Easy to use and secure Sample Clauses

Easy to use and secure trusted platform To success, CHIRP4Rail should be a trusted platform. To achieve that objective, the CPO must guarantee an easy to use and highly secure platform. The platform must be easy for users to access and to use it. The CPO should provide specific technical support to the users for coordinating and synchronising the user’s cybersecurity platforms. For instance, in case of MISP usage, the users with their own MISP instances could be connected and synchronised with CHIRP4Rail’s MISP by pushing events from their own MISP instances and vice versa. Due to the sensitivity of the information that the CHIRP4Rail platform will hold, and the fact that it will contain data that relates to railway companies' vulnerabilities, it is essential to safeguard this data with the highest security methods. To guarantee the highest level of cybersecurity for the CHIRP4Rail platform, the platform must be accessible via Internet and/or a railway trusted virtual private network using secure IPsec protocol; therefore, only authorised users can connect. Two- factor authentication could also be implemented. To be considered a trusted platform, CHIRP4Rail must also guarantee voluntary and anonymous sharing of threat intelligence information to allow stakeholders to freely share information. CHIRP4Rail must anonymously relay information from trusted members. Choice of anonymity must be context-dependent and linked to trust.
AutoNDA by SimpleDocs

Related to Easy to use and secure

  • Consent to Use of Data You agree that the Licensor may collect and use technical data and related information, including but not limited to technical information about your device, system and application software, and peripherals, that is gathered periodically to facilitate the provision of software updates, product support and other services (if any) related to the Software. The Licensor may use this information, as long as it is in a form that does not personally identify you, to improve its products or to provide services or technologies.

  • Data and Security If Contractor is granted access to Court Data, Confidential Information or Court Work Locations in the performance of the Work;

  • Background Screening and Security 14 These General Contract Conditions supersede and replace in their entirety all General Contract Conditions, Form PUR 1000, which is incorporated by reference in Rule 60A-1.002, Florida Administrative Code (F.A.C.)

  • Privacy and Security (a) The Service Provider shall not transmit or store any AHS data outside the borders of Canada, nor transmit any AHS data in Canada to any party not specifically contemplated in this Agreement, without AHS’s prior written consent to each such data transmittal, which consent may be arbitrarily and unreasonably withheld.

  • Authority to Use Attachment B of each Approved Service Order will state whether or not the Consultant can use subconsultants to provide any part of the Work. If Attachment B does not authorize the Consultant to use subconsultants, then the Director’s prior written approval is required for the Consultant to use a subconsultant to perform any part of the Work.

  • License to Use You are authorized to use the Software on one (1) single computer only. You may not use the Software on any other machines other than the said single computer.

  • Background and Security Investigations 8.1 For the safety and welfare of the children to be served under this Contract, CONTRACTOR shall, as permitted by law, ensure that its staff, employees, independent contractors, volunteers or subcontractors who may come in contact with children in the course of their work, undergo and pass a background investigation to the satisfaction of COUNTY as a condition of beginning and continuing to work under this contract. Such background investigation may include, but shall not be limited to criminal conviction information obtained through fingerprints submitted to the California Department of Justice. The fees associated with the background investigation shall be at the expense of the CONTRACTOR, regardless if the member of CONTRACTOR’s staff passes or fails the backgrounds investigation.

  • Safety and Security Contractor is responsible for maintaining safety in the performance of this Contract. Contractor shall be responsible for complying with the District’s rules and regulations pertaining to safety, security, and driving on school grounds, particularly when children are present.

  • System Agency Right to Use Contractor agrees that System Agency has the right to use, produce, and distribute copies of and to disclose to System Agency employees, agents, and contractors and other governmental entities all or part of this Contract or any related Solicitation Response as System Agency deems necessary to complete the procurement process or comply with state or federal laws.

  • Access and Security Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.

Time is Money Join Law Insider Premium to draft better contracts faster.