Security Access and Fraud Sample Clauses

Security Access and Fraud. 9.1. You agree to implement and is wholly responsible for implementing reasonable security precautions and practices in relation to the use of Disaster Recovery as a Service. 9.2. You are solely responsible for any non-physical security breach or unauthorized usage of Disaster Recovery as a Service. 9.3. Xxxxxx shall limit access to Disaster Recovery as a Service and take reasonable security efforts to prevent unauthorized access to of Disaster Recovery as a Service. 9.4. You are solely responsible for user access security or network access security with respect to your Content. 9.5. Xxxxxx shall use reasonable commercial efforts to assist in network security breach detection or identification. Xxxxxx provides absolutely no guarantees in relation to its efforts to identify security breaches and is not liable for any security breach that occurs despite its efforts. 9.6. You are responsible for identifying all user management rules for the account. This includes identifying which individuals have access to account administrative, security, technical and billing rights. You are responsible for any use of the account regardless of who uses the Services. 9.7. Xxxxxx will track all access to your Services through the online ticketing system/support system and will ensure that you have all your necessary documented approvals prior to accessing or changing your Services. If Xxxxxx cannot verify your identity or suspects that there may be fraudulent or illegal activity Xxxxxx may decline the request. In such an event Xxxxxx will attempt to contact the main or alternative contact or the Principal User. 9.8. When a situation is considered a security breach or could have serious consequences, Xxxxxx will notify you and will act on your behalf if Xxxxxx is unable to get correct approvals in a timely manner to deal with the threat. 9.9. In the event of any emergency that presents a substantial risk of a service outage, or damage to Xxxxxx Equipment or data belonging to Xxxxxx, a third party, the data centre facilities, or to any persons or property present therein, Xxxxxx shall take all reasonable measures to respond to the emergency; and only as necessary, Xxxxxx may disable Disaster Recovery as a Service if the emergency requires such action to avoid damage. 9.10. You agree to co-operate and assist Xxxxxx with any investigation or action taken in relation to Xxxxxx’ operations and provisioning of services, confirmation of your compliance with the Agreement and, or bre...
AutoNDA by SimpleDocs
Security Access and Fraud. 5.4.1 Rogers shall limit access to Managed Firewall Services and take reasonable security efforts to prevent unauthorized access to the Managed Firewall platform. You are solely responsible for End User access security or network access security with respect to your data. 5.4.2 Rogers shall use best practices to reasonably assist in network security breach detection or identification. Rogers provides absolutely no guarantees in relation to its efforts to identify security breaches and is not liable for any security breach that occurs despite its efforts. Rogers’ access control management policies ensure that Managed Firewall Services will utilize controls and logging in the IP Portal. Upon implementation of the order, you will identify all user management rules for the account. This will include identifying which individuals have access to account administrative, security, technical and billing rights. Changes to the access controls require the provision of your designated secure username and password. Credentials designated by you must utilize strong security traits (e.g. upper- and lower-case values, numeric and non- numeric values). You are responsible for credentials and must keep credentials secure and confidential. 5.4.3 Rogers will track all access to your Services through the IP Portal and will ensure that they have all your necessary documented approvals prior to accessing or changing your Services. 5.4.4 In the event of any emergency that presents a substantial risk of a service outage, or damage to Rogers Equipment or data belonging to Rogers, a third party, data center facilities, or to any persons or property present therein, Rogers shall take all reasonable measures to respond to the emergency; and only as necessary, Rogers may disable Managed Firewall Services if the emergency requires such action to avoid damage. 5.4.5 You agree to co-operate and assist Rogers with any investigation or action taken in relation to Rogers’ operations and provisioning of Services, confirmation of Your compliance with the Agreement and, or breach of the Agreement by you. 5.4.6 You are not permitted to run security penetration tests on the Managed Firewall Services without written approval from Rogers and any such actions will be considered improper use under the Agreement. Rogers may, without liability, restrict Managed Firewall Services platform access if you perform invasive platform testing without written approval.
Security Access and Fraud. 4.1 You agree to implement and is solely responsible for security of your data and for implementing security precautions and practices in relation to the use of the Colocation Services. You are solely responsible for any non-physical security breach or unauthorized usage of the Colocation Services, your equipment, including unmanaged Rogers’ equipment, and your accounts. 4.2 Rogers shall limit physical access to the Space and use commercially reasonable efforts to prevent unauthorized access to your equipment and, as determined by Rogers, to identify security breaches. Where a situation is considered a security breach, Rogers shall notify you as soon as feasible and may act on your behalf if Rogers is unable to get correct approvals from you in a timely manner to deal with the situation. However, Rogers shall not be liable for any inability, failure or mistake in doing so, nor any security breach that occurs despite its commercially reasonable efforts. Rogers provides absolutely no guarantees in relation to its efforts to identify security breaches. 4.3 You are solely responsible for establishing access and user management controls that clearly identify individuals who have access to your Space, account administration, security, technical and/or billing rights (“Access Control and User Management Controls”) and to communicate same to Rogers. You will inform Rogers in a timely manner of any change to your Access Control and User Management Controls, and shall be solely liable for any inconvenience, delay or damage that may result from any failure by you to do so. The Access Control and User Management Controls will be such that the individuals being authorized to access as well as those authorized to perform any changes to your Access Control and User Management Controls use appropriate secure credentials such as secure usernames and passwords, which credentials must utilize strong security traits. You are solely responsible for credentials and must keep credentials secure and confidential. 4.4 Rogers will track all access to your Colocation Services through an online ticketing system and ensure that those who requested access have all your necessary documented approvals prior to accessing your Colocation Services. 4.5 You agree to fully co-operate and assist Rogers in a timely manner with any investigation or action taken in relation to Rogers’ operations and/or provisioning of Colocation Services, confirmation of your compliance with the Agreement, and/ o...

Related to Security Access and Fraud

  • Access and Use 1. Each Party shall ensure that any service supplier of the other Party is accorded access to and use of public telecommunications transport networks and services in a timely fashion, on transparent, reasonable and nondiscriminatory terms and conditions. This obligation shall be applied, inter alia, through paragraphs 2 through 6. 2. Each Party shall ensure that service suppliers of the other Party have access to and use of any public telecommunications transport network or service offered within or across the border of that Party, including private leased circuits, and to this end shall ensure, subject to the provisions of paragraphs 5 and 6, that such suppliers are permitted: (a) to purchase or lease and attach terminal or other equipment which interfaces with the network and which is necessary to supply their services; (b) to interconnect private leased or owned circuits with public telecommunications transport networks and services or with circuits leased or owned by other service suppliers; (c) to use operating protocols of their choice in the supply of any service, other than as necessary to ensure the availability of telecommunications transport networks and services to the public generally; and (d) to perform switching, signaling and processing functions. 3. Each Party shall ensure that service suppliers of the other Party may use public telecommunications transport networks and services for the movement of information 4. Notwithstanding the provisions of paragraph 3, a Party may take such measures as are necessary: (a) to ensure the security and confidentiality of messages; or (b) to protect the personal data of users of public telecommunications transport networks or services, subject to the requirement that such measures are not applied in a manner which would constitute a means of arbitrary or unjustifiable discrimination or a disguised restriction on trade in services. 5. Each Party shall ensure that no condition is imposed on access to and use of public telecommunications transport networks and services other than as necessary: (a) to safeguard the public service responsibilities of suppliers of public telecommunications transport networks and services, in particular their ability to make their networks or services available to the public generally; or (b) to protect the technical integrity of public telecommunications transport networks or services.

  • Collateral Access Agreements Such Grantor shall use commercially reasonable efforts to obtain a Collateral Access Agreement, from the lessor of each leased property, mortgagee of owned property or bailee or consignee with respect to the operator of any warehouse, processor or converter facility or other location (each of which is identified on Exhibit B hereto), where Collateral in excess of $1,000,000 is stored or located at any given time (other than (i) company-owned facilities and (ii) retail stores), which agreement or letter shall provide access rights, contain a waiver or subordination of all Liens or claims that the landlord, mortgagee, bailee or consignee may assert against the Collateral at that location, and shall otherwise be reasonably satisfactory in form and substance to the Administrative Agent. With respect to such locations or warehouse space leased as of the Effective Date and thereafter where Collateral in excess of $1,000,000 is stored or located (other than (i) company-owned facilities and (ii) retail stores), if the Administrative Agent has not received a Collateral Access Agreement as of the Effective Date (or, if later as of the date such location is acquired or leased), the Borrower’s Eligible Inventory at that location shall be subject to such Reserves as may be established by the Administrative Agent. After the Effective Date, no real property or warehouse space shall be leased by such Grantor (other than retail stores) and no Inventory shall be shipped to a processor or converter under arrangements established after the Effective Date, unless and until a satisfactory Collateral Access Agreement shall first have been obtained with respect to such location or if it has not been obtained, the Borrower’s Eligible Inventory at that location shall be subject to the establishment of Reserves acceptable to the Administrative Agent. Such Grantor shall timely and fully pay and perform its obligations under all leases and other agreements with respect to each leased location or third party warehouse where any Collateral is or may be located.

  • Access and Security Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.

  • Zone File Access Agreement Registry Operator will enter into an agreement with any Internet user, which will allow such user to access an Internet host server or servers designated by Registry Operator and download zone file data. The agreement will be standardized, facilitated and administered by a Centralized Zone Data Access Provider, which may be ICANN or an ICANN designee (the “CZDA Provider”). Registry Operator (optionally through the CZDA Provider) will provide access to zone file data per Section 2.1.3 of this Specification and do so using the file format described in Section 2.1.4 of this Specification. Notwithstanding the foregoing, (a) the CZDA Provider may reject the request for access of any user that does not satisfy the credentialing requirements in Section 2.1.2 below; (b) Registry Operator may reject the request for access of any user that does not provide correct or legitimate credentials under Section 2.1.2 below or where Registry Operator reasonably believes will violate the terms of Section 2.1.5. below; and, (c) Registry Operator may revoke access of any user if Registry Operator has evidence to support that the user has violated the terms of Section 2.1.5 below.

  • Location of the Collateral Except in the ordinary course of Grantor’s business, Grantor agrees to keep the Collateral (or to the extent the Collateral consists of intangible property such as accounts or general intangibles, the records concerning the Collateral) at Grantor’s address shown above or at such other locations as are acceptable to Lender. Upon Lender’s request, Grantor will deliver to Lender in form satisfactory to Lender a schedule of real properties and Collateral locations relating to Grantor’s operations, including without limitation the following: (1) all real property Grantor owns or is purchasing; (2) all real property Grantor is renting or leasing; (3) all storage facilities Grantor owns, rents, leases, or uses; and (4) all other properties where Collateral is or may be located.

  • Access and Records ‌ A. County, the State of California and the United States Government and/or their representatives, shall have access, for purposes of monitoring, auditing, and examining, to Subrecipient’s activities, books, documents and papers (including computer records and emails) and to records of Subrecipient’s subcontractors, consultants, contracted employees, bookkeepers, accountants, employees and participants related to this Contract. Subrecipient shall insert this condition in each Contract between Subrecipient and a subcontractor that is pursuant to this Contract shall require the subcontractor to agree to this condition. Such departments or representatives shall have the right to make excerpts, transcripts and photocopies of such records and to schedule on site monitoring at their discretion. Monitoring activities also may include, but are not limited to, questioning employees and participants and entering any premises or onto any site in which any of the services or activities funded hereunder are conducted or in which any of the records of Subrecipient are kept. Subrecipient shall make available its books, documents, papers, financial records, etc., within three (3) days after receipt of written demand by Director which shall be deemed received upon date of sending. In the event Subrecipient does not make the above referenced documents available within the County of Orange, California, Subrecipient agrees to pay all necessary and reasonable expenses incurred by County, or County’s designee, in conducting any audit at the location where said records and books of account are maintained.

  • Access and Cooperation Each Party will, and will cause its Other Indemnified Persons to, cooperate and assist in all reasonable respects regarding such Third Party Claim, including by promptly making available to such other Party (and its legal counsel and other professional advisers with a reasonable need to know) all books and records of such Person relating to such Third Party Claim, subject to reasonable confidentiality precautions.

  • Perfection, Etc Subject to the Legal Reservations and Section 5.03, each Collateral Document delivered pursuant to this Agreement will, upon execution and delivery thereof, be effective to create in favor of the Collateral Agent for the benefit of the Secured Parties, legal, valid and enforceable Liens on, and security interests in, the Collateral described therein to the extent intended to be created thereby, except as to enforcement, as may be limited by applicable domestic bankruptcy, insolvency, fraudulent conveyance, reorganization (by way of voluntary arrangement, schemes of arrangements or otherwise), moratorium and other similar laws relating to or affecting creditors’ rights generally, general equitable principles (whether considered in a proceeding in equity or at law) and (a) when financing statements are filed in the offices of the Secretary of State of each Loan Party’s jurisdiction of organization or formation and applicable documents are filed and recorded as applicable in the United States Copyright Office or the United States Patent and Trademark Office and (b) upon the taking of possession or control by the Collateral Agent of such Collateral with respect to which a security interest may be perfected only by possession or control (which possession or control shall be given to the Collateral Agent to the extent possession or control by the Collateral Agent is required by the applicable Collateral Document) the Liens created by the Collateral Documents shall constitute fully perfected Liens so far as possible under relevant law on, and security interests in (to the extent intended to be created thereby and required to be perfected under the Loan Documents), all right, title and interest of the grantors in such Collateral in each case free and clear of any Liens other than Liens permitted hereunder.

  • Security Violations and Accounts Updates Grantee will adhere to the Confidentiality Article requirements and HHS Data Usage Agreement of this contract and immediately contact System Agency if a security violation is detected, or if Grantee has any reason to suspect that the security or integrity of the CMBHS data has been or may be compromised in any way.

  • Agreements with Third Parties Each member of the VL Group is in compliance in all material respects with each and every one of its obligations under agreements with third parties to which it is a party or by which it is bound, the breach of which could be expected to result in a Material Adverse Change.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!