Security and encryption Sample Clauses

Security and encryption. 16.1 The Licensee will deploy industry standard security and content protection systems and technologies designed to protect and maintain the security and integrity of the Repertoire Works.
AutoNDA by SimpleDocs
Security and encryption. Save as may be permitted by law, the Licensee agrees it shall not (and shall procure that any Relevant Party shall not) attempt to:
Security and encryption. Unless agreed otherwise, the Licensee will utilise or require the utilisation of an industry security standard which is developed and is available for use in the protection of Repertoire Works. Until such time, the Licensee must use its reasonable endeavours to prevent unauthorised copying and/or the unauthorised issuing of copies of Repertoire Works by whatever technical means are practicable. Upon request the Licensee will inform the Licensors concerning its progress in relation to fulfilling this obligation.
Security and encryption. 1. In order to ensure the security and reliable operation of the service to all subscribers, NWET hereby reserves the right to take whatever action NWET finds necessary to preserve the security and reliability of the service.
Security and encryption. Security is a top priority, and Dubber typically offers encryption and access controls to protect the sensitive voice data stored in its cloud platform. • Scalability: The platform is designed to be scalable, making it suitable for businesses of all sizes, from small enterprises to large corporations. • Business Insights: By analyzing recorded voice data, Xxxxxx can provide businesses with valuable insights and trends, helping them make informed decisions and improve their operations. • Scalable Across All Communication Channels: A single license that enables content to be captured across and unlimited number of communication & voice platforms that employees of an organization would use across their daily activities.
Security and encryption. [Reserved.] – Addressed in Standard Terms and Conditions for Deferred Compensation Plan Recordkeeping and Administrative Services in Schedule C, Exhibit 2 and 3.
Security and encryption a. We use the highest level of security and encryption methods available for processing payments online. We also strictly adhere to best practices of data protection. That means your payment details are as secure as they possibly can be when making a purchase with us.
AutoNDA by SimpleDocs
Security and encryption 

Related to Security and encryption

  • Security and Privacy 3. Security and privacy policies for the Genesys Cloud Service addressing use of Customer Data, which are incorporated by reference, are located at xxxxx://xxxx.xxxxxxxxxxx.xxx/articles/Genesys Cloud-security-compliance/.

  • Data Security and Privacy 12.1 SERVICE PROVIDER acknowledges the importance of Data Security and agrees to adhere to the Terms and Conditions of the Data Security Policy of IIMC.

  • Security and Validation Procedures The SC shall apply to the Meter Data of the SC Metered Entities that it represents, the security and validation procedures prescribed by the relevant Local Regulatory Authority. If the relevant Local Regulatory Authority has not prescribed any such procedures, the SC shall apply the procedures set forth in the Metering Protocol of the ISO Tariff. Meter Data submitted by an SC for SC Metered Entities shall conform to these standards unless the ISO has, at its discretion, exempted the SC from these standards.

  • Security and Charge 14.1 In consideration of the Contractor agreeing to supply the Materials, the Client charges all of its rights, title and interest (whether joint or several) in any land, realty or other assets capable of being charged, owned by the Client either now or in the future, to secure the performance by the Client of its obligations under these terms and conditions (including, but not limited to, the payment of any money).

  • Security and Data Transfers Party shall comply with all applicable State and Agency of Human Services' policies and standards, especially those related to privacy and security. The State will advise the Party of any new policies, procedures, or protocols developed during the term of this agreement as they are issued and will work with the Party to implement any required. Party will ensure the physical and data security associated with computer equipment, including desktops, notebooks, and other portable devices, used in connection with this Agreement. Party will also assure that any media or mechanism used to store or transfer data to or from the State includes industry standard security mechanisms such as continually up-to-date malware protection and encryption. Party will make every reasonable effort to ensure media or data files transferred to the State are virus and spyware free. At the conclusion of this agreement and after successful delivery of the data to the State, Party shall securely delete data (including archival backups) from Party’s equipment that contains individually identifiable records, in accordance with standards adopted by the Agency of Human Services. Party, in the event of a data breach, shall comply with the terms of Section 7 above.

  • Encryption The Fund acknowledges and agrees that encryption may not be available for every communication through the System, or for all data. The Fund agrees that Custodian may deactivate any encryption features at any time, without notice or liability to the Fund, for the purpose of maintaining, repairing or troubleshooting the System or the Software.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!