Security and encryption Sample Clauses

Security and encryption. 16.1 The Licensee will deploy industry standard security and content protection systems and technologies designed to protect and maintain the security and integrity of the Repertoire Works. 16.2 Save as may be permitted by law, the Licensee agrees that it will not (and will procure that any relevant party will not) attempt: 16.2.1 to remove or alter any DRM or identifier information that may be associated with any Repertoire Works; or 16.2.2 to circumvent any technical measures associated with any Repertoire Work which are designed to track, prevent or restrict the unauthorised use of any Repertoire Work. 16.3 The Licensee will take all necessary steps to ensure that any and all Streaming or On- Demand Streaming services used by Users from the Licensed Services cannot be converted into Downloads. 16.4 The Licensee undertakes to implement, with reasonable skill and care in a workmanlike and professional manner according to good industry practice and consistent with professional standards in the IT industry, all appropriate technical, organisational and security measures in order to protect against
AutoNDA by SimpleDocs
Security and encryption. Save as may be permitted by law, the Licensee agrees it shall not (and shall procure that any Relevant Party shall not) attempt to: (a) remove or alter any rights management or identifier information that may be associated with any Repertoire Works; or (b) circumvent any technical measures associated with any Repertoire Work which are designed to prevent or restrict the unauthorised use of any Repertoire Work.
Security and encryption. Unless agreed otherwise, the Licensee will utilise or require the utilisation of an industry security standard which is developed and is available for use in the protection of Repertoire Works. Until such time, the Licensee must use its reasonable endeavours to prevent unauthorised copying and/or the unauthorised issuing of copies of Repertoire Works by whatever technical means are practicable. Upon request the Licensee will inform the Licensors concerning its progress in relation to fulfilling this obligation.
Security and encryption. 1. In order to ensure the security and reliable operation of the service to all subscribers, NWET hereby reserves the right to take whatever action NWET finds necessary to preserve the security and reliability of the service. 2. The subscriber acknowledges that he/she is prohibited from compromising the security or tampering with system resources or accounts on computers at NWET, or at any other site, and where NWET encrypts and transmission, tampering with or attempting any unauthorised decryption of any encrypted data transmitted on the service. 3. The subscriber also acknowledges that he/she is bound by any laws that may be in force from time to time regulating the security of networks and the integrity of encrypted data and that any violations of this clause 9 may lead to civil or criminal liability. 4. NWET will use reasonable endeavours to preserve the privacy of any information intended to be received by the subscriber using the service and the subscriber hereby indemnifies and holds NWET free from liability for any loss or damage of whatever kind suffered by the subscriber or any third party as a consequence of any breach of privacy, including but not limited to the information being received by a person other than the subscriber.
Security and encryption. 12.1 Unless agreed otherwise, the Licensee will utilise or require the utilisation of an industry security standard which is developed and is available for use in the protection of Repertoire Works. Until such time, the Licensee must use its reasonable endeavours to prevent unauthorised copying and/or the unauthorised issuing of copies of Repertoire Works by whatever technical means are practicable. Upon request, the Licensee will inform the Licensors concerning its activities in relation to fulfilling this obligation. 12.2 Save as may be permitted by law, the Licensee agrees it shall not (and shall procure that any Relevant Party shall not) attempt to: (a) remove or alter any rights management or identifier information that may be associated with any Repertoire Works; or (b) circumvent any technical measures associated with any Repertoire Work which are designed to prevent or restrict the unauthorised use of any Repertoire Work.
Security and encryption. [Reserved.] – Addressed in Standard Terms and Conditions for Deferred Compensation Plan Recordkeeping and Administrative Services in Schedule C, Exhibit 2 and 3.
Security and encryption a. We use the highest level of security and encryption methods available for processing payments online. We also strictly adhere to best practices of data protection. That means your payment details are as secure as they possibly can be when making a purchase with us. b. The School of Professional Studies shall implement reasonable measures to ensure that correspondence and machines used during training events are free from viruses and potentially harmful malicious software. c. The School of Professional Studies makes no warranty for the reliability, protection, or virus-free nature of the material that is downloaded from our website.
AutoNDA by SimpleDocs
Security and encryption. Security is a top priority, and Dubber typically offers encryption and access controls to protect the sensitive voice data stored in its cloud platform. • Scalability: The platform is designed to be scalable, making it suitable for businesses of all sizes, from small enterprises to large corporations. • Business Insights: By analyzing recorded voice data, Xxxxxx can provide businesses with valuable insights and trends, helping them make informed decisions and improve their operations. • Scalable Across All Communication Channels: A single license that enables content to be captured across and unlimited number of communication & voice platforms that employees of an organization would use across their daily activities.
Security and encryption 

Related to Security and encryption

  • Security and Privacy Security and privacy policies for the Genesys Cloud Service addressing use of Customer Data, which are incorporated by reference and may be updated from time to time in accordance with Section 10.12 of the Agreement, are located at xxxxx://xxxx.xxxxxxxxxxx.xxx/articles/purecloud-security-compliance/.

  • Data Security and Privacy (a) Each Group Member is, and at all times, has been, in compliance in all material respects with (i) all applicable Data Protection Laws, including, to the extent applicable, but not limited to the GDPR and those relating to cross-border transfers; (ii) all applicable contractual obligations of each Loan Party and its Subsidiaries concerning data privacy and security relating to Personal Data in the possession or control of any Group Member or maintained by third parties on behalf of such Group Member and having access to such information under contracts (or portions thereof) to which a Group Member is a party; and (iii) all applicable data transfer agreements and data processing agreements, including the EU standard contractual clauses, to which a Group Member is a party (collectively, “Privacy Agreements”): (b) Each Group Member is, and has been, in compliance in all material respects with all applicable prior and current written internal and public-facing privacy policies and notices of the Group Members regarding the collection, retention, use, processing, disclosure and distribution of Personal Data by the Group Members or their respective agents (collectively, the “Privacy Policies”), and the Privacy Policies have been maintained to be consistent in all material respects with the actual practices of each Group Member. The Privacy Policies contemplate the Group Members’ current uses of the Personal Data, and to the extent required under applicable Data Protection Laws, each Group Member has sought and obtained the appropriate consent from the applicable data subject for such uses. The Privacy Policies have made all material disclosures to users, customers, employees, or other individuals required by Data Protection Laws. (c) Each Group Member has implemented and maintains a commercially reasonable security program (“Security Program”) that (i) complies in all material respects with all applicable Data Protection Laws, applicable Privacy Policies, and applicable Privacy Agreements, and (ii) includes commercially reasonable administrative, technical, organization, and physical security procedures and measures designed to preserve the security and integrity of all Personal Data and any other sensitive or confidential information or data related to each Group Member (collectively, “Company Sensitive Information”) in such Group Member’s possession or control and to protect such Company Sensitive Information against unauthorized or unlawful processing, access, acquisition, use, theft, interruption, modification, disclosure, loss, destruction or damage. (d) Except as disclosed on Schedule 4.23(d), there has been (i) no actual, suspected or alleged (in writing) incidents of unauthorized access, use, intrusion, disclosure or breach of the security of any information technology systems owned or controlled by a Group Member or any of their contractors and used by such contractors on behalf of a Group Member, and (ii) no actual, suspected or alleged (in writing) incidents of unauthorized acquisition, destruction, damage, disclosure, loss, corruption, alteration, or use of any Company Sensitive Information, in each case that could reasonably be expected to cause a Material Adverse Effect. (e) Each Group Member has a valid and legal right (whether contractually, by applicable law or otherwise) to access or use all Personal Data that is accessed and used by or on behalf of a Group Member in connection with the sale, use and/or operation of their products, services and businesses. (f) Except as would not reasonably be expected to have a Material Adverse Effect, there is no pending or to the knowledge of any Loan Party, threatened in writing, complaints, claims, demands, inquiries, proceedings, or other notices, including any notices of any investigation or other legal proceedings, regarding a Group Member, initiated by (i) any Governmental Authority, including the United States Federal Trade Commission, a state attorney general, data protection authority or similar state official, or a supervisory authority; (ii) any counterparty to, or subject of, a Privacy Agreement; or (iii) any self-regulatory authority or entity, alleging that any activity of a Group Member: (1) is in violation of any applicable Data Protection Laws, (2) is in violation of any Privacy Agreements, (3) is in violation of any Privacy Policies or (4) is otherwise in violation of any person’s privacy, personal or confidentiality rights.

  • Security and Safety A. The Contractor warrants it is and shall remain in compliance with all applicable local, state and federal laws, regulations, codes and ordinances relating to fire, construction, building, health, food service and safety, including but not limited to the Hotel and Motel Fire Safety Act of 1990, Public Law 101-391. The Judicial Council may terminate this Agreement, pursuant to the termination for cause provision set forth herein, without penalty or prejudice if the Contractor fails to comply with the foregoing requirements. B. The Contractor shall assure that each Attendee is advised of all the appropriate precautions that should be taken to provide for the Attendee’s safety while on the Property. The Contractor shall take every reasonable precaution to provide for the security of Attendees and their belongings. C. The Contractor shall immediately advise the Judicial Council’s staff of any known problems that involve the Attendees during the Program including, but not limited to, assaults, burglaries, accidents, and/or illnesses.

  • Security and Charge 15.1 In consideration of the Supplier agreeing to supply the Goods, the Client charges all of its rights, title and interest (whether joint or several) in any land, realty or other assets capable of being charged, owned by the Client either now or in the future, to secure the performance by the Client of its obligations under these terms and conditions (including, but not limited to, the payment of any money). 15.2 The Client indemnifies the Supplier from and against all the Supplier’s costs and disbursements including legal costs on a solicitor and own client basis incurred in exercising the Supplier’s rights under this clause. 15.3 The Client irrevocably appoints the Supplier and each director of the Supplier as the Client’s true and lawful attorney/s to perform all necessary acts to give effect to the provisions of this clause 15 including, but not limited to, signing any document on the Client’s behalf.

  • Security and Data Transfers Party shall comply with all applicable State and Agency of Human Services' policies and standards, especially those related to privacy and security. The State will advise the Party of any new policies, procedures, or protocols developed during the term of this agreement as they are issued and will work with the Party to implement any required. Party will ensure the physical and data security associated with computer equipment, including desktops, notebooks, and other portable devices, used in connection with this Agreement. Party will also assure that any media or mechanism used to store or transfer data to or from the State includes industry standard security mechanisms such as continually up-to-date malware protection and encryption. Party will make every reasonable effort to ensure media or data files transferred to the State are virus and spyware free. At the conclusion of this agreement and after successful delivery of the data to the State, Party shall securely delete data (including archival backups) from Party’s equipment that contains individually identifiable records, in accordance with standards adopted by the Agency of Human Services. Party, in the event of a data breach, shall comply with the terms of Section 7 above.

  • Encryption The Fund acknowledges and agrees that encryption may not be available for every communication through the System, or for all data. The Fund agrees that Custodian may deactivate any encryption features at any time, without notice or liability to the Fund, for the purpose of maintaining, repairing or troubleshooting the System or the Software.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Security and Access The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities Information Technology and Access Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Access Resources or other Company property or materials by others.

  • Security Cameras Security cameras have been installed throughout the Facility; however, they will not routinely be used in areas where there is an expectation of privacy, such as restrooms or patient care areas.

  • Data Security and Privacy Plan As more fully described herein, throughout the term of the Subscription Agreement, Vendor will have a Data Security and Privacy Plan in place to protect the confidentiality, privacy and security of the Protected Data it receives from the District. Vendor’s Plan for protecting the District’s Protected Data includes, but is not limited to, its agreement to comply with the terms of the District’s Bill of Rights for Data Security and Privacy, a copy of which is set forth below and has been signed by the Vendor. Additional components of Vendor’s Data Security and Privacy Plan for protection of the District’s Protected Data throughout the term of the Subscription Agreement are as follows: (a) Vendor will implement all state, federal, and local data security and privacy requirements including those contained within the Subscription Agreement and this Data Sharing and Confidentiality Agreement, consistent with the District’s data security and privacy policy. (b) Vendor will have specific administrative, operational and technical safeguards and practices in place to protect Protected Data that it receives from the District under the Subscription Agreement. (c) Vendor will comply with all obligations contained within the section set forth in this Exhibit below entitled “Supplemental Information about a Subscription Agreement between [Xxxxx-Fultonville Central School District] and [Vendor Name].” Vendor’s obligations described within this section include, but are not limited to: (i) its obligation to require subcontractors or other authorized persons or entities to whom it may disclose Protected Data (if any) to execute written agreements acknowledging that the data protection obligations imposed on Vendor by state and federal law and the Subscription Agreement shall apply to the subcontractor, and (ii) its obligation to follow certain procedures for the return, transition, deletion and/or destruction of Protected Data upon termination, expiration or assignment (to the extent authorized) of the Subscription Agreement. (d) Vendor has provided or will provide training on the federal and state laws governing confidentiality of Protected Data for any of its officers or employees (or officers or employees of any of its subcontractors or assignees) who will have access to Protected Data, prior to their receiving access. (e) Vendor will manage data security and privacy incidents that implicate Protected Data and will develop and implement plans to identify breaches and unauthorized disclosures. Vendor will provide prompt notification to the District of any breaches or unauthorized disclosures of Protected Data in accordance with the provisions of Section 5 of this Data Sharing and Confidentiality Agreement.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!