S ecurity. 5.1 IGX shall provide an unconditional, revolving, standby irrevocable Letter of Credit (“LC”) to Transporter, in accordance with the GTA, in respect of any or all the GTA(s) that it has entered into with the Transporter on behalf of the respective buyers and such LC shall permit the Transporter to draw down amounts either wholly or partially on account of defaults in payments of invoices/ debit notes raised on the Buyer committed under such GTA (s) .
5.2 To ensure timely and appropriate performance of the GTA, IGX shall make a security deposit of the sum specified in the GTA and submit a bank guarantee of the sum specified in the GTA, (from any of the nationalized/scheduled banks acceptable to the Transporter) in favour of the Transporter, wherever required as such by the Transporter.
S ecurity. Contractor shall comply with New York State Enterprise Information Security Office (EISO), Cyber Security Policy P03-002, NYSERDA’s Information Security Policy, and other New York State policies/procedures including but not limited to prevent unauthorized access to restricted areas of the Web Site and any databases or other sensitive material generated from or used in conjunction with the Web Site; and Contractor shall notify NYSERDA’s Information Security Office as soon as possible of any known security breaches or holes. Questions concerning this policy may be directed to the EISO (000) 000-0000, attn: Director. Or visit EISO at xxxxx://xxx.xxx.xx.xxx/eiso.
S ecurity. You understand the importance of your role in preventing misuse of your accounts and you agree to promptly examine your Statements for each of your First Federal accounts as soon as you receive/access it. You agree to protect the confidentiality of Your account and account number, and your user ID and password. You understand that your user ID and password by itself or together with information related to your account, may allow unauthorized access to your account. Data transferred via eStatements is not encrypted. You acknowledge that the internet is inherently insecure and that all data transfers, including electronic mail, occur openly in the internet and potentially can be monitored and read by others. We cannot and do not warrant that all data transfers utilizing the internet or email transmitted to and from us, will not be monitored or read by others.
S ecurity. The lessor has the right, both upon commencement and during the term of this agreement, to require the lessee to provide security to the lessor's satisfaction for the fulfilment of his obligations towards the lessor. The lessee will then be obliged to provide the required security within a reasonable time.
S ecurity. Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, Convercent shall implement appropriate technical and organizational measures to ensure a level of security appropriate to the risk (as specified in Article 32 of the EU General Data Protection Regulation) to protect the Data (i) from accidental or unlawful destruction, and (ii) loss, alteration, unauthorized disclosure of, or access to the Data (a "Security Breach"). All penetration or other testing conducted by Customer shall be done in a designated testing environment and pursuant to mutual agreement of the parties. Convercent’s Information Security Management System (ISMS) is ISO/IEC 27001:2013 certified and Convercent is HITRUST CSF certified or a substantial equivalent. At Customer's request, no more than once per year, Convercent will provide to Customer third-party assessments and compliance certifications it makes available to all customers, including an annual Service Organization Controls (SOC) 2 Type II report ("SOC 2 Report") as defined by the American Institute of Certified Public Accountants. Such SOC 2 Report will include an opinion by the independent auditor on the adequacy and integrity of Convercent's general controls for security.
S ecurity. The On-Site Contact is responsible for the security and the actions of all participants and attendees from event setup through the clean-up period. It is highly recommended, and may be required at large events and events with alcohol, that a licensed security firm or the Isla Vista Foot Patrol be engaged.
S ecurity. No electronic transmission system is considered completely safe from intrusion. While a variety of software programs are available for video conferencing, such as Skype, Facetime, or GoToMeeting, most are not encrypted, or compliant with Federal law to protect the privacy of your health communication. I use software with encryption to maximize your confidentiality. Interception of communication by third parties remains technically possible. You are responsible for information security on your own computer, laptop, tablet, or smartphone. Due to the complexities of electronic media and the internet, the risks of telehealth include the potential for the release of private information, including audio, written materials and images which may be disrupted, distorted, interrupted or intercepted by unauthorized persons, despite your therapist’s reasonable efforts. Consequently, your psychotherapist cannot fully guarantee the security of telehealth sessions.
S ecurity. Although Vibe will engage in reasonable steps to protect User’s personal information from loss, misuse, unauthorized access, alteration and/or disclosure, User recognizes and understands that Vibe cannot guaranty that such personal information will be completely secure or error-free due to the nature of the internet and internet transmissions.
S ecurity. Customer acknowledges that RMI and Customer are responsible, respectively, only for the security of their own proprietary systems, and not for the systems of the other Party or any third- party, including without limitation any third-party supplier. It is the responsibility of each Party to put measures in place that protect any confidential information solely in its control. Customer is responsible for adding authorized users to its account, for maintaining the confidentiality of all account passwords, for ensuring that each account password is used only by the authorized user, for ensuring that accounts and passwords are not shared, and for maintaining the security of its account and of the equipment needed to connect to, access, or use RMI’s Services. Customer shall limit access to the Services only to authorized users. Customer shall notify RMI immediately if Customer becomes aware of or suspects a misuse or security breach.
S ecurity. The District shall erect and maintain all signs, gates and fences for the Drop-Off Center. The District shall 'secure the Drop-Off Center during nonworking hours.