Database Protection Clause Samples
The Database Protection clause establishes the rights and restrictions related to the use, access, and safeguarding of databases within an agreement. Typically, it outlines who may access the database, under what conditions, and what measures must be taken to prevent unauthorized use or disclosure. For example, it may require parties to implement security protocols or prohibit copying and distribution of database contents. The core function of this clause is to protect proprietary or sensitive data stored in databases, ensuring that valuable information is not misused or compromised.
POPULAR SAMPLE Copied 1 times
Database Protection. Database infrastructure is segregated from the application servers and the Internet via firewalls.
Database Protection. 9.2.1. The Customer hereby acknowledges the right of Earth-i to protection against re-use or extraction of the data, which constitute the Data or Products or of a substantial part thereof.
Database Protection. Use all means that the Borrower -------------- ------------------- reasonably believes are reasonably necessary to protect the trade secret, proprietary nature of the Database. The Borrower shall provide the Agent with a true and correct copy of the Database and shall provide the Agent with periodic updates to the Database, not less frequently than on a quarterly basis, all in accordance with the Security Documents.
Database Protection. The product database can be accessed only by providing instance- specific credentials and is limited to local host access. The passwords stored are one-way hashed using bcrypt and are filtered from all of our logs. As bcrypt hashing algorithm with per-user-salt is used, it would be exorbitant and heavily time-consuming to reverse engineer the passwords and the database resides in Customer setup only.
Database Protection. If the United States hereafter adopts any legal scheme for the protection of databases apart from copyright, the parties will in good faith negotiate such amendments to this Agreement as shall be necessary or advisable to allocate the rights under such scheme in the same manner as set forth herein.
Database Protection. Lookout maintains network segmentation with interconnectivity defined by a least-privilege, default- deny security model. Database infrastructure is completely segregated from both the public internet and internal application servers via AWS network security methods including VPC routing, Transit Gateways, and Security Groups.
