Information and Communication Technology Products that Use Cryptography Sample Clauses

Information and Communication Technology Products that Use Cryptography. The Parties affirm their level of commitments relating to Information and Communication Technology products that use cryptography, in particular, but not exclusively: 1. This section shall apply to information and communication technology (ICT) products that use cryptography.1 F/n 1: For greater certainty, for the purposes of this section, a “product” is a good and does not include a financial instrument. 2. For the purposes of this section:
AutoNDA by SimpleDocs
Information and Communication Technology Products that Use Cryptography. 1. For the purposes of this Article:
Information and Communication Technology Products that Use Cryptography. 1. This Article shall apply to information and communication technology (ICT) products that use cryptography.10ter 2. For the purposes of this Article: cryptographic algorithm or cipher means a mathematical procedure or formula for combining a key with plaintext to create a ciphertext; and 3. With respect to a product that uses cryptography and is designed for commercial applications, no Party shall impose or maintain a technical regulation or conformity assessment procedure that requires a manufacturer or supplier of the product, as a condition of the manufacture, sale, distribution, import or use of the product, to: (a) transfer or provide access to a particular technology, production process or other information, for example, a private key or other secret parameter, algorithm specification or other design detail, that is proprietary to the manufacturer or supplier and relates to the cryptography in the product, to the Party or a person in the Party’s territory; (b) partner with a person in its territory; or (c) use or integrate a particular cryptographic algorithm or cipher, other than where the manufacture, sale, distribution, import or use of the product is by or for the government of the Party. 4. Paragraph 3 shall not apply to: (a) requirements that a Party adopts or maintains relating to access to networks that are owned or controlled by the government of that Party, including those of central banks; or (b) measures taken by a Party pursuant to supervisory, investigatory or examination authority relating to financial institutions or markets. 5. For greater certainty, this Article shall not be construed to prevent a Party’s law enforcement authorities from requiring service suppliers using encryption they control to provide, pursuant to that Party’s legal procedures, unencrypted communications.” “10ter For greater certainty, for the purposes of this Article, a “product” is a good and does not include a financial instrument.”
Information and Communication Technology Products that Use Cryptography. 1. For the purposes of this Article: cryptographic algorithm or cipher means a mathematical procedure or formula for combining a key with plaintext to create a ciphertext;
Information and Communication Technology Products that Use Cryptography. 1. For the purposes of this Article: cryptographic algorithm or cipher means a mathematical procedure or formula for combining a key with plaintext to create a ciphertext; 2. This Article shall apply to information and communication technology products that use cryptography.14-10 3. With respect to a product that uses cryptography and is designed for commercial applications, neither Party shall impose or maintain a technical regulation or conformity assessment procedure that requires a manufacturer or supplier of the product, as a condition of the manufacture, sale, distribution, import or use of the product, to: (a) transfer or provide access to a particular technology, production process or other information, for example, a private key or other secret parameter, algorithm specification or other design detail, that is proprietary to the manufacturer or supplier and relates to the cryptography in the product, to the Party or a person in the Party’s territory; (b) partner with a person in its territory; or (c) use or integrate a particular cryptographic algorithm or cipher, other than where the manufacture, sale, distribution, import or use of the product is by or for the government of the Party.

Related to Information and Communication Technology Products that Use Cryptography

  • Information Technology The following applies to all contracts for information technology commodities and contractual services. “Information technology” is defined in section 287.012(15), F.S., to have the same meaning as provided in section 282.0041, F.S.

  • Information and communication The Parties shall support the development of modern methods of information handling, including the media, and stimulate the effective mutual exchange of information. Priority shall be given to programmes aimed at providing the general public with basic information about the Community and the Republic of Azerbaijan, including, where possible, access to databases, in full respect of intellectual property rights.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes. 11.2 We may (i) compile statistical and other information related to the performance, operation and use of the Services, and (ii) use data from the Services in aggregated form for security and operations management, to create statistical analyses, and for research and development purposes (clauses i and ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly available; however, Service Analyses will not incorporate Your Content, Personal Data or Confidential Information in a form that could serve to identify You or any individual. We retain all intellectual property rights in Service Analyses. 11.3 We may provide You with the ability to obtain certain Oracle Software (as defined below) for use with the Services. If we provide Oracle Software to You and do not specify separate terms for such software, then such Oracle Software is provided as part of the Services and You have the non-exclusive, worldwide, limited right to use such Oracle Software, subject to the terms of this Agreement and Your order (except for separately licensed elements of the Oracle Software, which separately licensed elements are governed by the applicable separate terms), solely to facilitate Your use of the Services. You may allow Your Users to use the Oracle Software for this purpose, and You are responsible for their compliance with the license terms. Your right to use any Oracle Software will terminate upon the earlier of our notice (by web posting or otherwise) or the end of the Services associated with the Oracle Software. Notwithstanding the foregoing, if Oracle Software is licensed to You under separate terms, then Your use of such software is governed by the separate terms. Your right to use any part of the Oracle Software that is licensed under the separate terms is not restricted in any way by this Agreement.

  • Sales Material, Information and Trademarks 6.1 For purposes of this Section 6, “Sales literature or other Promotional material” includes, but is not limited to, portions of the following that use any logo or other trademark related to the Trust, or Underwriter or its affiliates, or refer to the Trust: advertisements (such as material published or designed for use in a newspaper, magazine or other periodical, radio, television, telephone or tape recording, videotape display, signs or billboards, motion pictures, electronic communication or other public media), sales literature (i.e., any written communication distributed or made generally available to customers or the public, including brochures, circulars, research reports, market letters, form letters, seminar texts, reprints or excerpts or any other advertisement, sales literature or published article or electronic communication), educational or training materials or other communications distributed or made generally available to some or all agents or employees in any media, and disclosure documents, shareholder reports and proxy materials. 6.2 You shall furnish, or cause to be furnished to us or our designee, at least one complete copy of each registration statement, prospectus, statement of additional information, private placement memorandum, retirement plan disclosure information or other disclosure documents or similar information, as applicable (collectively “Disclosure Documents”), as well as any report, solicitation for voting instructions, Sales literature or other Promotional materials, and all amendments to any of the above that relate to the Contracts or the Accounts prior to its first use. You shall furnish, or shall cause to be furnished, to us or our designee each piece of Sales literature or other Promotional material in which the Trust or an Adviser is named, at least fifteen (15) Business Days prior to its proposed use. No such material shall be used unless we or our designee approve such material and its proposed use. 6.3 You and your agents shall not give any information or make any representations or statements on behalf of the Trust or concerning the Trust, the Underwriter or an Adviser, other than information or representations contained in and accurately derived from the registration statement or prospectus for the Trust shares (as such registration statement and prospectus may be amended or supplemented from time to time), annual and semi-annual reports of the Trust, Trust-sponsored proxy statements, or in Sales literature or other Promotional material approved by the Trust or its designee, except as required by legal process or regulatory authorities or with the written permission of the Trust or its designee. You shall send us a complete copy of each Disclosure Document and item of Sales literature or other Promotional materials in its final form within twenty (20) days of its first use. 6.4 We shall not give any information or make any representations or statements on behalf of you or concerning you, the Accounts or the Contracts other than information or representations, including naming you as a Trust shareholder, contained in and accurately derived from Disclosure Documents for the Contracts (as such Disclosure Documents may be amended or supplemented from time to time), or in materials approved by you for distribution, including Sales literature or other Promotional materials, except as required by legal process or regulatory authorities or with your written permission. 6.5 Except as provided in Section 6.2, you shall not use any designation comprised in whole or part of the names or marks “Franklin” or “Xxxxxxxxx” or any logo or other trademark relating to the Trust or the Underwriter without prior written consent, and upon termination of this Agreement for any reason, you shall cease all use of any such name or xxxx as soon as reasonably practicable. 6.6 You shall furnish to us ten (10) Business Days prior to its first submission to the SEC or its staff, any request or filing for no-action assurance or exemptive relief naming, pertaining to, or affecting, the Trust, the Underwriter or any of the Portfolios. 6.7 You agree that any posting of Portfolio prospectuses on your website will result in the Portfolio prospectuses: (i) appearing identical to the hard copy printed version or .pdf format file provided to you by us (except that you may reformat .pdf format prospectus files in order to delete blank pages and to insert .pdf format prospectus supplement files provided by us to you); (ii) being clearly associated with the particular Contracts in which they are available and posted in close proximity to the applicable Contract prospectuses; (iii) having no less prominence than prospectuses of any other underlying funds available under the Contracts; and (iv) being used in an authorized manner. Notwithstanding the above, you understand and agree that you are responsible for ensuring that participation in the Portfolios, and any website posting, or other use, of the Portfolio prospectuses is in compliance with this Agreement and applicable state and federal securities and insurance laws and regulations, including as they relate to paper or electronic use of fund prospectuses. The format of such presentation, the script and layout for any website that mentions the Trust, the Underwriter, an Adviser or the Portfolios shall be routed to us as sales literature or other promotional materials, pursuant to Section 6 of this Agreement. In addition, you agree to be solely responsible for maintaining and updating the Portfolio prospectuses’ PDF files (including prospectus supplements) and removing and/or replacing promptly any outdated prospectuses, as necessary, ensuring that any accompanying instructions by us, for using or stopping use are followed. You agree to designate and make available to us a person to act as a single point of communication contact for these purposes. We are not responsible for any additional costs or additional liabilities that may be incurred as a result of your election to place the Portfolio prospectuses on your website. We reserve the right to revoke this authorization, at any time and for any reason, although we may instead make our authorization subject to new procedures. 6.8 Each of your and your distributor’s registered representatives, agents, independent contractors and employees, as applicable, will have access to our websites at xxxxxxxxxxxxxxxxx.xxx, and such other URLs through which we may permit you to conduct business concerning the Portfolios from time to time (referred to collectively as the “Site”) as provided herein: (i) upon registration by such individual on a Site, (ii) if you cause a Site Access Request Form (an “Access Form”) to be signed by your authorized supervisory personnel and submitted to us, as a Schedule to, and legally a part of, this Agreement, or (iii) if you provide such individual with the necessary access codes or other information necessary to access the Site through any generic or firm-wide authorization we may grant you from time to time. Upon receipt by us of a completed registration submitted by an individual through the Site or a signed Access Form referencing such individual, we shall be entitled to rely upon the representations contained therein as if you had made them directly hereunder and we will issue a user identification, express number and/or password (collectively, “Access Code”). Any person to whom we issue an Access Code or to whom you provide the necessary Access Codes or other information necessary to access the Site through any generic or firm-wide authorization we may grant you from time to time shall be an “Authorized User.” We shall be entitled to assume that such person validly represents you and that all instructions received from such person are authorized, in which case such person will have access to the Site, including all services and information to which you are authorized to access on the Site. All inquiries and actions initiated by you (including your Authorized Users) are your responsibility, are at your risk and are subject to our review and approval (which could cause a delay in processing). You agree that we do not have a duty to question information or instructions you (including Authorized Users) give to us under this Agreement, and that we are entitled to treat as authorized, and act upon, any such instructions and information you submit to us. You agree to take all reasonable measures to prevent any individual other than an Authorized User from obtaining access to the Site. You agree to inform us if you wish to restrict or revoke the access of any individual Access Code. If you become aware of any loss or theft or unauthorized use of any Access Code, you agree to contact us immediately. You also agree to monitor your (including Authorized Users’) use of the Site to ensure the terms of this Agreement are followed. You also agree that you will comply with all policies and agreements concerning Site usage, including without limitation the Terms of Use Agreement(s) posted on the Site (“Site Terms”), as may be revised and reposted on the Site from time to time, and those Site Terms (as in effect from time to time) are a part of this Agreement. Your duties under this section are considered “services” required under the terms of this Agreement. You acknowledge that the Site is transmitted over the Internet on a reasonable efforts basis and we do not warrant or guarantee their accuracy, timeliness, completeness, reliability or non-infringement. Moreover, you acknowledge that the Site is provided for informational purposes only, and is not intended to comply with any requirements established by any regulatory or governmental agency.

  • Accessibility of Information Technology Contractor represents and warrants that any software/ hardware/ communications system/ equipment (collectively “technology”), if any, provided under this Agreement adheres to the standards and/or specifications as may be set forth in the Section 508 of the Rehabilitation Act of 1973 standards guide and is fully compliant with WCAG 2.0 AA standards for accessibility and compliant with any applicable FCC regulations. Technology that will be used on a mobile device must also be navigable with Voiceover on iOS devices in addition to meeting WCAG 2.0 level AA. If portions of the technology or user experience are alleged to be non-compliant or non- accessible at any point, District will provide Contractor with notice of such allegation and Contractor shall use its best efforts to make the technology compliant and accessible. If a state or federal department, office or regulatory agency, or if any other third party administrative agency or organization (“Claimants”), make a claim, allegation, initiates legal or regulatory process, or if a court finds or otherwise determines that technology is non-compliant or non-accessible, Contractor shall indemnify, defend and hold harmless the District from and against any and all such claims, allegations, liabilities, damages, penalties, fees, costs (including but not limited to reasonable attorneys’ fees), arising out of or related to Xxxxxxxxx’ claims. Contractor shall also fully indemnify District for the full cost of any user accommodation that is found to be necessary due to an identifiable lack of accessibility in the Contractor’s technology. If necessary, an independent 3rd party accessibility firm using POUR standards (Perceivable, Operable, Understandable and Robust) may be used to validate the accessibility of the technology.

  • Information and Data ‌ Upon request of the Union, the Employer agrees to furnish the Union with the following information: budgets for the Board of Regents; budgets for each College; public information used in the preparation of budgets as provided by law such as salaries; minutes of meetings of the Board; policies of the Board of Regents which apply to faculty members. Voluminous information shall be made available for inspection or will be provided at reproduction cost.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • PROHIBITION ON CERTAIN TELECOMMUNICATIONS AND VIDEO SURVEILLANCE SERVICES OR EQUIPMENT To the extent applicable, Supplier certifies that during the term of this Contract it will comply with applicable requirements of 2 C.F.R. § 200.216.

  • Product Information EPIZYME recognizes that by reason of, inter alia, EISAI’s status as an exclusive licensee in the EISAI Territory under this Agreement, EISAI has an interest in EPIZYME’s retention in confidence of certain information of EPIZYME. Accordingly, until the end of all Royalty Term(s) in the EISAI Territory, EPIZYME shall keep confidential, and not publish or otherwise disclose, and not use for any purpose other than to fulfill EPIZYME’s obligations, or exercise EPIZYME’s rights, hereunder any EPIZYME Know-How Controlled by EPIZYME or EPIZYME Collaboration Know-How, in each case that are primarily applicable to EZH2 or EZH2 Compounds (the “Product Information”), except to the extent (a) the Product Information is in the public domain through no fault of EPIZYME, (b) such disclosure or use is expressly permitted under Section 9.3, or (c) such disclosure or use is otherwise expressly permitted by the terms and conditions of this Agreement. For purposes of Section 9.3, each Party shall be deemed to be both the Disclosing Party and the Receiving Party with respect to Product Information. For clarification, the disclosure by EPIZYME to EISAI of Product Information shall not cause such Product Information to cease to be subject to the provisions of this Section 9.2 with respect to the use and disclosure of such Confidential Information by EPIZYME. In the event this Agreement is terminated pursuant to Article 12, this Section 9.2 shall have no continuing force or effect, but the Product Information, to the extent disclosed by EPIZYME to EISAI hereunder, shall continue to be Confidential Information of EPIZYME, subject to the terms of Sections 9.1 and 9.3 for purposes of the surviving provisions of this Agreement. Each Party shall be responsible for compliance by its Affiliates, and its and its Affiliates’ respective officers, directors, employees and agents, with the provisions of Section 9.1 and this Section 9.2.

  • Technology Research Analyst Job# 1810 General Characteristics

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!