DIGITAL SECURITY Sample Clauses

DIGITAL SECURITY a) Firewalls control the transmission of data between our trusted internal networks and untrusted external networks, as well as traffic between sensitive areas of the internal networks themselves to protect against unauthorized access.
AutoNDA by SimpleDocs
DIGITAL SECURITY. To restrict access to HealthCompass to authorized end users whose identity has been verified, and to secure transmission of information over the Internet between such end users and Licensee, when using HealthCompass, access to, and use of, HealthCompass shall be protected by a Digital Certificate based public-key encryption process. Accordingly, prior to using HealthCompass, End Users shall be required to present a Digital Certificate to Licensee from an HMI approved Certifying Authority. Upon End-User request, HMI will serve as the Certifying Authority and issue an HMI Digital Certificate to the End-User. If the End-User elects to obtain the Digital Certificate from an HMI approved Certifying Authority (as opposed to HMI), the End-User will be responsible for any costs associated with acquiring such Digital Certificate.
DIGITAL SECURITY. 53.1 The Contractor shall, in accordance with Applicable Laws and good industry practice implement, maintain, and ensure that its subcontractors that will have direct or indirect access to the Lessee's Confidential Information and/or Lessee’s IT systems (whether through email or other form of electronic communication or otherwise) implement and maintain:
DIGITAL SECURITY. The Supplier shall implement and maintain appropriate: technical and organizational measures; and adequate security programs and procedures, to prevent any accidental, unauthorized or unlawful access to, processing, destruction, loss, damage or disclosure of the Customer’s Confidential Information including, for the avoidance of doubt, Personal Data (“Customer Data”) and protect the Supplier’s IT systems used to provide the Services in accordance with applicable laws and industry best practice. The Supplier shall ensure that the measures outlined in Section 26.1 above include: boundary firewalls and internet gateways to protect its networks and IT systems from the internet and other external networks; secure configuration of networks, IT systems, applications and devices, including encryption of portable devices and removable media; physical and logical access controls that restrict access to only authorized users to the extent required to perform the required Services for Company; malware protection software that is designed to prevent the introduction of malware into Supplier IT systems, networks and devices; patch management practices to identify, assess and apply applicable security patches to the IT systems, applications and devices; and training and awareness for Supplier personnel in information security and the handling of Company Data in accordance with the terms of this Agreement. The Supplier shall investigate all suspected accidental, unauthorized or unlawful access to, processing, destruction, loss, damage or disclosure of Company Data and/or any cyber-attacks on the Supplier’s IT systems (“Security Incident”) and promptly notify Company, via xxx@Xxxxxxx.xxx, of any confirmed Security Incident.
DIGITAL SECURITY. The Supplier shall protect BP's data at all times and will implement relevant industry best practice information security protections and controls, including operating information security management practices, relevant technical controls and ensuring that Supplier Personnel adopt good information security behaviours. The Supplier agrees that it shall immediately notify BP of: (i) any actual, threatened and/or suspected unauthorised or unlawful access to, processing, destruction, damage or disclosure of BP's data; and/or (ii) any accidental loss of BP's data. If an incident referred to in this clause occurs, the Supplier shall provide all necessary assistance as requested by BP with notifications that may be required under applicable law.
DIGITAL SECURITY. To restrict access to LHR to authorized end users whose identity has been verified, and to secure transmission of information over the Internet between such end users and HMI, when using LHR, access to, and use of, LHR is protected by a Digital Certificate based public-key encryption process. Accordingly, prior to using LHR, end users shall be required to present a Digital Certificate to HMI from an HMI approved Certifying Authority. Upon end user request, HMI will serve as the Certifying Authority and issue an HMI Digital Certificate to the end user. If the end user elects to obtain the Digital Certificate from an HMI approved Certifying Authority (as opposed to HMI), the end user will be responsible for any costs associated with acquiring such Digital Certificate.

Related to DIGITAL SECURITY

  • Physical Security Contractor shall ensure that Medi-Cal PII is used and stored in an area that is physically safe from access by unauthorized persons during working hours and non- working hours. Contractor agrees to safeguard Medi-Cal PII from loss, theft or inadvertent disclosure and, therefore, agrees to:

  • Collateral Security (a) The Obligations shall be secured by (a) a perfected first-priority security interest (subject to Permitted Liens entitled to priority under Applicable Law) in all Collateral, whether now owned or hereafter acquired, pursuant to the terms of the Security Agreement to which each Borrower is a party to the extent perfected by the filing of UCC financing statements; (b) a pledge of 100% of the capital stock or other Equity Interests of such Borrowers (other than the Parent) and of the Non-Borrower Subsidiaries (other than the Foreign Subsidiaries) to the Administrative Agent on behalf of the Secured Parties pursuant to the Pledge Agreement; and (c) a pledge of the capital stock or other Equity Interests of each Foreign Subsidiary (provided that not more than 65% of the total voting power of all outstanding capital stock or other Equity Interest of any such first-tier Foreign Subsidiary of a Borrower shall be required to be so pledged and no Equity Interests of any non-first-tier Foreign Subsidiary shall be provided to be so pledged); provided that the Borrowers hereby agree, upon the request of the Administrative Agent and the Required Lenders, to deliver, as promptly as practicable, but in any event within ninety (90) days after request therefor, or such other later time, if any, to which the Administrative Agent may agree, (i) certificates of titles for all or substantially all vehicles, trucks, trailers, tractors, automobiles and any other equipment covered by certificates of title owned by a Borrower (collectively, “Motor Vehicles”) with the Administrative Agent listed as lienholder therein (subject to a limited power of attorney in favor of the Parent to dispose of titled equipment) and, if required by the Administrative Agent, the Borrowers shall retain Corporation Service Company (or other similar company satisfactory to the Administrative Agent) pursuant to agreements reasonably satisfactory to the Administrative Agent pursuant to which Corporation Service Company (or such other company) will agree to act as agent for the Secured Parties with respect to the perfection of security interests in the Motor Vehicles; and (ii) mortgages with respect to Real Property and to take such other steps and make such other deliveries as may be reasonably requested by the Administrative Agent (including, without limitation, the delivery of legal opinions, Consulting Engineer’s reports, surveys, title insurance, environmental assessment reports, flood hazard certifications, evidence of flood insurance, if required, and a certification of the name and address of each real estate recording office where a mortgage on the real estate on which any Collateral consisting of fixtures may be located would be recorded) so as to provide the Administrative Agent, for the benefit of the Secured Parties, a perfected first-priority security interest in such assets, provided that to the extent that any lease of (or operating/management agreement with respect to) Real Property prohibits assignment of such lease (or operating/management agreement) without the consent of the lessor or another party thereunder, the Borrowers shall not be required to grant a mortgage on the leasehold interest under such lease, but in such event, the Borrowers agree to diligently and in good faith use its reasonable best efforts to obtain the consent (which consent shall be in form and substance reasonably satisfactory to the Administrative Agent) of the applicable lessor or other party to such leasehold mortgage (and, upon the receipt of such consent, the Borrowers shall promptly grant such leasehold mortgage and comply with the other provisions of this Section 10.15 with respect thereto).

  • Security Notwithstanding anything herein to the contrary, except for Section 27, to the extent requested by Indemnitee and approved by the Board, the Company may at any time and from time to time provide security to Indemnitee for the Company’s obligations hereunder through an irrevocable bank line of credit, funded trust or other collateral. Any such security, once provided to Indemnitee, may not be revoked or released without the prior written consent of Indemnitee.

  • Cybersecurity (i)(x) There has been no security breach or other compromise of or relating to any of the Company’s or any Subsidiary’s information technology and computer systems, networks, hardware, software, data (including the data of its respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of it), equipment or technology (collectively, “IT Systems and Data”) and (y) the Company and the Subsidiaries have not been notified of, and has no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to its IT Systems and Data; (ii) the Company and the Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification, except as would not, individually or in the aggregate, have a Material Adverse Effect; (iii) the Company and the Subsidiaries have implemented and maintained commercially reasonable safeguards to maintain and protect its material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and Data; and (iv) the Company and the Subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practices.

  • Registered Notes The Company shall cause to be kept at its principal office a register for the registration and transfer of the Notes, and the Company will register or transfer or cause to be registered or transferred, as hereinafter provided, any Note issued pursuant to this Agreement. At any time and from time to time the holder of any Note which has been duly registered as hereinabove provided may transfer such Note upon surrender thereof at the principal office of the Company duly endorsed or accompanied by a written instrument of transfer duly executed by the holder of such Note or its attorney duly authorized in writing. The Person in whose name any Note shall be registered shall be deemed and treated as the owner and holder thereof for all purposes of this Agreement. Payment of or on account of the principal, premium, if any, and interest on any Note shall be made to or upon the written order of such holder.

  • Physical Security of Media Transfer Agent shall implement controls, consistent with applicable prevailing industry practices and standards, that are designed to deter the unauthorized viewing, copying, alteration or removal of any media containing Fund Data. Removable media on which Fund Data is stored by Transfer Agent (including thumb drives, CDs, and DVDs, and PDAS) will be encrypted based on Transfer Agent encryption policies.

  • Global Debentures Debentures issued in global form shall be substantially in the form of Exhibits A-1 or A-2 attached hereto (including the Global Debenture Legend thereon and the "Schedule of Exchanges of Interests in the Global Debenture" attached thereto). Debentures issued in definitive form shall be substantially in the form of Exhibit A-1 attached hereto (but without the Global Debenture Legend thereon and without the "Schedule of Exchanges of Interests in the Global Debenture" attached thereto). Each Global Debenture shall represent such of the outstanding Debentures as shall be specified therein and each shall provide that it shall represent the aggregate principal amount of outstanding Debentures from time to time endorsed thereon and that the aggregate principal amount of outstanding Debentures represented thereby may from time to time be reduced or increased, as appropriate, to reflect exchanges and redemptions. Any endorsement of a Global Debenture to reflect the amount of any increase or decrease in the aggregate principal amount of outstanding Debentures represented thereby shall be made by the Trustee or the Debenture Custodian, at the direction of the Trustee, in accordance with instructions given by the Holder thereof as required by Section 2.06 hereof.

  • Cyber Security Except as disclosed in the Registration Statement and the Prospectus, (x)(i) to the knowledge of the Company, there has been no security breach or other compromise of or relating to any information technology and computer systems, networks, hardware, software, data, or equipment owned by the Company or its subsidiaries or of any data of the Company’s, the Operating Partnership’s or the Subsidiaries’ respective customers, employees, suppliers, vendors that they maintain or that, to their knowledge, any third party maintains on their behalf (collectively, “IT Systems and Data”) that had, or would reasonably be expected to have had, individually or in the aggregate, a Material Adverse Effect, and (ii) the Company, the Operating Partnership and the Subsidiaries have not received any written notice of, and have no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to their IT Systems and Data that had, or would reasonably be expected to have had, a Material Adverse Effect; (y) the Company, the Operating Partnership and the Subsidiaries are presently in compliance with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the protection of IT Systems and Data from a security breach or unauthorized use, access, misappropriation, modification or other compromise, except as would not, in the case of this clause (y), individually or in the aggregate, have a Material Adverse Effect; and (z) the Company, the Operating Partnership and the Subsidiaries have implemented commercially reasonable backup and disaster recovery technology.

Time is Money Join Law Insider Premium to draft better contracts faster.