Identification of Cyber Threats Sample Clauses

Identification of Cyber Threats. If Public Agency identifies or otherwise becomes aware of any vulnerabilities or other Cyber Threats relating to the Deliverables for which Design/Builder has not released a Patch, Public Agency shall promptly notify Design/Builder of such vulnerability or other Cyber Threat(s) via the Design/Builder Report a Vulnerability page (xxxxx://xxx.xx.xxx/ww/en/work/support/cybersecurity/report-a-vulnerability.jsp#Public Agencies) and further provide Design/Builder with any reasonably requested information relating to such vulnerability (collectively, “Feedback”). Design/Builder shall have a non-exclusive, perpetual and irrevocable right to use, display, reproduce, modify, and distribute the Feedback (including any confidential information or intellectual property contained therein) in whole or part, including to analyze and fix the vulnerability, to create Patches or Updates for its Public Agencies, and to otherwise modify its Deliverables, in any manner without restrictions, and without any obligation of attribution or compensation to Public Agency; provided, however, Design/Builder shall not publicly disclose Public Agency’s name in connection with such use or the Feedback (unless Public Agency consents otherwise). By submitting Feedback, Public Agency represents and warrants to Design/Builder that Public Agency has all necessary rights in and to such Feedback and all information it contains, including to grant the rights to Design/Builder described herein, and that such Feedback does not infringe any proprietary or other rights of third parties or contain any unlawful information.
AutoNDA by SimpleDocs
Identification of Cyber Threats. If Customer identifies or otherwise becomes aware of any vulnerabilities or other Cyber Threats relating to the Products, Software, or Services for which Company has not released a Patch, Customer shall promptly notify Company of such vulnerability or other Cyber Threat(s)via the Company's Report a Vulnerability page (https:xxxxx.xx.xxx/ww/en/work/support/cybersecurity/report-a-vulnerability.jsp#Customers}and further provide Company with any reasonably requested information relating to such vulnerability (collectively, "Feedback"}.Company shall have a non-exclusive, perpetual and irrevocable right to use, display, reproduce, modify, and distribute the Feedback(including any confidential information or intellectual property contained therein} in whole or part, including to analyze and fix the vulnerability, to create Patches or Updates for its customers, and to otherwise modify its Products, Software, or Services, in any manner without restrictions, and without any obligation of attribution or compensation to Customer; provided, however, Company shall not publicly disclose Customer's name in connection with such use or the Feedback(unless Customer consents otherwise}. By submitting Feedback, Customer represents and warrants to Company that Customer has all necessary rights in and to such Feedback and all information it contains, including to grant the rights to Company described herein, and that such Feedback does not infringe any proprietary or other rights of third parties or contain any unlawful information.
Identification of Cyber Threats. If Customer identifies or otherwise becomes aware of any vulnerabilities or other Cyber Threats relating to the Deliverables for which ESCO has not released a Patch, Customer shall promptly notify ESCO of such vulnerability or other Cyber Threat(s) via the ESCO Report a Vulnerability page (xxxxx://xxx.xx.xxx/ww/en/work/support/cybersecurity/report-a- vulnerability.jsp#Customers) and further provide ESCO with any reasonably requested information relating to such vulnerability (collectively, “Feedback”). ESCO shall have a non-exclusive, perpetual and irrevocable right to use, display, reproduce, modify, and distribute the Feedback (including any confidential information or intellectual property contained therein) in whole or part, including to analyze and fix the vulnerability, to create Patches or Updates for its customers, and to otherwise modify its Deliverables, in any manner without restrictions, and without any obligation of attribution or compensation to Customer; provided, however, ESCO shall not publicly disclose Customer’s name in connection with such use or the Feedback (unless Customer consents otherwise). By submitting Feedback, Customer represents and warrants to ESCO that Customer has all necessary rights in and to such Feedback and all information it contains, including to grant the rights to ESCO described herein, and that such Feedback does not infringe any proprietary or other rights of third parties or contain any unlawful information.
Identification of Cyber Threats. If Owner identifies or otherwise becomes aware of any vulnerabilities or other Cyber Threats relating to the Products, Software, or Services for which Uniflair has not released a Patch, Owner shall promptly notify Uniflair of such vulnerability or other Cyber Threat(s) via the Schneider Report a Vulnerability page

Related to Identification of Cyber Threats

  • Identification of Goods Identification of the goods shall not be deemed to have been made until both Buyer and Seller have agreed that the goods in question are to be appropriate to the performance of this Agreement.

  • Certification Regarding Business with Certain Countries and Organizations Pursuant to Subchapter F, Chapter 2252, Texas Government Code, PROVIDER certifies it is not engaged in business with Iran, Sudan, or a foreign terrorist organization. PROVIDER acknowledges this Purchase Order may be terminated if this certification is or becomes inaccurate.

  • Certification Regarding Prohibition of Certain Terrorist Organizations (Tex Gov. Code 2270) Vendor certifies that Vendor is not a company identified on the Texas Comptroller’s list of companies known to have contracts with, or provide supplies or services to, a foreign organization designated as a Foreign Terrorist Organization by the U.S. Secretary of State. Does Vendor certify? Yes, Vendor certifies Certification Regarding Prohibition of Boycotting Israel (Tex. Gov. Code 2271) If (a) Vendor is not a sole proprietorship; (b) Vendor has ten (10) or more full-time employees; and (c) this Agreement or any agreement with a TIPS Member under this procurement has value of $100,000 or more, the following certification shall apply; otherwise, this certification is not required. Vendor certifies, where applicable, that neither the Vendor, nor any affiliate, subsidiary, or parent company of Vendor, if any, boycotts Israel, and Vendor agrees that Vendor and Vendor Companies will not boycott Israel during the term of this Agreement. For purposes of this Agreement, the term “boycott” shall mean and include refusing to deal with, terminating business activities with, or otherwise taking any action that is intended to penalize, inflict economic harm on, or limit commercial relations with Israel, or with a person or entity doing business in Israel or in an Israeli-controlled territory but does not include an action made for ordinary business purposes. When applicable, does Vendor certify? Yes, Vendor certifies 5 Certification Regarding Prohibition of Contracts with Certain Foreign-Owned Companies (Tex. Gov. 5 Code 2274) Certain public entities are prohibited from entering into a contract or other agreement relating to critical infrastructure that would grant Vendor direct or remote access to or control of critical infrastructure in this state, excluding access specifically allowed by a customer for product warranty and support purposes. Vendor certifies that neither it nor its parent company nor any affiliate of Vendor or its parent company, is (1) owned by or the majority of stock or other ownership interest of the company is held or controlled by individuals who are citizens of China, Iran, North Korea, Russia, or a designated country; (2) a company or other entity, including governmental entity, that is owned or controlled by citizens of or is directly controlled by the government of China, Iran, North Korea, Russia, or a designated country; or (3) headquartered in China, Iran, North Korea, Russia, or a designated country. For purposes of this certification, “critical infrastructure” means “a communication infrastructure system, cybersecurity system, electric grid, hazardous waste treatment system, or water treatment facility.” Vendor certifies that Vendor will not grant direct or remote access to or control of critical infrastructure, except for product warranty and support purposes, to prohibited individuals, companies, or entities, including governmental entities, owned, controlled, or headquartered in China, Iran, North Korea, Russia, or a designated country, as determined by the Governor. When applicable, does Vendor certify? Yes, Vendor certifies 5 Certification Regarding Prohibition of Discrimination Against Firearm and Ammunition Industries (Tex.

  • Identification Cards Identification (“ID”) cards are issued by Us for identification purposes only. Possession of any ID card confers no right to services or benefits under this Contract. To be entitled to such services or benefits, Your Premiums must be paid in full at the time that the services are sought to be received.

  • Contractor Certification regarding Business with Certain Countries and Organizations Pursuant to Subchapter F, Chapter 2252, Texas Government Code], Contractor certifies Contractor is not engaged in business with Iran, Sudan, or a foreign terrorist organization. Contractor acknowledges this Agreement may be terminated and payment withheld if this certification is inaccurate.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!