards of Contractor’s data privacy and information and cyber security program be less stringent than the safeguards used by County. Without limiting any other audit rights of County, County shall have the right to review Contractor’s data privacy and information and cyber security program prior to commencement of Services and from time to time during the term of this Contract. All data belongs to the County and shall be destroyed or returned at the end of the contract via digital wiping, degaussing, or physical shredding as directed by County.

  • Notice of Criminal Activity and Disciplinary Actions a. Xxxxxxx shall immediately report in writing to their contract manager when Xxxxxxx has knowledge or any reason to believe that they or any person with ownership or controlling interest in the organization/business, or their agent, employee, contractor or volunteer that is providing services under this Contract has:

  • WILD AND SCENIC RIVERS The Wild and Scenic Rivers Act of 1968 (16 U.S.C. § 1271, et seq.) as amended, particularly sections 7(b) and (c) (16 U.S.C. § 1278(b) and (c)). AIR QUALITY The Clean Air Act (42 U.S.C. § 7401, et seq.) as amended, particularly sections 176(c) and (d) (42 U.S.C. §7506(c) and (d)). Determining Conformity of Federal Actions to State or Federal Implementation Plans (Environmental Protection Agency-40 C.F.R. Parts 6, 51, and 93). FARMLAND PROTECTION Farmland Protection Policy Act of 1981 (7 U.S.C. § 4201, et seq.) particularly sections 1540(b) and 1541 (7 U.S.C. §§ 4201(b) and 4202); and Farmland Protection Policy (Department of Agriculture-7 C.F.R. part 658). HUD ENVIRONMENTAL STANDARDS Applicable criteria and standards specified in HUD environmental regulations (24 C.F.R. Part 51)(other than the runway clear zone and clear zone notification requirement in 24 C.F.R. § 51.303(a)(3); and HUD Notice 79-33, Policy Guidance to Address the Problems Posed by Toxic Chemicals and Radioactive Materials, September 10, 1979.

  • Information Security Requirements In cases where the State is not permitted to manage/modify the automation equipment (server/computer/other) that controls testing or monitoring devices, the Contractor agrees to update and provide patches for the automation equipment and any installed operating systems or applications on a quarterly basis (at minimum). The Contractor will submit a report to the State of updates installed within 30 days of the installation as well as a Plan of Actions and Milestones (POA&M) to remediate any vulnerabilities ranging from Critical to Low. The contractor will provide an upgrade path or compensatory security controls for any operating systems and applications listed as beyond “end-of-life” or EOL, within 90 days of the EOL and complete the EOL system’s upgrade within 90 days of the approved plan.

  • Information Integrity and Security Contractor shall immediately notify County of any known or suspected breach of personal, sensitive and confidential information related to Contractor’s work under this Agreement.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!