Monitoring security Sample Clauses

Monitoring security. We reserve the right to take whatever action we deem necessary to preserve the security and reliable operation of our software as a service and you undertake that you will not do or permit anything to be done which will compromise our security. If: • we are unable to verify any information you provide to us; or • we reasonably believe that your activities pose a significant credit or fraud risk to us or our other customers, or may cause financial loss or legal liability for us, our other customers, or you.
AutoNDA by SimpleDocs
Monitoring security. Caseware Africa reserves the right to take whatever action it deems necessary to preserve the security and reliable operation of Caseware Africa software. Caseware Africa may suspend or terminate customer’s licence to use the relevant Caseware Africa software or its access to the Caseware Africa software if it reasonably believes that customer’s activities pose a significant credit or fraud risk to Caseware Africa or its other customers, or may cause financial loss or legal liability for Caseware Africa, its other customers, or customer. Where Caseware Africa terminates customer’s licence, it will be in accordance with the agreement, including notifying customer of its breach of Caseware Africa’s licencing terms.

Related to Monitoring security

  • Building Security Landlord may restrict access to and from the Premises and the Building outside of the ordinary business hours of the Building. Landlord may require identification of persons entering and leaving the Building during this period and, for this purpose, may issue Building passes to tenants of the Building.

  • REVERSE ENGINEERING & SECURITY You agree not to undertake any of the following actions:

  • Continuing Security This Security is a continuing security and will extend to the ultimate balance of the Secured Liabilities, regardless of any intermediate payment or discharge in whole or in part.

  • Tender Security 18.1 The Tenderer shall furnish as part of its Tender, either a Tender-Securing Declaration or a Tender Security, as specified in the TDS, in original form and, in the case of a Tender Security, in the amount and currency specified in the TDS.

  • Supervisory Control and Data Acquisition (SCADA) Capability The wind plant shall provide SCADA capability to transmit data and receive instructions from the ISO and/or the Connecting Transmission Owner for the Transmission District to which the wind generating plant will be interconnected, as applicable, to protect system reliability. The Connecting Transmission Owner for the Transmission District to which the wind generating plant will be interconnected and the wind plant Developer shall determine what SCADA information is essential for the proposed wind plant, taking into account the size of the plant and its characteristics, location, and importance in maintaining generation resource adequacy and transmission system reliability in its area.

  • Cyber Security Insurance for loss to the Owner due to data security and privacy breach, including costs of investigating a potential or actual breach of confidential or private information. (Indicate applicable limits of coverage or other conditions in the fill point below.) « »

  • Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

  • System Security (a) If any party hereto is given access to the other party’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party given access (the “Availed Party”) shall comply with all of the other party’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other party. The Availed Party shall access and use only those Systems of the other party for which it has been granted the right to access and use.

  • Provision of Interconnection Financial Security The Interconnection Customer is obligated to provide all necessary Interconnection Financial Security required under Section 11 of the GIDAP in a manner acceptable under Section 11 of the GIDAP. Failure by the Interconnection Customer to timely satisfy the GIDAP’s requirements for the provision of Interconnection Financial Security shall be deemed a breach of this Agreement and a condition of Default of this Agreement.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!