Protect Private Key Sample Clauses

Protect Private Key. Customer is responsible for protecting its Private Key. Customer represents, warrants and agrees that, in regard to the TrustID Secure Email Certificate, Customer: (i) has kept and will keep its Private Key (and any Activation Data used to protect Customer's Private Key) private, and (ii) will take all reasonable security measures to prevent unauthorized access to, or disclosure, loss, modification, compromise, or use of, its Private Key and the computer system or media on which its Private Key is stored. Failure to protect the Private Key or to notify IdenTrust of the theft, compromise, or misuse of the Private Key may cause Customer serious adverse legal and financial consequences.
AutoNDA by SimpleDocs
Protect Private Key. Subscriber is responsible for protecting its Private Key(s). Subscriber represents, warrants and agrees that, in regard to each EV Code Signing Certificate, Subscriber: (i) has kept and will keep its corresponding Private Key (and any associated Activation Data) private, and (ii) will take reasonable security measures to prevent unauthorized access to, or disclosure, loss, modification, compromise, or use of, its corresponding Private Key (and associated Activation Data), as well as any computer system, device, or media on which its corresponding Private Key (or associated Activation Data) is stored. Failure to protect the Private Key or to notify IdenTrust of the theft, compromise, or misuse of the Private Key may cause Subscriber serious adverse legal and financial consequences.
Protect Private Key. Subscriber is responsible for protecting its Private Key(s). Subscriber represents, warrants and agrees that, in regard to each EV Code Signing Certificate, Subscriber: (i) has kept and will keep its corresponding Private Key (and any associated Activation Data) private, (ii) will take reasonable security measures to prevent unauthorized access to, or disclosure, loss, modification, compromise, or use of, its corresponding Private Key (and associated Activation Data), as well as any computer system, device, or media on which its corresponding Private Key (or associated Activation Data) is stored, (iii) Subscriber has generated, maintained storage of, and used its private key in either IdenTrust provided key storage mechanism related to the EV Code Signing Certificate or in Subscriber acquired crypto module that meets or exceeds the requirements of FIPS 140-2 level 2, and (iv) Subscriber will confirm the operating environment achieves a level of security at least equivalent to that of FIPS 140-2 level 2 or Common Criteria EAL 4+ and communicate audit compliance via a completed TrustID EV Code Signing HSM IT Audit Form included in the Appendix A of this Subscriber Agreement and also posted for reference on the IdenTrust TrustID Repository. Failure to protect the Private Key or to notify IdenTrust of the theft, compromise, or misuse of the Private Key may cause Subscriber serious adverse legal and financial consequences.
Protect Private Key. Subscriber is responsible for protecting its Private Key(s). Subscriber represents, warrants and agrees that, in regard to each Code Signing Certificate, Subscriber: (i) has kept and will keep its corresponding Private Key (and any associated Activation Data) private, (ii) will take reasonable security measures to prevent unauthorized access to, or disclosure, loss, modification, compromise, or use of, its corresponding Private Key (and associated Activation Data), as well as any computer system, device, or media on which its corresponding Private Key (or associated Activation Data) is stored,

Related to Protect Private Key

  • Public/Private Information The Borrower shall cooperate with the Administrative Agent in connection with the publication of certain materials and/or information provided by or on behalf of the Borrower. Documents required to be delivered pursuant to the Loan Documents shall be delivered by or on behalf of the Borrower to the Administrative Agent and the Lenders (collectively, “Information Materials”) pursuant to this Article and the Borrower shall designate Information Materials (a) that are either available to the public or not material with respect to the Borrower and its Subsidiaries or any of their respective securities for purposes of United States federal and state securities laws, as “Public Information” and (b) that are not Public Information as “Private Information”.

  • LIFE COMPANY TO PROVIDE DOCUMENTS; INFORMATION ABOUT AVIF (a) LIFE COMPANY will provide to AVIF or its designated agent at least one (1) complete copy of all SEC registration statements, Account Prospectuses, reports, any preliminary and final voting instruction solicitation material, applications for exemptions, requests for no-action letters, and all amendments to any of the above, that relate to each Account or the Contracts, contemporaneously with the filing of such document with the SEC or other regulatory authorities. (b) LIFE COMPANY will provide to AVIF or its designated agent at least one (1) complete copy of each piece of sales literature or other promotional material in which AVIF or any of its affiliates is named, at least five (5) Business Days prior to its use or such shorter period as the Parties hereto may, from time to time, agree upon. No such material shall be used if AVIF or its designated agent objects to such use within five (5) Business Days after receipt of such material or such shorter period as the Parties hereto may, from time to time, agree upon. AVIF hereby designates INVESCO as the entity to receive such sales literature, until such time as AVIF appoints another designated agent by giving notice to LIFE COMPANY in the manner required by Section 9 hereof. (c) Neither LIFE COMPANY nor any of its affiliates, will give any information or make any representations or statements on behalf of or concerning AVIF or its affiliates in connection with the sale of the Contracts other than (i) the information or representations contained in the registration statement, including the AVIF Prospectus contained therein, relating to Shares, as such registration statement and AVIF Prospectus may be amended from time to time; or (ii) in reports or proxy materials for AVIF ; or (iii) in published reports for AVIF that are in the public domain and approved by AVIF for distribution; or (iv) in sales literature or other promotional material approved by AVIF , except with the express written permission of AVIF . (d) LIFE COMPANY shall adopt and implement procedures reasonably designed to ensure that information concerning AVIF and its affiliates that is intended for use only by brokers or agents selling the Contracts (i.e., information that is not intended for distribution to Participants) (“broker only materials”) is so used, and neither AVIF nor any of its affiliates shall be liable for any losses, damages or expenses relating to the improper use of such broker only materials. (e) For the purposes of this Section 4.5, the phrase “sales literature or other promotional material” includes, but is not limited to, advertisements (such as material published, or designed for use in, a newspaper, magazine, or other periodical, radio, television, telephone or tape recording, videotape display, signs or billboards, motion pictures, or other public media, (e.g., on-line networks such as the Internet or other electronic messages), sales literature (i.e., any written communication distributed or made generally available to customers or the public, including brochures, circulars, research reports, market letters, form letters, seminar texts, reprints or excerpts of any other advertisement, sales literature, or published article), educational or training materials or other communications distributed or made generally available to some or all agents or employees, registration statements, prospectuses, statements of additional information, shareholder reports, and proxy materials and any other material constituting sales literature or advertising under FINRA rules, the 1933 Act, or the 0000 Xxx.

  • Enterprise Information Management Standards Grantee shall conform to HHS standards for data management as described by the policies of the HHS Office of Data, Analytics, and Performance. These include, but are not limited to, standards for documentation and communication of data models, metadata, and other data definition methods that are required by HHS for ongoing data governance, strategic portfolio analysis, interoperability planning, and valuation of HHS System data assets.

  • Protection of Private Information If this Agreement requires City to disclose “Private Information” to Contractor within the meaning of San Francisco Administrative Code Chapter 12M, Contractor and subcontractor shall use such information only in accordance with the restrictions stated in Chapter 12M and in this Agreement and only as necessary in performing the Services. Contractor is subject to the enforcement and penalty provisions in Chapter 12M.

  • Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.

  • Power System Stabilizers The Developer shall procure, install, maintain and operate Power System Stabilizers in accordance with the requirements identified in the Interconnection Studies conducted for Developer’s Large Generating Facility. NYISO and Connecting Transmission Owner reserve the right to reasonably establish minimum acceptable settings for any installed Power System Stabilizers, subject to the design and operating limitations of the Large Generating Facility. If the Large Generating Facility’s Power System Stabilizers are removed from service or not capable of automatic operation, the Developer shall immediately notify the Connecting Transmission Owner and NYISO. The requirements of this paragraph shall not apply to wind generators.

  • Economic Cooperation 1. The Parties will encourage the utilization of cooperation instruments and mechanisms with a view to strengthen the processes of economic integration and commercial exchange. 2. The objectives of economic cooperation will be: (a) to build on existing agreements or arrangements already in place for trade and economic cooperation; and (b) to advance and strengthen trade and economic relations between the Parties. 3. The Parties will encourage and facilitate, as appropriate, the following activities, including, but not limited to: (a) dialogue about policies and regular exchanges of information and views on ways to promote and expand trade in goods and services between the Parties; (b) joint elaboration of studies and technical projects of economic interest according to the economic development needs identified by the Parties; (c) keeping each other informed of important economic and trade issues, and any impediments to furthering their economic cooperation; (d) providing assistance and facilities to business persons and trade missions that visit the other Party with the knowledge and support of the relevant agencies; (e) supporting dialogue and exchanges of experience among the respective business communities of the Parties; (f) establishing and developing mechanisms for providing information and identifying opportunities for business cooperation, trade in goods and services, investment, and government procurement; and (g) stimulating and facilitating actions of public and/or private sectors in areas of economic interest.

  • Exchange Control Information Exchange control reporting is required for cash transactions exceeding AUD10,000 and for international fund transfers. The Australian bank assisting with the transaction will file the report for you. If there is no Australian bank involved in the transfer, you will have to file the report.

  • Common Areas - Rules and Regulations Lessor or such other person(s) as Lessor may appoint shall have the exclusive control and management of the Common Areas and shall have the right, from time to time, to establish, modify, amend and enforce reasonable rules and regulations (“Rules and Regulations”) for the management, safety, care, and cleanliness of the grounds, the parking and unloading of vehicles and the preservation of good order, as well as for the convenience of other occupants or tenants of the Building and the Project and their invitees. Lessee agrees to abide by and conform to all such Rules and Regulations, and to cause its employees, suppliers, shippers, customers, contractors and invitees to so abide and conform. Lessor shall not be responsible to Lessee for the non-compliance with said Rules and Regulations by other tenants of the Project.

  • Anti-Money Laundering and Red Flag Identity Theft Prevention Programs The Trust acknowledges that it has had an opportunity to review, consider and comment upon the written procedures provided by USBFS describing various tools used by USBFS which are designed to promote the detection and reporting of potential money laundering activity and identity theft by monitoring certain aspects of shareholder activity as well as written procedures for verifying a customer’s identity (collectively, the “Procedures”). Further, the Trust and USBFS have each determined that the Procedures, as part of the Trust’s overall Anti-Money Laundering Program and Red Flag Identity Theft Prevention Program, are reasonably designed to: (i) prevent each Fund from being used for money laundering or the financing of terrorist activities; (ii) prevent identity theft; and (iii) achieve compliance with the applicable provisions of the Bank Secrecy Act, Fair and Accurate Credit Transactions Act of 2003 and the USA Patriot Act of 2001 and the implementing regulations thereunder. Based on this determination, the Trust hereby instructs and directs USBFS to implement the Procedures on the Trust’s behalf, as such may be amended or revised from time to time. It is contemplated that these Procedures will be amended from time to time by the parties as additional regulations are adopted and/or regulatory guidance is provided relating to the Trust’s anti-money laundering and identity theft responsibilities. USBFS agrees to provide to the Trust: (a) Prompt written notification of any transaction or combination of transactions that USBFS believes, based on the Procedures, evidence money laundering or identity theft activities in connection with the Trust or any Fund shareholder; (b) Prompt written notification of any customer(s) that USBFS reasonably believes, based upon the Procedures, to be engaged in money laundering or identity theft activities, provided that the Trust agrees not to communicate this information to the customer; (c) Any reports received by USBFS from any government agency or applicable industry self-regulatory organization pertaining to USBFS’ Anti-Money Laundering Program or the Red Flag Identity Theft Prevention Program on behalf of the Trust; (d) Prompt written notification of any action taken in response to anti-money laundering violations or identity theft activity as described in (a), (b) or (c) immediately above; and (e) Certified annual and quarterly reports of its monitoring and customer identification activities pursuant to the Procedures on behalf of the Trust. The Trust hereby directs, and USBFS acknowledges, that USBFS shall (i) permit federal regulators access to such information and records maintained by USBFS and relating to USBFS’ implementation of the Procedures, on behalf of the Trust, as they may request, and (ii) permit such federal regulators to inspect USBFS’ implementation of the Procedures on behalf of the Trust.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!