Encryption Technology Sample Clauses

Encryption Technology. Provider and Investigator undertake to protect Sponsor Confidential Information (including but not limited to patent- relevant, scientific or technical information) against unauthorized access by third parties. If Sponsor Confidential Information is communicated via Internet Mail, use of Internet Mail Encryption Technology is compulsory (for direct communication between the Parties, Sponsor provides for a suitable technology at xxxx://xxxxxx.xxxxxxxxxx- xxxxxxxxx.xxx free of charge).
AutoNDA by SimpleDocs
Encryption Technology. The Company's Business as currently conducted complies with all U.S. applicable Laws, rules and regulations regarding encryption technology, including, without limitation, the import and export thereof. All CCAT's received by the Company are listed on Section 5.13(m) of the Company Disclosure Schedule.
Encryption Technology. The Receiving Party undertakes to protect Confidential Information (including but not limited to patent-relevant, scientific or technical information) against unauthorized access by third parties. If Confidential Information is communicated via Internet Mail, use of Internet Mail Encryption Technology is compulsory (for direct communication between the Parties, BOEHRINGER provides for a suitable technology at xxxx://xxxxxx.xxxxxxxxxx-xxxxxxxxx.xxx free of charge).
Encryption Technology. The Company Business as currently conducted and as currently proposed to be conducted complies with all Applicable Laws, rules and regulations, whether domestic or foreign, regarding encryption technology, including, without limitation, the import and export thereof.
Encryption Technology. The Bank uses encryption technology to secure your connection. When you go to the Bank's website, you will see a secure padlock icon displayed if you have established a secure connection with the Bank. When the secure padlock icon properly displays, the information passed between your computer and the online banking server is encrypted in an effort to protect your private information. If you do not see a secure padlock icon, the website you have found may be a copycat website that was created by a fraudster to obtain your personal information. Do not input your username, password, answers to security questions or any other personal information. Close the Internet browser and immediately contact the Bank by telephone.
Encryption Technology. At least 128-bit encryption technology or its equivalent. - Individual User IDs and Passwords. Each person accessing the Business Online Service must have a User ID and individual Password. - Tokens. When our ACH Origination Service, Wire Transfer Service and/or Bill Payment Service are approved for use by you, an additional required security procedure incorporates use of a separate security device or token (“Token”) which generates a One-Time-Password for log-in functionality. A Token provides an additional layer of security and will be issued to authorized user(s) for use in gaining access to the above-described features and/or modules associated with the Services. Tokens may also be made available to you for use with other features of the Services upon request.
Encryption Technology. Institution and Investigator undertake to protect Sponsor Confidential Information (including but not limited to patent- relevant, scientific or technical information) against unauthorized access by third parties. If Sponsor Confidential Information is communicated via Internet Mail, use of Internet Mail Encryption Technology is compulsory (for direct communication between the Parties, Sponsor provides for a suitable technology at free of charge). a/nebo Zkoušejícího a/nebo Personálu Klinického hodnocení nebo jiných osob účastnících se Klinického hodnocení, (iii) na informace, které byly sděleny Zdravotnickému zařízení a/nebo Zkoušejícímu z jiného zdroje, který není vázán povinností mlčenlivosti, a které nebyly přímo ani nepřímo obdrženy od Zadavatele nebo jeho Spřízněných osob nebo (iv) na informace, které musí být zpřístupněny dle Příslušných právních předpisů k předkládání žádostí nebo podání u IRB/EC nebo u příslušného regulačního orgánu nebo k jiným jednáním s IRB/EC nebo s příslušnými regulačními orgány v souvislosti s Klinickým hodnocením, avšak s tím, že tyto informace budou sděleny pouze v důvodně potřebném rozsahu, (v) na informace, jejichž zpřístupnění je požadováno nařízením příslušného soudu, pokud Zdravotnické zařízení a/nebo Zkoušející neprodleně předem upozorní Zadavatele na tuto povinnost a na informace, které mají být sděleny, a že budou na požádání plně spolupracovat se Zadavatelem při zachování důvěrné povahy takových informací prostřednictvím podání návrhu na vydání ochranného nařízení nebo na podobný právní nástroj. .
AutoNDA by SimpleDocs
Encryption Technology. 31 2.38 Hart-Xxxxx-Xxxxxx Xxxpliance...................................................................31 2.39 Grants.........................................................................................31
Encryption Technology. The Company's business as currently conducted and as currently proposed to be conducted does not involve the use or development of, or engagement in, encryption technology, and the Company's business as currently conducted and as currently proposed to be conducted does not require the Company to obtain a license from the Israeli Ministry of Defense or an authorized body thereof pursuant to Section 2(a) of the Control of Products and Services Declaration (Engagement in Encryption), 1974, as amended.
Encryption Technology. The Company Products do not include or use any encryption technology.
Time is Money Join Law Insider Premium to draft better contracts faster.