EXTERNAL ENTITIES Sample Clauses

EXTERNAL ENTITIES. County and Contractor agree that if an External Entity licenses or otherwise purchases rights to digital aerial data pursuant to or based on the pricing and/or other terms set forth in this Agreement, (1) the prices for such data will be based on Exhibit C (Schedule for External
AutoNDA by SimpleDocs
EXTERNAL ENTITIES. Table 3 - External entities Name Description Interplay Application An application that is protected by the FogProtect system. Receives requests for reconfiguration. Cloud/Fog/IoT Platform Middleware that manages the Cloud, Fog, and IoT devices. Receives requests for reconfiguration/redeployment Sends monitoring data to the Monitoring component. Receives deployment requests from Security Orchestrator. Requests data access from Security Enabler. Monitoring Third-party component responsible for collecting data about configuration and performance of the computing continuum. Updates the “As is model” of the Computing Continuum and the Performance Data. Operator Human that supervises the system. Initiates adaptations. Can select adaptation, if the system cannot make a decision automatically. Vulnerability Detectors Third party tools that look for vulnerabilities in software that could be used by attackers and are therefore risk factors that should be taken into account when assessing risks to the system. Two types are used: active scanners that use (benign) attacks to detect vulnerabilities, and passive detectors that use security advisories to decide if the vulnerabilities they describe may be present. Sends data about vulnerabilities to the Sec Info & Event Acquisition. The components described in the previous subchapter are developed in FogProtect. In contrast, the components described in Table 3 are either third-party components that are important for the functionality of the system or they are actors which are necessary for the functionality of the system at run-time. The Application is protected by the FogProtect system. This application can be any application. Yet the security of the application benefits greatly if the application can run in a container. To fully leverage the advantages offered by FogProtect, an application can provide interfaces for monitoring and adaptation. But this is not necessary for the FogProtect system to protect the application and its data. The Cloud/Fog/IoT Platform is a kind of middleware. It is used for managing, encapsulating, and abstracting the infrastructure of the Computing Continuum and for deploying the application across the infrastructure. Part of the platform will be modified and extended by WP4, but basic functionality will be provided by third-party technology. The platform will receive requests for reconfiguration from the Adaptive Infrastructure Management, to perform adaptations and it will send monitoring dat...

Related to EXTERNAL ENTITIES

  • Public Entities If Contractor is a "public entity" within the meaning of the Colorado Governmental Immunity Act, §00-00-000, et seq., C.R.S. (the “GIA”), Contractor shall maintain, in lieu of the liability insurance requirements stated above, at all times during the term of this Contract such liability insurance, by commercial policy or self-insurance, as is necessary to meet its liabilities under the GIA. If a Subcontractor is a public entity within the meaning of the GIA, Contractor shall ensure that the Subcontractor maintain at all times during the terms of this Contract, in lieu of the liability insurance requirements stated above, such liability insurance, by commercial policy or self-insurance, as is necessary to meet the Subcontractor’s obligations under the GIA.

  • Internal Investigations (A) The parties recognize that Florida Highway Patrol personnel occupy a special place in American society. Therefore, it is understood that the state has the right to expect that a professional standard of conduct be adhered to by all Florida Highway Patrol personnel regardless of rank or assignment. Since internal investigations may be undertaken to inquire into complaints of Florida Highway Patrol misconduct, the state reserves the right to conduct such investigations to uncover the facts in each case, but expressly agrees to carefully guard and protect the rights and dignity of accused personnel. In the course of an internal investigation, the investigative methods employed will be consistent with the law (including but not limited to section 112.532, Florida Statutes) and this agreement; nothing in this agreement, however, shall be deemed to diminish the rights of employees under applicable law.

  • Entities If the undersigned is not an individual but an entity, the individual signing on behalf of such entity and the entity jointly and severally agree and certify that:

  • Governmental Entities 19.1 For those customers, which are government entities, provisions within this agreement will apply to the extent the agency is not legally barred from executing such provisions by State or Federal law. (Continued on Sheet No. 9.054) (Continued from Sheet No. 9.053.1)

  • Internal Use You will use the Services for Your own internal business, non-residential and non-personal use. You acknowledge and agree that You will not allow any third party, including Your vendors and service providers, to access or use the Services unless such third party is allowed access for the purpose of providing authorized customer support services or in connection with Your appropriate use of the Services for Your own business purposes.

  • INTERNAL MAIL a. The Association shall have access to the District internal mail service and employee mail boxes, free of charge, during regular business hours, as well as electronic mail service for communication to bargaining unit members.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!