Encryption Technology Sample Clauses

Encryption Technology. Institution and Investigator undertake to protect Sponsor Confidential Information (including but not limited to patent- relevant, scientific or technical information) against unauthorized access by third parties. If Sponsor Confidential Information is communicated via Internet Mail, use of Internet Mail Encryption Technology is compulsory (for direct communication between the Parties, Sponsor provides for a suitable technology at xxxx://xxxxxx.xxxxxxxxxx-xxxxxxxxx.xxx free of charge). 5.6
AutoNDA by SimpleDocs
Encryption Technology. The Company's Business as currently conducted complies with all U.S. applicable Laws, rules and regulations regarding encryption technology, including, without limitation, the import and export thereof. All CCAT's received by the Company are listed on Section 5.13(m) of the Company Disclosure Schedule.
Encryption Technology. The Receiving Party undertakes to protect Confidential Information (including but not limited to patent-relevant, scientific or technical information) against unauthorized access by third parties. If Confidential Information is communicated via Internet Mail, use of Internet Mail Encryption Technology is compulsory (for direct communication between the Parties, BOEHRINGER provides for a suitable technology at xxxx://xxxxxx.xxxxxxxxxx-xxxxxxxxx.xxx free of charge).
Encryption Technology. At least 128-bit encryption technology or its equivalent. - Individual User IDs and Passwords. Each person accessing the Business Online Service must have a User ID and individual Password. - Tokens. When our ACH Origination Service, Wire Transfer Service and/or Bill Payment Service are approved for use by you, an additional required security procedure incorporates use of a separate security device or token (“Token”) which generates a One-Time-Password for log-in functionality. A Token provides an additional layer of security and will be issued to authorized user(s) for use in gaining access to the above-described features and/or modules associated with the Services. Tokens may also be made available to you for use with other features of the Services upon request.
Encryption Technology. The Company Business as currently conducted and as currently proposed to be conducted complies with all Applicable Laws, rules and regulations, whether domestic or foreign, regarding encryption technology, including, without limitation, the import and export thereof.
Encryption Technology. 31 2.38 Hart-Xxxxx-Xxxxxx Xxxpliance...................................................................31 2.39 Grants.........................................................................................31
Encryption Technology. Institution and Investigator undertake to protect Sponsor Confidential Information (including but not limited to patent- 5.6
AutoNDA by SimpleDocs
Encryption Technology. The Bank uses encryption technology to secure your Business Online Banking connection. When you go to the Bank’s website, you will see a secure padlock icon displayed if you have established a secure connection with the Bank. When the secure padlock icon properly displays, the information passed between your computer and the online banking server is encrypted in an effort to protect your private information. If you do not see a secure padlock icon, the website you have found may be a copycat website that was created by a fraudster to obtain your personal information. Do not input your username, password, answers to security questions or any other personal information. Close the Internet browser and immediately contact the Bank by telephone.
Encryption Technology. The Bank uses encryption technology to secure your connection. When you go to the Bank's website, you will see a secure padlock icon displayed if you have established a secure connection with the Bank. When the secure padlock icon properly displays, the information passed between your computer and the online banking server is encrypted in an effort to protect your private information. If you do not see a secure padlock icon, the website you have found may be a copycat website that was created by a fraudster to obtain your personal information. Do not input your username, password, answers to security questions or any other personal information. Close the Internet browser and immediately contact the Bank by telephone.
Encryption Technology. The Company Products do not include or use any encryption technology.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!