Protection Tools Sample Clauses

Protection Tools. Without limiting Metrolinx’s compliance with paragraph 1 (above), Metrolinx will use Protection Tools commensurate with industry best practices to monitor and test PRESTO NG and related system, and components thereof on an ongoing basis, and to protect PRESTO NG.
AutoNDA by SimpleDocs

Related to Protection Tools

  • Protection of Customer Data The Supplier shall not delete or remove any proprietary notices contained within or relating to the Customer Data. The Supplier shall not store, copy, disclose, or use the Customer Data except as necessary for the performance by the Supplier of its obligations under this Call Off Contract or as otherwise Approved by the Customer. To the extent that the Customer Data is held and/or Processed by the Supplier, the Supplier shall supply that Customer Data to the Customer as requested by the Customer and in the format (if any) specified by the Customer in the Call Off Order Form and, in any event, as specified by the Customer from time to time in writing. The Supplier shall take responsibility for preserving the integrity of Customer Data and preventing the corruption or loss of Customer Data. The Supplier shall perform secure back-ups of all Customer Data and shall ensure that up-to-date back-ups are stored off-site at an Approved location in accordance with any BCDR Plan or otherwise. The Supplier shall ensure that such back-ups are available to the Customer (or to such other person as the Customer may direct) at all times upon request and are delivered to the Customer at no less than six (6) Monthly intervals (or such other intervals as may be agreed in writing between the Parties). The Supplier shall ensure that any system on which the Supplier holds any Customer Data, including back-up data, is a secure system that complies with the Security Policy and the Security Management Plan (if any). If at any time the Supplier suspects or has reason to believe that the Customer Data is corrupted, lost or sufficiently degraded in any way for any reason, then the Supplier shall notify the Customer immediately and inform the Customer of the remedial action the Supplier proposes to take. If the Customer Data is corrupted, lost or sufficiently degraded as a result of a Default so as to be unusable, the Supplier may: require the Supplier (at the Supplier's expense) to restore or procure the restoration of Customer Data to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer, and the Supplier shall do so as soon as practicable but not later than five (5) Working Days from the date of receipt of the Customer’s notice; and/or itself restore or procure the restoration of Customer Data, and shall be repaid by the Supplier any reasonable expenses incurred in doing so to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer. Confidentiality

  • Protection The Asset Representations Reviewer will take reasonable measures to protect the secrecy of and avoid disclosure and unauthorized use of Confidential Information, including those measures that it takes to protect its own confidential information and not less than a reasonable standard of care. The Asset Representations Reviewer acknowledges that Personally Identifiable Information is also subject to the additional requirements in Section 4.09.

  • Protection Planning Annually, sub-geographic area Unit Administrators will determine efficiencies to be gained from reciprocal assistance and acquisition of protection services. Operating plans will document decisions. Plans should be reviewed, and agreement reached concerning such items as placement of crews, engines, air tankers, helicopters, fixed and aerial detection, regulated use, closures and other joint fire suppression efforts.

  • Password Protection Contractor agrees that any portable or laptop computer that has access to the Eligible Users or State of Utah networks, or stores any Public Data is equipped with strong and secure password protection.

  • PROTECTION OF WORK AND PROPERTY Contractor shall erect and properly maintain at all times, as required by conditions and progress of the Work, all necessary safeguards, signs, barriers, lights, and security persons for protection of workers and the public, and shall post danger signs warning against hazards created by the Work. In an emergency affecting life and safety of life or of Work or of adjoining property, Contractor, without special instruction or authorization from District, is permitted to act at his discretion to prevent such threatened loss or injury.

  • Intellectual Property Protection The Group Companies shall establish and maintain appropriate intellectual inspection system to protect the Proprietary Rights of the Group Companies. The Group Companies shall, and the Founders shall cause the Group Companies to fully comply with the laws and regulations in respect of the protection of the Proprietary Rights and refrain from infringing the Proprietary Rights of other parties. Ecommerce Company shall, and the other Warrantors shall procure Ecommerce Company to, use its best efforts to obtain as soon as possible and maintain the registration of the core trademarks used in the Business (including without limitation, the marks of “perfect diary”, “完美日记” and the combination of the foregoing) in the appropriate goods and services (including without limitation, cosmetics, cosmetics tools and advertisement). The Group Companies shall take all necessary or desirable actions to protect their trademarks, including initiating trademark petitions against any trademark applications filed by any third party for a trademark identical or similar to the Group Companies’ trademarks.

  • Protection, Treatment (1) Each Contracting Party shall protect within its State territory investments made in accordance with its national laws and regulations by investors of the other Contracting Party and shall not impair by unreasonable or discriminatory measures the management, maintenance, use, enjoyment, extension, sale or liquidation of such investments. In particular, each Contracting Party or its competent authorities shall issue the necessary authorisations mentioned in Article 2, paragraph (2) of this Agreement.

  • PROTECTION OF WORK 12.1 Subcontractor shall effectually secure and protect the work done hereunder and assume full responsibility for the condition thereof until final acceptance by the OWNER and Contractor. Subcontractor further agrees to provide such protection as is necessary to protect the work and the workmen of Contractor, the OWNER, and other subcontractors from its operations.

  • Protection of Trade Secrets or Confidential Information If the Contractor considers any portion of materials made or received in the course of performing the Contract (“contract-related materials”) to be trade secret under section 688.002 or 812.081, F.S., or otherwise confidential under Florida or federal law, the Contractor must clearly designate that portion of the materials as trade secret or otherwise confidential when submitted to the Department. The Contractor will be responsible for responding to and resolving all claims for access to contract-related materials it has designated trade secret or otherwise confidential. If the Department is served with a request for discovery of contract-related materials designated by the Contractor as trade secret or otherwise confidential, the Contractor will be responsible for filing the appropriate motion or objection in response to the request for discovery. The Department will provide materials designated trade secret or otherwise confidential if the Contractor fails to take appropriate and timely action to protect the materials designated as trade secret or otherwise confidential. The Contractor will protect, defend, indemnify, and hold harmless the Department for claims, costs, fines, and attorney’s fees arising from or relating to its designation of contract-related materials as trade secret or otherwise confidential.

  • Protection of Data The Contractor agrees to store Data on one or more of the following media and protect the Data as described:

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!