Impersonation or forgery attack Sample Clauses

Impersonation or forgery attack. The proposed scheme is immune to impersonation attack, since no Ȃ may impersonate as either user, or CSj or ESP. The user and CSj entities, both share secrets qi and Xxx with ESP. Until, these shared secrets are exposed to the Ȃ, the latter could not launch any kind of impersonation attack. If Ȃ attempts to replay or modify parameters to impersonate as a user, this attempt is unmasked at ESP’s end while verifying parameters NIDi, B1, B2 and location identifiers i.e. LRIu against LRICS. Similarly, if Ȃ impersonates as ESP, this unauthorized attempt is unmasked upon the verification of B4 = h(IDu || SKc || SKp ||qi || NIDnew*).
AutoNDA by SimpleDocs

Related to Impersonation or forgery attack

  • Malicious Use of Orphan Glue Records Registry Operator shall take action to remove orphan glue records (as defined at xxxx://xxx.xxxxx.xxx/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct.

  • COUNTERFEIT PARTS Seller represents and warrants that it has policies and procedures in place to ensure that none of the Goods furnished under this Order are “suspect/counterfeit parts” and certifies, to the best of its knowledge and belief that no such “suspect/counterfeit parts” have been or are being furnished to Buyer by Seller. “Suspect/counterfeit parts” are parts that may be of new manufacture, but are misleadingly labeled to provide the impression they are of a different class or quality or from a different source than is actually the case. They also include refurbished parts, complete with false labeling, that are represented as new parts or any parts that are designated as suspect by the U.S. Government, such as parts listed in alerts published by the Defense Contract Management Agency under the Government-Industry Data Exchange Program (GIDEP). Parts furnished under this Order shall be purchased directly from the Original Component Manufacturers (“OCM”)/Original Equipment Manufacturers (“OEM”) or through the OCM/OEMs Franchised Distributor. Seller shall maintain documented systems (policy, procedure, or other documented approach) that provides for prior notification to Buyer and Buyer’s written approval before parts or components are procured from sources other than OCM, OEM, or OCM or OEM’s Franchised Distributor. Seller shall provide copies of such documentation for its system upon Buyer’s request. Seller’s systems shall be consistent with applicable industry standard, for the detection and avoidance of counterfeit electronic parts, including flowing down requirements to subcontractors. If Buyer reasonably determines that Seller has supplied suspect/counterfeit parts to Buyer, Buyer shall promptly notify Seller and Seller shall immediately replace the suspect/counterfeit parts with parts acceptable to Buyer. Notwithstanding any other provision contained herein, Seller shall be liable for all costs incurred by Buyer to inspect, remove, and replace the suspect/counterfeit parts, including without limitation Buyer’s external and internal costs of removing such a counterfeit parts, of reinserting replacement parts and of any testing necessitated by the reinstallation of Seller’s goods after counterfeit parts have been exchanged. In addition, Buyer may unilaterally terminate this order for convenience depending on the impact of the delivery of suspect/counterfeit parts on the Seller’s overall performance on this order. Seller’s warranty against suspect/counterfeit parts shall survive any termination or expiration of this Order.

  • Offences 46.1. The Contractor must not commit or attempt to commit any offence:

  • NO EXCLUDED NATION OR TERRORIST ORGANIZATION CERTIFICATION As required by Chapter 2252 of the Texas Government Code the Contractor must certify that it is not a company engaged in active business operations with Sudan, Iran, or a foreign terrorist organization – specifically, any company identified on a list prepared and maintained by the Texas Comptroller under Texas Government Code §§806.051, 807.051, or 2252.153. (A company that the U.S. Government affirmatively declares to be excluded from its federal sanctions regime relating to Sudan, Iran, or any federal sanctions regime relating to a foreign terrorist organization is not subject to the contract prohibition.)

  • Program Fraud and False or Fraudulent Statements or Related Acts (A) The CONTRACTOR acknowledges that the provisions of the Program Fraud Civil Remedies Act of 1986, as amended, 31 U.S.C. § 3801 et seq . and U.S. DOT regulations, "Program Fraud Civil Remedies," 49 C.F.R. Part 31, apply to its actions pertaining to this Project. Upon execution of the underlying contract, the CONTRACTOR certifies or affirms the truthfulness and accuracy of any statement it has made, it makes, it may make, or causes to be made, pertaining to the underlying contract or the FTA assisted project for which this contract work is being performed. In addition to other penalties that may be applicable, the CONTRACTOR further acknowledges that if it makes, or causes to be made, a false, fictitious, or fraudulent claim, statement, submission, or certification, the Federal Government reserves the right to impose the penalties of the Program Fraud Civil Remedies Act of 1986 on the CONTRACTOR to the extent the Federal Government deems appropriate.

  • No Weapons or Firearms Except as provided by statute and District policy, all District properties are weapons- and firearms-free zones; Contractor is prohibited from possessing on its persons or in its vehicles any weapons or firearms while on District property.

  • COUNTERFEIT GOODS a. Seller shall not furnish Counterfeit Goods to Buyer, defined as Goods or separately-identifiable items or components of Goods that: (i) are an unauthorized copy or substitute of an Original Equipment Manufacturer or Original Component Manufacturer (collectively, “OEM”) item; (ii) are not traceable to an OEM sufficient to ensure authenticity in OEM design and manufacture; (iii) do not contain proper external or internal materials or components required by the OEM or are not constructed in accordance with OEM design; (iv) have been re- worked, re-marked, re-labeled, repaired, refurbished, or otherwise modified from OEM design but not disclosed as such or are represented as OEM authentic or new; or (v) have not passed successfully all OEM required testing, verification, screening, and quality control processes. Notwithstanding the foregoing, Goods or items that contain modifications, repairs, re-work, or re-marking as a result of Seller’s or its subcontractor’s design authority, material review procedures, quality control processes or parts management plans, and that have not been misrepresented or mismarked without legal right to do so, shall not be deemed Counterfeit Goods. Counterfeit Goods shall be deemed nonconforming to this Contract.

  • Data Security and Unauthorized Data Release The Requester and Approved Users, including the Requester’s IT Director, acknowledge NIH’s expectation that they have reviewed and agree to manage the requested controlled-access dataset(s) and any Data Derivatives of controlled-access datasets according to NIH’s expectations set forth in the current NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy and the Requester’s IT security requirements and policies. The Requester, including the Requester’s IT Director, agree that the Requester’s IT security requirements and policies are sufficient to protect the confidentiality and integrity of the NIH controlled-access data entrusted to the Requester. If approved by NIH to use cloud computing for the proposed research project, as outlined in the Research and Cloud Computing Use Statements of the Data Access Request, the Requester acknowledges that the IT Director has reviewed and understands the cloud computing guidelines in the NIH Security Best Practices for Controlled-Access Data Subject to the NIH GDS Policy. The Requester and PI agree to notify the appropriate DAC(s) of any unauthorized data sharing, breaches of data security, or inadvertent data releases that may compromise data confidentiality within 24 hours of when the incident is identified. As permitted by law, notifications should include any known information regarding the incident and a general description of the activities or process in place to define and remediate the situation fully. Within 3 business days of the DAC notification, the Requester agrees to submit to the DAC(s) a detailed written report including the date and nature of the event, actions taken or to be taken to remediate the issue(s), and plans or processes developed to prevent further problems, including specific information on timelines anticipated for action. The Requester agrees to provide documentation verifying that the remediation plans have been implemented. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. All notifications and written reports of data security incidents and policy compliance violations should be sent to the DAC(s) indicated in the Addendum to this Agreement. NIH, or another entity designated by NIH may, as permitted by law, also investigate any data security incident or policy violation. Approved Users and their associates agree to support such investigations and provide information, within the limits of applicable local, state, tribal, and federal laws and regulations. In addition, Requester and Approved Users agree to work with the NIH to assure that plans and procedures that are developed to address identified problems are mutually acceptable and consistent with applicable law.

  • Assaults An employee who is assaulted while in the performance of assigned duties shall promptly report the assault to the Employer. The Employer shall promptly investigate the incident and render such assistance as necessary under the circumstances, including reporting and cooperating with law enforcement authorities.

  • COUNTERFEIT WORK (a) The following definitions apply to this clause:

Time is Money Join Law Insider Premium to draft better contracts faster.