Platform Security. Securitize shall use commercially reasonable efforts consistent with industry standards to protect the physical security and electronic security of the Platform and other systems utilized to provide the Securitize Services, including but not limited to using up-to-date anti-virus, security and firewall technology commonly used in the industry. Issuer agrees that it, and shall ensure that its Affiliates and Authorized Participants, will not take actions that negatively affect the confidentiality, integrity, and availability of Securitize’s systems and information assets.
Platform Security. You must not violate or attempt to violate the security of the Platforms, including, without limitation, by (a) accessing data not intended for you or logging onto a server or an account, which you are not authorized to access; (b) attempting to probe, scan or test the vulnerability of a system, network or breach security or authentication measures without proper authorization; (c) attempting to interfere with service to any other user, host or network, including, without limitation, via means of submitting a virus to the site, overloading, and "flooding," "spamming," "mail bombing" or "crashing."; (d) sending unsolicited emails, including promotions and/or advertising;
Platform Security. IPTechView implements administrative, physical, and technical safeguards for protection of the security, confidentiality and integrity of your information and all User Content. Those safeguards used or based on industry standards. Aside from such industry standard safeguards, IPTechView can make no guarantees regarding any Platform security or any User Content secured.
Platform Security. 7.1. If you are a Customer you acknowledge and agree that the provisions in your Terms and Conditions that apply to online payment system security apply to your use of the Platform and are incorporated herein by reference.
7.2. If you are a User you acknowledge and agree that:
(i) the security of your access to the Platform, including but not limited to the security and secrecy of your Access Methods, will at all times be your sole responsibility;
(ii) you have taken appropriate security measures to protect your Access Methods, computer systems and mobile devices;
(iii) your Access Methods are not the same as passwords that you use for other websites, applications or services or based on guessable information such as personal telephone number, birthday or other personal information.
7.3. In addition you agree that you will at all times maintain, appropriate protection against malicious software, including viruses, trojan horses, spyware, or any other computer code, files or programs, designed to disrupt, interrupt, disable, damage, destroy, limit the functionality of, infiltrate, or illicitly extract information from any device, software, system or telecommunications equipment.
Platform Security. Full Frame implements safeguards and security based on industry standards to protect Client Content. Aside from such industry standard safeguards, Full Frame can make no guarantees regarding any Platform security or any Client Content secured.
Platform Security. Secure Sockets Layer (SSL) is the standard security technology for creating an encrypted link between a web server and a browser. This link ensures that all data passed between the web server and browser remains private and integral. SSL is an industry standard and is used by millions of websites in the protection of their online transactions with their customers. WE employs SSL to protect all data transmitted between browser and web server. This technology protects confidential information (e.g., passwords, bid data, customer data) from being viewed or tampered with by unauthorized parties thus ensuring the integrity of our auction events. WORLD ENERGY SOLUTIONS PROPRIETORY INFORMATION WORLD ENERGY SOLUTIONS (GRAPHIC) FIGURE 11: WORLD ENERGY'S SSL CERTIFICATE SSL works by using a public key to encrypt data that's transferred over the SSL connection. WE utilizes strong encryption also known as 128-bit encryption. 128-bit encryption provides a significantly greater amount of cryptographic protection than 40-bit encryption. In order to be able to generate an SSL link, a web server requires an SSL Certificate. WE's platform utilizes Comodo's SSL Certificate and is depicted in Figure 11. To provide maximum uptime system availability, WE's platform is hosted in a multi-tiered, highly secure, highly reliable fault tolerant environment. This environment includes a universal power supply (UPS) and diesel generator for fully redundant backup power to computer equipment. The environment also includes climate control as well as physical security to building and data center. To provide highest level of availability to the internet, the data center utilizes connections to multiple Tier 1 internet backbone providers. To minimize risk of server downtime due to hard-drive failure, our platform server features a hot swappable RAID 1 disk array. In the event of major system component failure such as the motherboard, a spare server is readily available and can be brought online. To minimize risk of interruption due to outside attacks on our platform, we employ a fully integrated security approach located at the network edge. Using deep packet inspection engines, which are currently capable of recognizing 1800+ attack and vulnerabilities signatures, we are able to defend network resources from Trojans, worms, DoS/DDos attacks, and blended threats including sophisticated polymorphic attacks. Our backup cycle includes nightly incremental backups and a weekly image backup. The n...
Platform Security. Contractor will maintain a manifest of all modules, sub-licensed software, and third-party components (“Components”) utilized by the Platform to provided functionality as defined in Attachment A, Scope of Work. County can at any time audit the Platform manifest to ensure the confidentiality, integrity, and availability of County data. Contractor is responsible for reviewing all license terms and contracts associated with the use of the Components to ensure County is in compliance with its use of the Platform. Contractor agrees to indemnify County in accordance with Paragraph 17 32. Hosting Services: During the initial term of the Contract, and for any subsequent term for which County procures hosting services, Contractor hereby grants to County and County accepts from Contractor, subject to the terms and conditions of this Contract, a non- transferable, revocable, and non-exclusive right to use Contractor Systems during the term of this Contract for the Public Safety Agency Management Solution. Except as provided in Article 38, Contractor retains all right, title, and interest in and to the Contractor Systems, including without limitation all computers, other hardware, and software owned by, leased from and/or under direct control of Contractor that are incorporated into or used by the Contractor Systems, and this Contract does not grant County any intellectual property rights in the Contractor Systems or any of its components.
Platform Security. Seller acknowledges and agrees that WideOrbit may, in its sole and absolute discretion, take such action as it deems reasonably necessary or advisable to maintain Platform security, health and economic viability (collectively, “Platform Health”), including, without limitation, (a) utilizing third-Party anti-fraud software or services; and (b) reviewing one or more Advertising Slots and bid responses. Seller further acknowledges and agrees that WideOrbit reserves the right to conduct such evaluations and request such information from Seller as WideOrbit deems necessary to maintain Platform Health. If, in WideOrbit’s discretion, it determines that Platform Health may be negatively impacted, then Seller acknowledges and agrees that WideOrbit has the right to remove from the Platform
(i) any of Seller’s Bid Requests, Advertising Slots, and/or websites, and/or (ii) Seller.
Platform Security. Use of redundant systems to eliminate single points of failure throughout the hosting infrastructure – enterprise class firewall systems, host and network intrusion protection systems, multiple Tier-1 internet service providers, high availability virtualization, and storage area networks.
Platform Security. MC will use commercially reasonable efforts to maintain the security of the CareCommunity Platform, including, without limitation, constructing and maintaining firewalls and other security devices to limit any unauthorized access to information accessible from the CareCommunity Platform. You and MC will each take commercially reasonable precautions, including regularly maintaining up-to-date anti-virus and other software patches, to avoid introducing any “virus,” “Trojan horse,” “worm” or other malicious computer code. You agree to immediately report to MC the discovery of any type of discrepancy, ping, ransomware or anomaly or error that you detect in the CareCommunity Platform. You will also immediately report to MC the discovery of any virus or corruption in the CareCommunity Platform or on your own equipment or third-party software applications used to connect to, or otherwise access, the CareCommunity Platform that potentially affect or do affect the CareCommunity Platform. MC will take prompt action to protect MC systems against any malicious attacks from you or to the CareCommunity Platform, including blocking or terminating access or connections to stop the attack. 6 Patient Information and Content