Common use of Key Pair Generation Clause in Contracts

Key Pair Generation. Your Key Pair (Public and Private Keys) will be generated by You or Your ACME Client Software on Your systems. You will submit the corresponding Public Key to ISRG and it will be incorporated into Your Certificate. ISRG will not have access to Your Private Key. Your Private and Public Keys will remain Your property. We will use technical methods and protocols to verify that You have control over the subject Internet domain name. This verification is done solely to assist ISRG in determining whether to issue a Let’s Encrypt Certificate and is not a service being performed for Your benefit or on Your behalf.

Appears in 4 contracts

Samples: S Encrypt Subscriber Agreement, S Encrypt Subscriber Agreement, Subscriber Agreement

AutoNDA by SimpleDocs

Key Pair Generation. Your Key Pair (Public and Private Keys) will be generated by You or Your ACME Client Software on Your systems. You will submit the corresponding Public Key to ISRG and it will be incorporated into Your Certificate. ISRG will store Your Certificate in its Repository. ISRG will not have access to Your Private Key. Your Private and Public Keys will remain Your property. We will use technical methods and protocols to verify that You have control over the subject Internet domain name. This verification is done solely to assist ISRG in determining whether to issue a Let’s Encrypt Certificate and is not a service being performed for Your benefit or on Your behalf.

Appears in 4 contracts

Samples: Subscriber Agreement, Subscriber Agreement, ’s Encrypt Subscriber Agreement

AutoNDA by SimpleDocs

Key Pair Generation. Your Key Pair (Public and Private Keys) will be generated by You or Your ACME Client Software on Your systems. You will submit the corresponding Public Key to ISRG and it will be incorporated into Your Certificate. ISRG will store Your Certificate in its Repository. ISRG will not have access to Your Private Key. Your Private and Public Keys will remain Your property. We will use technical methods and protocols to verify that You have exclusive control over the subject Internet domain name. This verification is done solely to assist ISRG in determining whether to issue a Let’s Encrypt Certificate and is not a service being performed for Your benefit or on Your behalf.

Appears in 2 contracts

Samples: ’s Encrypt Subscriber Agreement, Subscriber Agreement

Time is Money Join Law Insider Premium to draft better contracts faster.