Maintaining Security. You are responsible for all use of the Products and Services associated with your copy of the Products and Services.
Maintaining Security. YOU ACKNOWLEDGE THAT MAINTAINING THE HIGHEST LEVEL OF PROTECTION AVAILABLE FROM TRIDIUM AGAINST UNAUTHORIZED ACCESS TO THE LICENSED MATERIALS BY A THIRD PARTY REQUIRES PROMPT INSTALLATION OF ALL SECURITY UPDATES ISSUED BY TRIDIUM, AND THAT YOUR FAILURE TO DO SO MAY LEAVE THE LICENSED MATERIALS AND DATA AND DEVICES CONNECTED THROUGH THE LICENSED MATERIALS EXPOSED TO SUCH ACCESS.
Maintaining Security a. Each Participant and Subscriber shall be made aware that it is essential to maintain the security of the access devices issued to such persons in order to prevent their unauthorized use by any person not so authorized. Participants and Subscribers shall be prohibited from providing access codes to other Participants and Subscribers who have neglected to purchase access to the lockbox system, however, access to listed properties secured by an MLS lockbox device must still be granted either by the listing agent accompanying the showing agent, client, or customer, or by making a physical key available, or by some other means.
b. Participants and Subscribers duly leasing an MLS lockbox device shall:
(1) Keep the access device in the Participant/Subscriber’s possession or in a safe place at all times.
(2) Not allow his or her personal identification (PIN) to be attached to the access device or disclosed to any third party.
(3) Not loan the access device to any person for any purpose whatsoever, or to permit the access device be used for any purpose by any other person.
(4) Not duplicate the access device or allow any person to do so.
(5) Not assign, transfer, or pledge the rights of the Participant/Subscriber in connection with the use of the access device.
(6) Notify the MLS within three (3) days of the loss or theft of an access device. The Participant and/or Subscriber shall sign and deliver a statement to the MLS with respect to the circumstances surrounding the loss or theft of any access device. The MLS shall charge for the replacement of any access device which is lost or damaged.
(7) Follow all additional security procedures as reasonably specified by the MLS.
Maintaining Security. If at any time after the Effective Date of this Agreement, Standard & Poor's, Xxxxx'x or another nationally recognized firm downgrades the credit rating to below the Minimum Credit Rating of the financial institution that issued the letter of credit pursuant to Section 18.1 (Security) above, then Supplier shall (i) provide Buyer with written notice of such downgrade within two (2) Business Days of Supplier being notified of any such downgrade, but not to exceed thirty (30) days from such downgrade and (ii) cause a replacement letter of credit satisfying the conditions of Section 18.1.1 to be issued in favor of Buyer within seven (7) days of such downgrade. In the event such a downgrade also constitutes an Event of Default pursuant to Section 25 (Default and Remedies); the requirements of this Section are in addition to, and not in lieu of, the requirements of Section 25 (Default and Remedies).
Maintaining Security. Yamana shall do all such further acts and things as Northern Orion may from time to time reasonably require to maintain and preserve the security interest in the Collateral created by the Security Agreement as a valid first perfected security interest therein, subject only to Permitted Liens and prior to the payment therefor, the rights of withdrawal arising under Section 95 of the Securities Act (Ontario) in respect of any Pledged Shares taken up by Yamana pursuant to the Meridian Offer;
Maintaining Security. If at any time after the Effective Date of this Agreement, Standard & Poor's, Xxxxx'x or another nationally recognized firm downgrades the Credit Rating of the financial institution issuing a letter of credit pursuant to this Agreement to below the Minimum Credit Rating, then Supplier shall (a) provide Buyer with written notice of such downgrade within two (2) Business Days of Supplier being notified of any such downgrade and (b) cause a replacement letter of credit satisfying the conditions of Section 18.3 to be issued in favor of Buyer within ten (10) Business Days of such downgrade. In the event such a downgrade also constitutes an Event of Default pursuant to Section 25 (Default and Remedies), the requirements of this Section 18.4 are in addition to, and not in lieu of, the provisions of Section 25 (Default and Remedies). Supplier shall take all necessary action and shall be in compliance with this Section 18 within fifteen (15) days of the downgrade.
Maintaining Security. YOU ACKNOWLEDGE AND AGREE THAT MAINTAINING THE HIGHEST LEVEL OF PROTECTION AVAILABLE FROM TRIDIUM AGAINST UNAUTHORIZED ACCESS TO THE LICENSED SOFTWARE BY A THIRD PARTY REQUIRES PROMPT INSTALLATION OF ALL SECURITY UPDATES ISSUED BY TRIDIUM, AND THAT YOUR FAILURE TO DO SO MAY LEAVE THE LICENSED SOFTWARE AND DATA AND DEVICES CONNECTED THROUGH THE LICENSED SOFTWARE EXPOSED TO SUCH ACCESS, AND YOU WILL BE FULLY RESPONSIBLE AND LIABLE FOR ANY AND ALL LOSSES AND DAMAGES RESULTING FROM SUCH FAILURE.
Maintaining Security. Check status of security software updates As necessary The supplier will verify that all updates are installed in a timely manner. Investigate any suspicious activity or unexpected software behaviour As necessary The supplier will investigate any activity that could be the result of malicious software or individuals, such as viruses or hacking attempts. Manage file and folder permissions As necessary Enforce password policies As necessary Create, manage and remove mailboxes including quota issues As necessary For example: Creating email addresses for new users Increasing mailbox size if required Mobile device management As necessary For example: Rolling out new apps to handsets Updating handset software The supplier will also provide reactive support services to the client. When the client encounters an issue with the IT system, it should raise this with the supplier. The supplier will then investigate the problem and respond appropriately. All support issues should be raised via email, or by office / mobile messages. It also ensures required information about the issue is captured efficiently, and that the supplier’s response times are measured fairly. Support requests raised by the client will be handled by three tiers of support:
Maintaining Security. (Security is a high priority. If you identify a security problem, you must notify the system administrator immediately. Do not show or identify the problem to others.)
Maintaining Security. To maintain security, users must:
a. Immediately report any security concerns (irresponsible use or potential compromise such as data breach, virus, unauthorized access) to the system administrator. Never demonstrate a security concern to users other than the system administrator.
b. Use only their own designated accounts; not share or allow others to access or use their accounts for any reason.
c. Keep all user IDs, passwords, and account information confidential, and take reasonable precautions to prevent others from obtaining this information. Passwords must be disclosed to the Superintendent or designee, including the system administrator, upon request.
d. If requested, provide registration and account information to the system administrator.
e. Not install any unauthorized software programs on the computer systems.
f. Log-off or lock devices that are left unattended for any duration.