Evolution of the Sample Clauses

Evolution of the. “Phishing problem” size The following statistics summarize the phishing phenomenon evolution, extent and consequences. In the USA alone, the number of clients that had lost money due to phishing attacks raised from 2.3 million in 2006 to 3.6 million in 2007 [122]. The estimated total losses for US victims were around U$ 3 billion per year in the mid-2000s [110][122]. In 2009, the largest fraction of complaints (21%) received by the Federal Trade Commission from Internet users was related to identity theft attributed to phishing emails, which resulted in a loss for consumers exceeding US$ 1.7 billion [122]. 49 For the sake of readability the text refers always to phishing, with the tacit inclusion of the other forms of *shing. In 2005 the estimated number of unique phishing messages per week was 33 million [113]. According to the Anti-Phishing Working Group, in the first half of 2009 more than 55,000 phishing attacks (corresponding to unique phishing websites) occurred. Between mid-2009 and 2011 a drop in the number of attacks was observed, due to the switch in the activities of the Avalanche gang50 (which is held responsible for many phishing campaigns) from traditional into malware-based phishing campaigns; in particular, Trojan horses were the most popular type of malware deployed by phishing attacks in 2011 [112]. Figure 23 - Phishing Rate in the Period 2012-2014 (Source: Symantec [22]) cloud file storage, or email accounts51. As shown in Figure 23 a significant reduction of the email phishing rate has been observed in recent years, whereas phishing emails are more and more used to phish for professional account logins such as banking details, LinkedIn accounts, Around 2005, the main consequences of phishing attacks were financial and productivity losses for corporations, with corporate espionage being a minor concern; in particular, such losses came also from attacks that loaded software to turn computers into zombies, enabling hackers to engage in other illegal activities like spamming and further phishing attacks [113]. Even worse, the cost of managing anti-phishing efforts and maintaining trust among users were deemed to be much larger than users' losses [109]. Subsequently, identity theft became another major concern, as it can damage personal reputation of victims, e.g., by reducing their credit rating or linking them to illegal activities [110][121]. A further consequence is the reduction of consumer trust in email-based business communication an...
AutoNDA by SimpleDocs

Related to Evolution of the

  • Duration of the processing of personal data Processing by the processor shall only take place for the duration specified in Annex II.

  • RECOGNITION OF THE UNION 1. The BCPSEA recognizes the BCTF as the sole and exclusive bargaining agent for the negotiation and administration of all terms and conditions of employment of all employees within the bargaining unit for which the BCTF is established as the bargaining agent pursuant to PELRA and subject to the provisions of this Collective Agreement.

  • DEVELOPMENT OR ASSISTANCE IN DEVELOPMENT OF SPECIFICATIONS REQUIREMENTS/ STATEMENTS OF WORK Firms and/or individuals that assisted in the development or drafting of the specifications, requirements, statements of work, or solicitation documents contained herein are excluded from competing for this solicitation. This shall not be applicable to firms and/or individuals providing responses to a publicly posted Request for Information (RFI) associated with a solicitation.

  • Description of the Services 1.1 The scope of the service to be rendered is described more fully in the Annexures and Schedules referred to below: ❑ Annexure A – Scope / Specification ❑ Annexure C – Pricing Schedule 2 DELIVERABLES AND COMPLETION DATE The Deliverables, due for completion by and governed by this Schedule 1. In the event that the Service Provider fails to meet the delivery dates as agreed, the following penalties will be imposed:

  • EVALUATION OF TEACHERS 1. All reports on the work of a teacher shall be in writing.

  • PROTECTION OF TEACHERS A. The Board recognizes its responsibility to give all reasonable support and assistance to teachers with respect to the maintenance of control and discipline in the classroom.

  • DESCRIPTION OF THE WORKS Employer’s objectives The scope of the request includes the recommended monthly preventative, quarterly and annual maintenance that needs to be conducted to ensure all areas of the airports are lit and compliant. It will include all the other adhoc request (labor rates) where required upon approval by the maintenance manager. The compliance will be based on the following: • Maintenance as per OEM • Organizational guidelines and codes of practice • OHS act 93 – Occupational Health and Safety • ISO 9001 – Quality management • ISO 14001 – Environmental Management • SANS 10142 – The wiring code • ICAO Annex 14 chapter 5. • ACSA Maintenance Procedure D060 024M This scope entails the maintenance and repair of LV systems and all lighting at Costal airports. In brief, maintenance involves servicing, repairs, and testing of lights and LV systems. This involves carrying out maintenance on electrical equipment such as LV DBs, electrical plant, wiring enclosures and luminaires and associated control systems, portable appliances and other specific electrical equipment, in order to minimize downtime, and ensure that the equipment performs at optimal levels and functions to specification at the specified areas. Servicing - performing routine preventive maintenance as prescribed by the original equipment manufacturer (OEM), ACSA’s planned maintenance routines, and applicable legal and design standards. Repairs – responding to breakdowns, callouts and restoring the equipment to safe working conditions on an as and when basis. Advisory – telephonically guiding airport electricians under emergency situations to ensure systems are safely shutdown or returned to service within stringent times. System Performance Test – Testing equipment performance against the OEM, ACSA, and statutory requirements for compliance and return to service purposes. Extent of the works The Contractor will be fully responsible for meeting all requirements in this document regarding the Works. For each piece of equipment, all work will be carried out to standards as required by the Original Equipment Manufacturer (OEM) as well as any applicable governing law and/or regulations. Where OEM standards differ from those required by this document the more stringent requirement shall apply. The Contractor will be fully responsible for obtaining (and keeping up to date with) said requirements. The proposed minimum scheduled maintenance activities can be found in annex H.

  • Outsourcing 28.1. The Company provides its Clients with trading services using an internet based trading system. The Company has outsourced the development, physical hosting, maintenance and updating of its online Trading Platform to a foreign entity. The Company’s Clients will not have any direct contact with this entity and the Company will take all reasonable steps to ensure the security of all the data regarding the identity of its Clients. The Client hereby acknowledges and accepts the fact that the Company outsources such activities.

  • Termination of Therapy Therapist reserves the right to terminate therapy at his/her discretion. Reasons for termination include, but are not limited to, untimely payment of fees, failure to comply with treatment recommendations, conflicts of interest, failure to participate in therapy, Patient needs are outside of Therapist’s scope of competence or practice, or Patient is not making adequate progress in therapy. Patient has the right to terminate therapy at his/her discretion. Upon either party’s decision to terminate therapy, Therapist will generally recommend that Patient participate in at least one, or possibly more, termination sessions. These sessions are intended to facilitate a positive termination experience and give both parties an opportunity to reflect on the work that has been done. Therapist will also attempt to ensure a smooth transition to another therapist by offering referrals to Patient.

  • Telemedicine Services This plan covers clinically appropriate telemedicine services when the service is provided via remote access through an on-line service or other interactive audio and video telecommunications system in accordance with R.I. General Law § 27-81-1. Clinically appropriate telemedicine services may be obtained from a network provider, and from our designated telemedicine service provider. When you seek telemedicine services from our designated telemedicine service provider, the amount you pay is listed in the Summary of Medical Benefits. When you receive a covered healthcare service from a network provider via remote access, the amount you pay depends on the covered healthcare service you receive, as indicated in the Summary of Medical Benefits. For information about telemedicine services, our designated telemedicine service provider, and how to access telemedicine services, please visit our website or contact our Customer Service Department.

Time is Money Join Law Insider Premium to draft better contracts faster.