We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.

For more information visit our privacy policy.

Degree of Protection Sample Clauses

Degree of Protection. Type 4X.
Degree of ProtectionThe Recipient shall protect the disclosed Confidential Information by using the same degree of care as the Recipient uses to protect its own Confidential Information of a like nature, but not less than a reasonable degree of care. The Recipient shall not disclose or provide Confidential Information or any summary or derivative thereof to any third party other than to the Recipient’s Representatives who are bound by an obligation to keep such information confidential consistent with this Agreement and have a need to know the Confidential Information to further the purpose(s) described in this Agreement. The Recipient shall take all necessary steps to ensure that the Confidential Information is not used or disclosed by its Representatives in violation of this Agreement. Any violation of this Agreement by the Recipient’s Representatives shall be deemed a violation by the Recipient and Recipient shall be liable for any all violations of this Agreement by the Recipient’s Representatives.
Degree of Protection. 4.1 Verification Procedure: Privacy Management 4.1.01 An internal or external data protection officer has been appointed 4.1.02 A register of processing activities is kept and continuously updated 08.03.2022
Degree of Protection. 4.2 Procedures for Verification: Incident Response Management
Degree of Protection. 1.6 Confidentiality: Encryption 1.6.04 Encrypted connections such as https (website) or sftp (FTP server) are used for data transfer 08.03.2022
Degree of Protection. The extent of protection provided by an enclosure against access to hazardous parts, against ingress of solid foreign objects and/or against ingress of water and verified by standardised test methods.
Degree of Protection. ‌ Under constraint, connectivity of policy graph is destructed. Thus the old graph evolves to the new reduced graph. In the following example, we show that with the new graph existing data release methods leads to exposure of disconnected nodes.
Degree of Protection confidentiality: access control (sensitive rooms)

Related to Degree of Protection

  • Survival of Protection The provisions of this Section 4 shall continue to afford protection to each Protected Person regardless of whether such Protected Person remains in the position or capacity pursuant to which such Protected Person became entitled to indemnification under this Section 4 and regardless of any subsequent amendment to this Agreement; provided, that no such amendment shall reduce or restrict the extent to which these indemnification provisions apply to actions taken or omissions made prior to the date of such amendment.

  • Xxxx Protection 1With respect to the Parties' rights and obligations under this Framework Agreement, the Parties agree that the Authority is the Data Controller and that the Supplier is the Data Processor.

  • Virus Protection The Bank is not responsible for any electronic virus or viruses that you may encounter. We suggest that you routinely scan your PC using a virus protection product. An undetected virus may corrupt and destroy your programs, files, and your hardware.

  • SAFETY AND PROTECTION OF PROPERTY The Contractor shall at all times: A. Initiate, maintain and supervise all safety precautions and programs in connection with its services or performance of its operations under this contract. B. Take all reasonable precautions to prevent injury to employees, including County employees and all other persons affected by their operations. C. Take all reasonable precautions to prevent damage or loss to property of Orange County, or of other Contractors, consultants or agencies and shall be held responsible for replacing or repairing any such loss or damage. D. Comply with all ordinances, rules, regulations, standards and lawful orders from authority bearing on the safety of persons or property or their protection from damage, injury or loss. This includes but is not limited to: o Occupational Safety and Health Act (OSHA) o National Institute for Occupational Safety & Health (NIOSH) o National Fire Protection Association (NFPA) o American Society of Heating, Refrigeration & Air-Conditioning Engineers (ASHRAE) E. The Contractor shall also comply with the guidelines set forth in the Orange County Safety & Health Manual. The manual can be accessed online at the address listed below:

  • Compliance with Data Protection Laws 2.1 bookinglab shall comply with its obligations under the Data Protection Laws as they apply to it as a Data Processor of the Customer Personal Data. 2.2 The Customer shall comply with its obligations under the Data Protection Laws as they apply to it as a Data Controller of the Customer Personal Data.

  • Xxxxx Disaster Protection In accordance with the requirements of the Flood Disaster Protection Act of 1973 (42 U.S.C. 4001), the Subrecipient shall assure that for activities located in an area identified by the Federal Emergency Management Agency (FEMA) as having special flood hazards, flood insurance under the National Flood Insurance Program is obtained and maintained as a condition of financial assistance for acquisition or construction purposes (including rehabilitation).

  • System Protection To prevent compromise of systems which contain DSHS Data or through which that Data passes: a. Systems containing DSHS Data must have all security patches or hotfixes applied within 3 months of being made available. b. The Contractor will have a method of ensuring that the requisite patches and hotfixes have been applied within the required timeframes. c. Systems containing DSHS Data shall have an Anti-Malware application, if available, installed. d. Anti-Malware software shall be kept up to date. The product, its anti-virus engine, and any malware database the system uses, will be no more than one update behind current.

  • TEACHER PROTECTION A. The teachers shall have the right to review those things in his/her personnel file to which he/she is entitled by Law. At the option of the teacher, a representative of the Association may be present for such review. Each file shall contain a record indicating reviewer and date of review, excluding school personnel official access for record maintenance. B. The teacher may submit a written notation regarding any material and the same will be attached to the file copy of the material in question. If the teacher is asked to sign material placed in his/her file, such signature will be understood to indicate his/her awareness of the material but in no instance shall said signature be interpreted to mean agreement with the content of the material. X. Any serious complaint made against a teacher by any parent, student, and other person will be promptly called to the attention of the teacher. D. If a teacher is to be disciplined or reprimanded by the Board or its designee, he/she shall be entitled to have a representative of the Association present. That representative shall be the teacher's choice between the building representative or another Association officer. E. Each teacher has the responsibility for maintaining proper student control and discipline throughout the school day as well as at school-sponsored activities where he/she is serving as a sponsor or chaperone. The teacher, however, has the primary responsibility for maintaining control and discipline in his/her classroom. The Board will give reasonable support and assistance to teachers with respect to maintenance of control and discipline. Whenever is appears that a particular pupil requires special attention, reasonable steps shall be taken to provide such attention. The teachers recognize that all disciplinary actions and methods invoked by them shall be in accordance with established Board policy. F. Any case of assault upon a teacher which is related to a school-centered problem shall be promptly reported to the Board or its designated representative. If the assault was by a pupil or pupils, the Administration shall promptly investigate the matter and determine suitable discipline for the assaulting pupil. This decision shall be communicated to the teacher concerned. If the assault is by an adult, who is not a pupil, the Board its designee representative shall promptly report the incident to the proper law enforcement authorities. G. A teacher may suspend a pupil from one (1) period, when the grossness of the offense, the persistence of the misbehavior, or the disruptive effect of the violation makes the continued presence of the student in that classroom intolerable. In such cases, the teacher will promptly (by the end of the school day) furnish the administrator or counselor full particulars of the incident. The teacher and the administration will cooperatively endeavor to achieve correction of student behavior through whatever avenues are reasonably available. H. School administrators and teachers will endeavor to achieve correction of the students' misbehavior through counseling and interviews with the child and his/her parents when warranted.

  • Term of Protection Initial registration, and each renewal of registration, of a trademark shall be for a term of no less than seven years. The registration of a trademark shall be renewable indefinitely.

  • Further Protection The Pledgor will promptly give notice to the Secured Party of, and defend against, any suit, action, proceeding or lien that involves Posted Credit Support Transferred by the Pledgor or that could adversely affect the security interest and lien granted by it under Paragraph 2, unless that suit, action, proceeding or lien results from the exercise of the Secured Party’s rights under Paragraph 6(c).