Protect Private Key Sample Clauses

Protect Private Key. Customer is responsible for protecting its Private Key. Customer represents, warrants and agrees that, in regard to the TrustID Secure Email Certificate, Customer: (i) has kept and will keep its Private Key (and any Activation Data used to protect Customer's Private Key) private, and (ii) will take all reasonable security measures to prevent unauthorized access to, or disclosure, loss, modification, compromise, or use of, its Private Key and the computer system or media on which its Private Key is stored. Failure to protect the Private Key or to notify IdenTrust of the theft, compromise, or misuse of the Private Key may cause Customer serious adverse legal and financial consequences.
AutoNDA by SimpleDocs
Protect Private Key. Subscriber is responsible for protecting its Private Key(s). Subscriber represents, warrants and agrees that, in regard to each EV Code Signing Certificate, Subscriber: (i) has kept and will keep its corresponding Private Key (and any associated Activation Data) private, and (ii) will take reasonable security measures to prevent unauthorized access to, or disclosure, loss, modification, compromise, or use of, its corresponding Private Key (and associated Activation Data), as well as any computer system, device, or media on which its corresponding Private Key (or associated Activation Data) is stored. Subscriber may change its employee(s) or agent(s) who are authorized to use and administer on behalf of Subscriber EV Code Signing Certificates, without requesting revocation of current EV Code Signing Certificates, but Subscriber shall bear the security and control risks associated with making such changes without revoking any EV Code Signing Certificates. In the alternative, Subscriber may request revocation of current EV Code Signing Certificates and apply for new EV Code Signing Certificates, subject to the fees and other requirements associated with the issuance of new EV Code Signing Certificates. Subscriber agrees that the act or omission of any employee or agent of Subscriber who has access to use any given EV Code Signing Certificate or the corresponding Private Key, in using or administering the EV Code Signing Certificate or such Private Key, will be deemed for all purposes to be the act or omission of Subscriber. Failure to protect the Private Key or to notify IdenTrust of the theft, compromise, or misuse of the Private Key may cause Subscriber serious adverse legal and financial consequences.
Protect Private Key. Subscriber is responsible for protecting its Private Key(s). Subscriber represents, warrants and agrees that, in regard to each EV Code Signing Certificate, Subscriber: (i) has kept and will keep its corresponding Private Key (and any associated Activation Data) private, (ii) will take reasonable security measures to prevent unauthorized access to, or disclosure, loss, modification, compromise, or use of, its corresponding Private Key (and associated Activation Data), as well as any computer system, device, or media on which its corresponding Private Key (or associated Activation Data) is stored, (iii) Subscriber has generated, maintained storage of, and used its private key in either IdenTrust provided key storage mechanism related to the EV Code Signing Certificate or in Subscriber acquired crypto module that meets or exceeds the requirements of FIPS 140-2 level 2, and (iv) Subscriber will confirm the operating environment achieves a level of security at least equivalent to that of FIPS 140-2 level 2 or Common Criteria EAL 4+ and communicate audit compliance via a completed TrustID EV Code Signing HSM IT Audit Form included in the Appendix A of this Subscriber Agreement and also posted for reference on the IdenTrust TrustID Repository. Subscriber may change its employee(s) or agent(s) who are authorized to use and administer on behalf of Subscriber EV Code Signing Certificates, without requesting revocation of current EV Code Signing Certificates, but Subscriber shall bear the security and control risks associated with making such changes without revoking any EV Code Signing Certificates. In the alternative, Subscriber may request revocation of current EV Code Signing Certificates and apply for new EV Code Signing Certificates, subject to the fees and other requirements associated with the issuance of new EV Code Signing Certificates. Subscriber agrees that the act or omission of any employee or agent of Subscriber who has access to use any given EV Code Signing Certificate or the corresponding Private Key, in using or administering the EV Code Signing Certificate or such Private Key, will be deemed for all purposes to be the act or omission of Subscriber. Failure to protect the Private Key or to notify IdenTrust of the theft, compromise, or misuse of the Private Key may cause Subscriber serious adverse legal and financial consequences.

Related to Protect Private Key

  • System Security and Data Safeguards When SAP is given access to Licensee’s systems and data, SAP shall comply with Licensee’s reasonable administrative, technical, and physical safeguards to protect such data and guard against unauthorized access. In connection with such access, Licensee shall be responsible for providing Consultants with user authorizations and passwords to access its systems and revoking such authorizations and terminating such access, as Licensee deems appropriate from time to time. Licensee shall not grant SAP access to Licensee systems or personal information (of Licensee or any third party) unless such access is essential for the performance of Services under the Agreement. The parties agree that no breach of this provision shall be deemed to have occurred in the event of SAP non-conformance with the aforementioned safeguard but where no personal information has been compromised.

  • Enterprise Information Management Standards Grantee shall conform to HHS standards for data management as described by the policies of the HHS Office of Data, Analytics, and Performance. These include, but are not limited to, standards for documentation and communication of data models, metadata, and other data definition methods that are required by HHS for ongoing data governance, strategic portfolio analysis, interoperability planning, and valuation of HHS System data assets.

  • Information Technologies Cooperation 1. The aims of cooperation in Information Technologies sectors, carried out in the mutual interest of the Parties and in compliance with their policies, will be: (a) to focus on cooperative activities towards information technology areas where mutual and complementary interests exists; and (b) to build on existing agreements and arrangements already in place between the Parties. 2. Information Technologies cooperation may include, but not be limited to: (a) scientific and technical cooperation for the Software Industry of the Parties and encouraging cooperation in software development for populations with specific needs; (b) facilitate the cooperation on academic, industrial and entrepreneurial networks in the area of Information Technology; (c) encouraging exchange of experience on management and research and development for Information Technology Parks; (d) research and development on Information Technology products and services, integrating television, multimedia, and cellular telephones; and (e) encouraging exchange of experience for research and development in networks and telecommunications.

  • Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.

  • Economic Cooperation 1. The Parties will encourage the utilization of cooperation instruments and mechanisms with a view to strengthen the processes of economic integration and commercial exchange. 2. The objectives of economic cooperation will be: (a) to build on existing agreements or arrangements already in place for trade and economic cooperation; and (b) to advance and strengthen trade and economic relations between the Parties. 3. The Parties will encourage and facilitate, as appropriate, the following activities, including, but not limited to: (a) dialogue about policies and regular exchanges of information and views on ways to promote and expand trade in goods and services between the Parties; (b) joint elaboration of studies and technical projects of economic interest according to the economic development needs identified by the Parties; (c) keeping each other informed of important economic and trade issues, and any impediments to furthering their economic cooperation; (d) providing assistance and facilities to business persons and trade missions that visit the other Party with the knowledge and support of the relevant agencies; (e) supporting dialogue and exchanges of experience among the respective business communities of the Parties; (f) establishing and developing mechanisms for providing information and identifying opportunities for business cooperation, trade in goods and services, investment, and government procurement; and (g) stimulating and facilitating actions of public and/or private sectors in areas of economic interest.

  • Safety and Security Procedures Contractor shall maintain and enforce, at the Contractor Work Locations, industry-standard safety and physical security policies and procedures. While at each Court Work Location, Contractor shall comply with the safety and security policies and procedures in effect at such Court Work Location.

  • Security Safeguards (1) Each party acknowledges that it is solely responsible for determining and communicating to the other the appropriate technological, physical, and organizational security measures required to protect Personal Data.

  • INFORMATION ASSURANCE (a) Information provided by LOCKHEED XXXXXX to SELLER remains the property of LOCKHEED XXXXXX. SELLER shall comply with the terms of any proprietary information agreement with LOCKHEED XXXXXX and comply with all proprietary information markings and restrictive legends applied by LOCKHEED XXXXXX to anything provided hereunder to SELLER. SELLER shall not use any LOCKHEED XXXXXX provided information for any purpose except to perform this Contract and shall not disclose such information to third parties without the prior written consent of LOCKHEED XXXXXX. SELLER shall maintain data protection processes and systems sufficient to adequately protect LOCKHEED XXXXXX provided information and comply with any law or regulation applicable to such information.

  • Information Safeguards Business Associate will develop, document, implement, maintain and use appropriate administrative, technical and physical safeguards to preserve the integrity and confidentiality of and to prevent non-permitted use or disclosure of PHI created for or received from Recipient or its Subsidiaries. These safeguards must be appropriate to the size and complexity of Business Associate’s operations and the nature and scope of its activities. Business Associate agrees that these safeguards will meet any applicable requirements set forth by the U.S. Department of Health and Human Services, including (as of the effective date or as of the compliance date, whichever is applicable) any requirements set forth in the final HIPAA security regulations. Business Associate agrees to mitigate, to the extent practicable, any harmful effect that is known to Business Associate resulting from a use or disclosure of PHI by Business Associate in violation of the requirements of this Addendum.

  • Internal Investigations (A) The parties recognize that Florida Highway Patrol personnel occupy a special place in American society. Therefore, it is understood that the state has the right to expect that a professional standard of conduct be adhered to by all Florida Highway Patrol personnel regardless of rank or assignment. Since internal investigations may be undertaken to inquire into complaints of Florida Highway Patrol misconduct, the state reserves the right to conduct such investigations to uncover the facts in each case, but expressly agrees to carefully guard and protect the rights and dignity of accused personnel. In the course of an internal investigation, the investigative methods employed will be consistent with the law (including but not limited to section 112.532, Florida Statutes) and this agreement; nothing in this agreement, however, shall be deemed to diminish the rights of employees under applicable law.

Time is Money Join Law Insider Premium to draft better contracts faster.