Requirements for protecting information Sample Clauses

Requirements for protecting information. 3.6.1. The Customer shall guarantee the security and actuality of the software used on his equipment and perform timely updates or change configurations of the software in accordance with the instructions and requirements published by the software developers and/or Internet security services. 3.6.2. The Customer shall take reasonable efforts to prevent any incidents of unauthorized access to the software and equipment used and not allow his own resources or those provided by the Executor to be used for attempts of unauthorized access to other Internet resources. In particular, the Customer should not allow the following to occur on/from his equipment: • the sending of email messages from addresses not on the Executor’s domain; • the use of default passwords on the server’s software; • the sending of packets from a falsified IP source address; • the sending of DNS packets with intentionally corrupt data; • the presence of malware; • the presence or use of software designed for granting unauthorized access to information on the server. 3.6.3. In order to verify compliance with the security requirements, the Executor shall reserve the right to periodically scan the Customer's services and servers using special software, provided it shall not harm the Customer's equipment or the information contained therein. The Executor shall inform the Customer of any violations detected during such inspections, and the Customer shall take necessary measures to eliminate them. 3.6.4. In the event a gross violation of information security, which may endanger the functioning of resources on another local or global computer network (which is not owned by the Customer), is detected, the Executor has the right to block the Customer’s use of the equipment, the Services, or the resources which violate the security requirements. 3.6.5. The Executor, reserving all rights hereunder, can immediately suspend the Services in the following cases: • if, in the justifiable opinion of the Executor, the Customer’s use of the Services may harm the Executor and/or cause failure in the hardware and/or software of the Executor or third parties; • the detection of Customer actions or intentions of sending, publishing, transferring, reproducing, distributing by any means, or using software and/or other materials, received in any form during the use of the Services, fully or in part, protected by copyright or other rights, without the consent of the rights holder; • the detection of Customer action...
AutoNDA by SimpleDocs
Requirements for protecting information. 4.1. The Customer shall guarantee the security and actuality of the software used on his virtual machines and perform timely updates or change configurations of the software in accordance with the instructions and requirements published by the software developers and/or Internet security services. 4.2. The Customer shall take reasonable efforts to prevent any incidents of unauthorized access to the software used and not allow his own resources or those provided by the Executor to be used for attempts of unauthorized access to other Internet resources. In particular, the Customer should not allow the following to occur on/from his virtual machines: • the sending of email messages from addresses not on the Customer’s network (domain); • the use of default passwords on the virtual machine’s software; • the sending of packets from a falsified IP source address; • the sending of DNS packets with intentionally corrupt data; • the presence of malware; • the presence or use of software designed for granting unauthorized access to information on the virtual machine. 4.3. In order to verify compliance with the security requirements, the Executor shall reserve the right to periodically scan the Customer's services and servers using special software, provided it shall not harm the information contained therein. The Executor shall inform the Customer of any violations detected during such inspections, and the Customer shall take necessary measures to eliminate them. 4.4. In the event a gross violation of information security, which may endanger the functioning of resources on another local or global computer network (which is not owned by the Customer), is detected, the Executor has the right to block the Customer’s use of virtual machines which violate the security requirements. 4.5. The Executor, reserving all rights hereunder, can immediately suspend the Services in the following cases: • if, in the justifiable opinion of the Executor, the Customer’s use of the Services may harm the Executor and/or cause failure in the hardware and/or software of the Executor or third parties; • the detection of Customer actions or intentions of sending, publishing, transferring, reproducing, distributing by any means, or using software and/or other materials, received in any form during the use of the Services, fully or in part, protected by copyright or other rights, without the consent of the rights holder; • the detection of Customer actions or intentions of sending, publishing,...
Requirements for protecting information. 3.3.1. The Executor, reserving all rights hereunder, can immediately suspend the Services in the following cases: 3.3.2. if, in the justifiable opinion of the Executor, the Customer’s use of the Services may harm the Executor and/or cause failure in the hardware of the Executor or third parties; 3.3.3. the distribution and/or publication of any information which contradicts the effective Russian legislation, the provisions of the licenses of the Ministry of Communication of the Russian Federation (the Ministry of Information Technologies and Communications of the Russian Federation), or international regulations or infringes on the rights of third parties; 3.3.4. if other actions, which are not specified in the Contract and/or Agreement but contain criminal components or violate the rights and legal interests of third parties, are taken; 3.3.5. in the event the Executor receives relevant instruction from the government body regulating such situations and has relevant powers in accordance with the effective Russian legislation. 3.3.6. The Executor shall not be liable for any violation of the rights of third parties resulting from the Customer’s actions during the use of the Services provided by the Executor. 3.3.7. The period of suspension of the Services for reasons indicated in par. 3. 3.1. shall not be considered an interruption of the Services and thus shall not be considered the failure of the Executor to fulfill the obligations stipulated in the Contract and present Agreement. 3.3.8. The Customer shall be fully responsible for the risks related to the use of the Internet via the Executor's resources and/or the Services.

Related to Requirements for protecting information

  • Requirements for Protection In compliance with NPCC requirements and Good Utility Practice, Developer shall provide, install, own, and maintain relays, circuit breakers and all other devices necessary to remove any fault contribution of the Large Generating Facility to any short circuit occurring on the New York State Transmission System not otherwise isolated by Connecting Transmission Owner’s equipment, such that the removal of the fault contribution shall be coordinated with the protective requirements of the New York State Transmission System. Such protective equipment shall include, without limitation, a disconnecting device or switch with load- interrupting capability located between the Large Generating Facility and the New York State Transmission System at a site selected upon mutual agreement (not to be unreasonably withheld, conditioned or delayed) of the Developer and Connecting Transmission Owner. Developer shall be responsible for protection of the Large Generating Facility and Developer’s other equipment from such conditions as negative sequence currents, over- or under-frequency, sudden load rejection, over- or under-voltage, and generator loss-of-field. Developer shall be solely responsible to disconnect the Large Generating Facility and Developer’s other equipment if conditions on the New York State Transmission System could adversely affect the Large Generating Facility.

  • Updating information You must tell us promptly if information you have provided to us changes, including if your billing address changes or if your use of energy changes (for example, if you start running a business at the premises).

  • Listing Information As used herein, “

  • Contracting Information Requirements Contractor represents and warrants that it will comply with the requirements of Section 552.372(a) of the Texas Government Code. Except as provided by Section 552.374(c) of the Texas Government Code, the requirements of Subchapter J (Additional Provisions Related to Contracting Information), Chapter 552 of the Government Code, may apply to the Contract and the Contractor agrees that the Contract can be terminated if the Contractor knowingly or intentionally fails to comply with a requirement of that subchapter.

  • Identifying Information and Privacy NOTIFICATION (a) Identification Number(s). Every invoice or New York State Claim for Payment submitted to a New York State agency by a payee, for payment for the sale of goods or services or for transactions (e.g., leases, easements, licenses, etc.) related to real or personal property must include the payee's identification number. The number is any or all of the following: (i) the payee’s Federal employer identification number, (ii) the payee’s Federal social security number, and/or (iii) the payee’s Vendor Identification Number assigned by the Statewide Financial System. Failure to include such number or numbers may delay payment. Where the payee does not have such number or numbers, the payee, on its invoice or Claim for Payment, must give the reason or reasons why the payee does not have such number or numbers.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Furnishing Information (a) No Holder shall use any free writing prospectus (as defined in Rule 405) in connection with the sale of Registrable Securities without the prior written consent of the Company. (b) It shall be a condition precedent to the obligations of the Company to take any action pursuant to Section 4 of this Annex E that the selling Holders and the underwriters, if any, shall furnish to the Company such information regarding themselves, the Registrable Securities held by them and the intended method of disposition of such securities as shall be required to effect the registered offering of their Registrable Securities.

  • Whistleblower Protections and Trade Secrets Notwithstanding anything to the contrary contained herein, nothing in this Agreement prohibits Executive from reporting possible violations of federal law or regulation to any United States governmental agency or entity in accordance with the provisions of and rules promulgated under Section 21F of the Securities Exchange Act of 1934 or Section 806 of the Xxxxxxxx-Xxxxx Act of 2002, or any other whistleblower protection provisions of state or federal law or regulation (including the right to receive an award for information provided to any such government agencies). Furthermore, in accordance with 18 U.S.C. § 1833, notwithstanding anything to the contrary in this Agreement: (i) Executive shall not be in breach of this Agreement, and shall not be held criminally or civilly liable under any federal or state trade secret law (x) for the disclosure of a trade secret that is made in confidence to a federal, state, or local government official or to an attorney solely for the purpose of reporting or investigating a suspected violation of law, or (y) for the disclosure of a trade secret that is made in a complaint or other document filed in a lawsuit or other proceeding, if such filing is made under seal; and (ii) if Executive files a lawsuit for retaliation by the Company for reporting a suspected violation of law, Executive may disclose the trade secret to Executive’s attorney, and may use the trade secret information in the court proceeding, if Executive files any document containing the trade secret under seal, and does not disclose the trade secret, except pursuant to court order.

  • Identifying Information Issuer and Broker acknowledge that a portion of the identifying information set forth on Exhibit A is being requested by NCPS in connection with the USA Patriot Act, Pub.L.107-56 (the “Act”). To help the government fight the funding of terrorism and money laundering activities, Federal law requires all financial institutions to obtain, verify, and record information that identifies each person who opens an account. For a non-individual person such as a business entity, a charity, a Trust, or other legal entity, we ask for documentation to verify its formation and existence as a legal entity. We may also ask to see financial statements, licenses, identification and authorization documents from individuals claiming authority to represent the entity or other relevant documentation.

  • Safeguards for Personal Information Supplier agrees to develop, implement, maintain, and use administrative, technical, and physical safeguards, as deemed appropriate by DXC, to preserve the security, integrity and confidentiality of, and to prevent intentional or unintentional non-permitted or violating use or disclosure of, and to protect against unauthorized access to or accidental or unlawful destruction, loss, or alteration of, the Personal Information Processed, created for or received from or on behalf of DXC in connection with the Services, functions or transactions to be provided under or contemplated by this Agreement. Such safeguards shall meet all applicable legal standards (including any encryption requirements imposed by law) and shall meet or exceed accepted security standards in the industry, such as ISO 27001/27002. Supplier agrees to document and keep these safeguards current and shall make the documentation available to DXC upon request. Supplier shall ensure that only Supplier’s employees or representatives who may be required to assist Supplier in meeting its obligations under this Agreement shall have access to the Personal Information.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!