Platform Security. Securitize shall use commercially reasonable efforts consistent with industry standards to protect the physical security and electronic security of the Platform and other systems utilized to provide the Securitize Services, including but not limited to using up-to-date anti-virus, security and firewall technology commonly used in the industry. Issuer agrees that it, and shall ensure that its Affiliates and Authorized Participants, will not take actions that negatively affect the confidentiality, integrity, and availability of Securitize’s systems and information assets.
Platform Security. 7.1. If you are a Customer you acknowledge and agree that the provisions in your Terms and Conditions that apply to online payment system security apply to your use of the Platform and are incorporated herein by reference.
7.2. If you are a User you acknowledge and agree that:
(i) the security of your access to the Platform, including but not limited to the security and secrecy of your Access Methods, will at all times be your sole responsibility;
(ii) you have taken appropriate security measures to protect your Access Methods, computer systems and mobile devices;
(iii) your Access Methods are not the same as passwords that you use for other websites, applications or services or based on guessable information such as personal telephone number, birthday or other personal information.
7.3. In addition you agree that you will at all times maintain, appropriate protection against malicious software, including viruses, trojan horses, spyware, or any other computer code, files or programs, designed to disrupt, interrupt, disable, damage, destroy, limit the functionality of, infiltrate, or illicitly extract information from any device, software, system or telecommunications equipment.
Platform Security. Full Frame implements safeguards and security based on industry standards to protect Client Content. Aside from such industry standard safeguards, Full Frame can make no guarantees regarding any Platform security or any Client Content secured.
Platform Security. IPTechView implements administrative, physical, and technical safeguards for protection of the security, confidentiality and integrity of your information and all User Content. Those safeguards used or based on industry standards. Aside from such industry standard safeguards, IPTechView can make no guarantees regarding any Platform security or any User Content secured.
Platform Security. Secure Sockets Layer (SSL) is the standard security technology for creating an encrypted link between a web server and a browser. This link ensures that all data passed between the web server and browser remains private and integral. SSL is an industry standard and is used by millions of websites in the protection of their online transactions with their customers. WE employs SSL to protect all data transmitted between browser and web server. This technology protects confidential information (e.g., passwords, bid data, customer data) from being viewed or tampered with by unauthorized parties thus ensuring the integrity of our auction events. WORLD ENERGY SOLUTIONS PROPRIETORY INFORMATION WORLD ENERGY SOLUTIONS (GRAPHIC) FIGURE 11: WORLD ENERGY'S SSL CERTIFICATE SSL works by using a public key to encrypt data that's transferred over the SSL connection. WE utilizes strong encryption also known as 128-bit encryption. 128-bit encryption provides a significantly greater amount of cryptographic protection than 40-bit encryption. In order to be able to generate an SSL link, a web server requires an SSL Certificate. WE's platform utilizes Comodo's SSL Certificate and is depicted in Figure 11. To provide maximum uptime system availability, WE's platform is hosted in a multi-tiered, highly secure, highly reliable fault tolerant environment. This environment includes a universal power supply (UPS) and diesel generator for fully redundant backup power to computer equipment. The environment also includes climate control as well as physical security to building and data center. To provide highest level of availability to the internet, the data center utilizes connections to multiple Tier 1 internet backbone providers. To minimize risk of server downtime due to hard-drive failure, our platform server features a hot swappable RAID 1 disk array. In the event of major system component failure such as the motherboard, a spare server is readily available and can be brought online. To minimize risk of interruption due to outside attacks on our platform, we employ a fully integrated security approach located at the network edge. Using deep packet inspection engines, which are currently capable of recognizing 1800+ attack and vulnerabilities signatures, we are able to defend network resources from Trojans, worms, DoS/DDos attacks, and blended threats including sophisticated polymorphic attacks. Our backup cycle includes nightly incremental backups and a weekly image backup. The n...
Platform Security. You must not violate or attempt to violate the security of the Platforms, including, without limitation, by (a) accessing data not intended for you or logging onto a server or an account, which you are not authorized to access; (b) attempting to probe, scan or test the vulnerability of a system, network or breach security or authentication measures without proper authorization; (c) attempting to interfere with service to any other user, host or network, including, without limitation, via means of submitting a virus to the site, overloading, and "flooding," "spamming," "mail bombing" or "crashing."; (d) sending unsolicited emails, including promotions and/or advertising;
Platform Security. 10.1 Moorepay will implement technologies and procedures to minimise the risk of unauthorised access to Customer Data.
10.2 Moorepay will use all reasonable endeavours to ensure that Moorepay systems used in the delivery of Services have resilience that ensures system availability in the event of component failure, (N+1 redundancy) in order to continue operation in the event of component failure.
10.3 Development and test platforms will be segregated from the operational platforms used in providing the Services.
10.4 Development tools such as compilers, assemblers, editors and other general purpose utilities within the production environment will not be permitted unless expressly required for the delivery of the Services, in which case access is restricted.
10.5 Software and hardware used in the delivery of the Services will be updated in line with good industry practice, vendor support and security guidelines.
Platform Security. Buyer acknowledges and agrees that WideOrbit may, in its sole and absolute discretion, take such action as it deems reasonably necessary or advisable to maintain Platform security, health and economic viability (collectively, “Platform Health”), including, without limitation, (a) utilizing third-Party anti-fraud software or services; (b) reviewing one or more Advertising Slots, Avail Requests, Proposals, and bid responses; and (c) reviewing one or more bids, Orders, or Advertiser Creative. Buyer further acknowledges and agrees that WideOrbit reserves the right to conduct such evaluations and request such information from Buyer as WideOrbit deems necessary to maintain Platform Health. If, in WideOrbit’s discretion, WideOrbit determines that Platform Health may be negatively impacted, then Buyer acknowledges and agrees that WideOrbit has the right to remove from the Platform (i) any of Buyer’s bids, Orders, and Advertiser Creative, and/or (ii) Buyer.
Platform Security. Contractor will maintain a manifest of all modules, sub-licensed software, and third-party components (“Components”) utilized by the Platform to provided functionality as defined in Attachment A, Scope of Work. County can at any time audit the Platform manifest to ensure the confidentiality, integrity, and availability of County data. Contractor is responsible for reviewing all license terms and contracts associated with the use of the Components to ensure County is in compliance with its use of the Platform. Contractor agrees to indemnify County in accordance with Paragraph 17 32. Hosting Services: During the initial term of the Contract, and for any subsequent term for which County procures hosting services, Contractor hereby grants to County and County accepts from Contractor, subject to the terms and conditions of this Contract, a non- transferable, revocable, and non-exclusive right to use Contractor Systems during the term of this Contract for the Public Safety Agency Management Solution. Except as provided in Article 38, Contractor retains all right, title, and interest in and to the Contractor Systems, including without limitation all computers, other hardware, and software owned by, leased from and/or under direct control of Contractor that are incorporated into or used by the Contractor Systems, and this Contract does not grant County any intellectual property rights in the Contractor Systems or any of its components.
Platform Security. Licensor will ensure that the Platform is governed by commercially reasonable, industry-standard technical and organizational safeguards to prevent the unauthorized access, use or disclosure of Personal Data which is processed through or stored in the Platform. These safeguards include, but are not limited to, safeguards with respect to personnel, facilities, hardware and software, storage and networks, access controls, monitoring and logging, vulnerability and breach detection, incident response, and encryption of data while in transit and at rest.