Platform layers and security Sample Clauses

Platform layers and security. As was discussed earlier in this deliverable, the SOA system design approach facilitates distinct layers that operate and interact with each other. At the same time, the Security and Privacy layer is considered to be orthogonal to the SOA layers, hence performs its functionality concurrently on all system layers (see also Figure 1: The Miraculous-Life module architecture following the SOA approach of IBM). Hardware components The data gathered by the different sensors like the Kinect, Tablet (both including microphone), contact and bed sensor are handled anonymously throughout the system. The sensor data received by the workstation is associating to a user only by a PersonID that is provided by the KnowledgeBase. That way, without having access to the database, the data cannot be linked to e.g. a person name. Furthermore, the recorded audio data as well as the video data is not stored in the system. Instead, live data is processed immediately as soon as it is provided to the system and the outcome of this data processing, like specific artifacts or environmental information are stored in the database for later use.
AutoNDA by SimpleDocs

Related to Platform layers and security

  • Password and Security If you are issued or create any password or other credentials to access the Service or the portion of the Site through which the Service is offered, you agree not to give or make available your password or credentials to any unauthorized individuals, and you agree to be responsible for all actions taken by anyone to whom you have provided such credentials. If you believe that your credentials have been lost or stolen or that someone may attempt to use them to access the Site or Service without your consent, you must inform us at once at the telephone number provided in Section 6 of the General Terms above. See also Section 16 of the General Terms above regarding how the timeliness of your notice impacts your liability for unauthorized transfers.

  • Background Screening and Security 14 These General Contract Conditions supersede and replace in their entirety all General Contract Conditions, Form PUR 1000, which is incorporated by reference in Rule 60A-1.002, Florida Administrative Code (F.A.C.)

  • DATA HANDLING AND SECURITY It will always be the responsibility of the selected Contractor to manage data transfer and to secure all data appropriately during the project to prevent unauthorized access to all data, products, and deliverables.

  • Passwords and Security You acknowledge that you will be the only authorized user of Firstrade Securities Inc.'s Electronic Services for your account(s). You will be fully responsible for the confidentiality and use of your user name(s) and password (s) and you agree that you will be fully and solely responsible for all activities, including brokerage transactions, which arise from the use of your user name (s) or password(s) (except as provided for in paragraph 5 below). You also agree that you will be fully and solely responsible for all activities, including brokerage transactions, which arise from your authorization to link your brokerage account(s) to any other Firstrade Securities Inc. account(s). You acknowledge that we may tape record conversations with you, whether in person or by telephone, for purposes of verification and you consent to such recording.

  • Access and Security Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.

  • Data and Security If Contractor is granted access to Court Data, Confidential Information or Court Work Locations in the performance of the Work;

  • Privacy and Security (a) The Service Provider shall not transmit or store any AHS data outside the borders of Canada, nor transmit any AHS data in Canada to any party not specifically contemplated in this Agreement, without AHS’s prior written consent to each such data transmittal, which consent may be arbitrarily and unreasonably withheld.

  • Delivery and Security All Zee Group Channels must be delivered by the DTH Operator to subscribers in a securely encrypted manner and without any alteration. The transmission specifications and infrastructure allocated by DTH Operator in respect of the broadcast signals of the Zee Group Channels by DTH Operator to its Subscribers shall be no worse than that of the signal of any other channel within the same genre on its DTH Platform. ZEEL shall provide requisite number of Integrated Receivers and Decoders (IRDs) subject to payment of stipulated interest free security deposit per IRD as per the conditions laid down in the TRAI Regulations. Further, the DTH Operator shall confirm the details of Integrated Receiver Decoder (IRD’s) in respect of all such channels availed from ZEEL in the format provided in ANNEXURE XI. The Parties acknowledge and agree that in the event the DTH Operator intends to make any changes to the Addressable System’s security and encryption technology, including the encryption system (other than standard software upgrades which are deemed not to be material changes), during the Term, the DTH Operator shall intimate the same to ZEEL by submitting Form for Change in Addressable Systems which is made available on ZEEL’s Website.

  • Safety and Security Contractor is responsible for maintaining safety in the performance of this Contract. Contractor shall be responsible for complying with the District’s rules and regulations pertaining to safety, security, and driving on school grounds, particularly when children are present.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

Time is Money Join Law Insider Premium to draft better contracts faster.