Security approaches Sample Clauses

Security approaches. Railway standards do not determine requirements for security, as mentioned earlier. An exception is the standard EN 50159, which defines security requirements only for communication in transmission systems. These security requirements have been extended by further requirements after analysis. The tasks of security should be integrated into all phases of life cycle like tasks of safety. For example, EN 50159 provides a classification scheme for transmission systems. A transmission system is assigned a class according to defined criteria (Pr1, Pr2, Pr3). The standard defines threats and requirements for defences. Each classification of a transmission system has to consider concrete threats and their relation with appropriate defences. Categories and threats are described briefly below: Category 1 – Closed transmission systems, where all essential properties of the system are under the control of the safety-related system designer, and a simplified set of safety requirements can be defined; Category 2 – Open transmission systems where, although the transmission is not fully under the control of the safety-related system designer, the risk of malicious attack can be considered negligible; Category 3 – Open transmission system where there is opportunity for malicious attack, and cryptographic defence measures are required. Table 20 lists relations between threats and defences: Threats Defences Repetition X X Deletion X Insertion X Xa Xb Xb Re-sequence X X Corruption X X Delay X X Masquerade Xb Xb X a Only applicable for source identifier. Will only detect insertion from invalid source. If unique identifiers cannot be determined because of unknown users, cryptographic techniques shall be used. b Application dependent.
AutoNDA by SimpleDocs

Related to Security approaches

  • Intellectual Property Security Agreements Duly executed originals of Trademark Security Agreements, Copyright Security Agreements and Patent Security Agreements, each dated the Closing Date and signed by each Credit Party which owns Trademarks, Copyrights and/or Patents, as applicable, all in form and substance reasonably satisfactory to Agent, together with all instruments, documents and agreements executed pursuant thereto.

  • Intellectual Property Protection The Group Companies shall establish and maintain appropriate intellectual inspection system to protect the Proprietary Rights of the Group Companies. The Group Companies shall, and the Founders shall cause the Group Companies to fully comply with the laws and regulations in respect of the protection of the Proprietary Rights and refrain from infringing the Proprietary Rights of other parties. Ecommerce Company shall, and the other Warrantors shall procure Ecommerce Company to, use its best efforts to obtain as soon as possible and maintain the registration of the core trademarks used in the Business (including without limitation, the marks of “perfect diary”, “完美日记” and the combination of the foregoing) in the appropriate goods and services (including without limitation, cosmetics, cosmetics tools and advertisement). The Group Companies shall take all necessary or desirable actions to protect their trademarks, including initiating trademark petitions against any trademark applications filed by any third party for a trademark identical or similar to the Group Companies’ trademarks.

  • Intellectual Property, etc Each of Holdings and each of its Subsidiaries owns or has the right to use all domestic and foreign patents, trademarks, permits, domain names, service marks, trade names, copyrights, licenses, franchises, inventions, trade secrets, proprietary information and know-how of any type, whether or not written (including, but not limited to, rights in computer programs and databases) and formulas, or other rights with respect to the foregoing, and has obtained assignments of all leases, licenses and other rights of whatever nature, in each case necessary for the conduct of its business, without any known conflict with the rights of others which, or the failure to obtain which, as the case may be, individually or in the aggregate, has had, or could reasonably be expected to have, a Material Adverse Effect.

  • ACKNOWLEDGEMENT AND PROTECTION OF INTELLECTUAL PROPERTY RIGHTS 1. Licensee acknowledges that all Intellectual Property Rights in the Licensed Material are the property of the Publisher or duly licensed to the Publisher and that this Licence Agreement does not assign or transfer to the Licensee any right, title or interest therein except for the right to access and use the Licensed Material in accordance with the terms and conditions of this Licence Agreement. 2. For the avoidance of doubt, the Publisher hereby acknowledges that any database rights created by the Licensee or the Institutions as a result of Local Hosting, text mining or data mining of the Licensed Material shall be the property of the Licensee, or the Institution.

  • Security Technology When the service is accessed using a supported web browser, Secure Socket Layer (“SSL”), or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall include server authentication and data encryption. Provider shall host data pursuant to the DPA in an environment using a firewall that is periodically updated according to industry standards.

  • Security and Access The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities Information Technology and Access Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Access Resources or other Company property or materials by others.

  • Contractor Intellectual Property Contractor shall retain all right, title and interest in and to any work, ideas, inventions, discoveries, tools, methodology, computer programs, processes and improvements and any other intellectual property, tangible or intangible, that has been created by Contractor prior to entering into this Contract (“Contractor Intellectual Property”). Should the State require a license for the use of Contractor Intellectual Property in connection with the development or use of the items that Contractor is required to deliver to the State under this Contract, including Work Product (“Deliverables”), the Contractor shall grant the State a royalty-free license for such development and use. For the avoidance of doubt, Work Product shall not be deemed to include Contractor Intellectual Property, provided the State shall be granted an irrevocable, perpetual, non-exclusive royalty-free license to use any such Contractor Intellectual Property that is incorporated into Work Product.

  • Intellectual Property/Work Product Ownership All data, technical information, materials first gathered, originated, developed, prepared, or obtained as a condition of this agreement and used in the performance of this agreement -- including, but not limited to all reports, surveys, plans, charts, literature, brochures, mailings, recordings (video or audio), pictures, drawings, analyses, graphic representations, software computer programs and accompanying documentation and printouts, notes and memoranda, written procedures and documents, which are prepared for or obtained specifically for this agreement, or are a result of the services required under this grant -- shall be considered "work for hire" and remain the property of the State of Vermont, regardless of the state of completion unless otherwise specified in this agreement. Such items shall be delivered to the State of Vermont upon 30- days notice by the State. With respect to software computer programs and / or source codes first developed for the State, all the work shall be considered "work for hire,” i.e., the State, not the Party (or subcontractor or sub-grantee), shall have full and complete ownership of all software computer programs, documentation and/or source codes developed. Party shall not sell or copyright a work product or item produced under this agreement without explicit permission from the State of Vermont. If Party is operating a system or application on behalf of the State of Vermont, Party shall not make information entered into the system or application available for uses by any other party than the State of Vermont, without prior authorization by the State. Nothing herein shall entitle the State to pre-existing Party’s materials. Party acknowledges and agrees that should this agreement be in support of the State's implementation of the Patient Protection and Affordable Care Act of 2010, Party is subject to the certain property rights provisions of the Code of Federal Regulations and a Grant from the Department of Health and Human Services, Centers for Medicare & Medicaid Services. Such agreement will be subject to, and incorporates here by reference, 45 CFR 74.36, 45 CFR 92.34 and 45 CFR 95.617 governing rights to intangible property.

  • Patent Applications It is understood by the parties that, pursuant to the Baylor Technology Transfer Agreement, MAS has the initial responsibility for filing, prosecution and maintenance of Patents and Patent Applications covering the Baylor Technology. The parties agree that, as between MAS and CTI, MAS shall be responsible for deciding whether and how to file, prosecute and maintain the Patents and Patent Applications, provided that: (a) all decisions of MAS (whether substantive or procedural) concerning whether and how to file, prosecute and/or maintain any Patents and Patent Applications shall be acceptable to CTI, such acceptance not to be unreasonably withheld; (b) with respect to any action permitted under Section 5.5 of the Baylor Technology Transfer Agreement or Section 5.5 of this Agreement, MAS will use legal counsel reasonably acceptable to CTI; (c) MAS will provide CTI with (i) drafts of all filings relating to the Patents and Patent Applications and (ii) drafts of all correspondence to be sent by MAS to Baylor, the Patent and Trademark Office (the “PTO”) or any third party relating to the Patents and Patent Applications. Final versions of all such filings and correspondence shall be acceptable to CTI, such acceptance not to be unreasonably withheld; (d) MAS will promptly provide CTI with copies of any notices and other correspondence received by CTI from Baylor, the PTO or any other third party relating to the Patents and Patent Applications, including, but not limited to, any notices received by MAS pursuant to Section 5.5 of the Baylor Technology Transfer Agreement; (e) MAS will, if requested by CTI, provide notice to Baylor under any of the circumstances permitting notice pursuant to Section 5.5 of the Baylor Technology Transfer Agreement; (f) MAS agrees to cooperate with CTI to whatever extent is reasonably necessary to procure patent protection of any rights regarding the Licensed Technology and agrees to execute any and all documents to give CTI the full benefit of the sublicenses and licenses granted herein; (g) MAS represents and warrants that, as of the Effective Date, it has not received any notices from Baylor pursuant to Section 5.5(c) or Section 5.5(d) of the Baylor Technology Transfer Agreement. In the event MAS receives any notices from Baylor pursuant to Section 5.5(c) or Section 5.5(d) of the Baylor Technology Transfer Agreement after the Effective Date. MAS will provide a copy of such notice to CTI within five (5) business days of receipt of such notice by MAS. MAS will then take all actions requested by CTI to allow CTI to retain its rights granted under this Agreement, including, but not limited to, promptly notifying Baylor in the event CTI wishes MAS to proceed with any actions in connection with the Patents or Patent Applications.

  • Intellectual Property Ownership We, our affiliates and our licensors will own all right, title and interest in and to all Products. You will be and remain the owner of all rights, title and interest in and to Customer Content. Each party will own and retain all rights in its trademarks, logos and other brand elements (collectively, “Trademarks”). To the extent a party grants any rights or licenses to its Trademarks to the other party in connection with this Agreement, the other party’s use of such Trademarks will be subject to the reasonable trademark guidelines provided in writing by the party that owns the Trademarks.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!