Security aspects Sample Clauses

Security aspects. This cluster collects research topics such as reputation-based web of trust (WoT), aspects of security, security of proxy re-encryption schemes, new technologies, processes and security features for physical and virtual identity management. 7 xxxxx://xxx.xxx.xx/Regulation 8 ibid. 2017 - 2854 / 001 - 001 ● e-Signature aspects. Research topics such as long-term preservation of signatures, remote signatures, attribute management and exchange, cloud signature, signing of online contracts and global trust validation of electronic signatures. ● Mobile identity: mobile signing, mobile eID, mobile phone wallet systems and mobile-ID. ● Interoperability includes the topics of cross-border interoperability of electronic representation and electronic mandates and cross-border interoperability. ● Biometric aspects cluster includes research needs such as biometric identity, strengthening the link between physical documents linked to the biometric and the digital (online and also mobile) identity and Identity management and biometrics. ● Societal, ethical and legal aspects include needs related to the societal, ethical and legal aspects of identity theft, privacy-by-design principles, and ethical, legal and sociological requirements in the development of ePassport solutions and liability provisions in the eID and trust services regulation. Identified training needs that result from the collected projects include: interoperability aspects, different types of standards (identification protocols, authentication assurance, data protection, wireless public key infrastructure (PKI), open standards, standards for exchanging authentication and authorization data (XXXX), authentication), privacy (personal data), trust, security, distributed ledger techniques, ethics, mobile signature techniques, cloud computing, authentication methods/techniques/schemes, security in integrated circuits (detection of functional clones or of counterfeited circuits), societal aspects of identity, legal aspects of identity, usability, biometric technologies, encryption techniques, system friendliness, project management. Table 17. Identified projects involving eID and eSignature Project Call Project Acronym Project URL Project status Durati on (in years) Technologi es used Type Identified research needs Identified Training Needs FP7-ICT-2009- 5 ABC4Trust xxxxx://xxx0xxxxx.xx/index.php/h ome/fact-sheet finished 4 e-Identity / e- Signature proof of concept Federation and “interchangeability” of technol...
AutoNDA by SimpleDocs
Security aspects. The majority of the material to which the Contractor shall be exposed will be a maximum classification of RESTRICTED. The Contractor shall ensure that a sufficient number of contractors with appropriate security clearance are available to undertake the required work.
Security aspects. The provisions of [2] apply as modified by section 5 of this document.
Security aspects. CloudBand security design has been hardened with numerous measures, such as encryption of messages between system components. For example, messages between system components are encrypted. CloudBand also provides role-based access control in a multi- tenant environment, allowing different teams to securely share the NFV platform. The integrated Nuage Networks Virtualized Services Platform provides secure connectivity between the VNFs and their components, both within the data centre and across multiple locations.
Security aspects. Coming from the network slicing perspectives a comprehensive level of security have been discussed. - Isolation of Network slice instance in terms of resource and components including constituent functions. - Identification & authentication of the end users in terms of network slicing administration - Different security & policy rule enforcement depending on the network slice - Admission control for communications between network slice instances Distributed 5G core management platform provides secure and trusty network slicing orchestration & management mechanism for various application providers across the distributed networks.
Security aspects. VIII.A. NAT and Firewall traversal Not applicable. Access Gateways are trusted elements within the Operator’s network.

Related to Security aspects

  • Security Assessment If Accenture reasonably determines, or in good faith believes, that Supplier’s security practices or procedures do not meet Supplier’s obligations under the Agreement, then Accenture will notify Supplier of the deficiencies. Supplier will without unreasonable delay: (i) correct such deficiencies at its own expense; (ii) permit Accenture, or its duly authorized representatives, to assess Supplier’s security-related activities that are relevant to the Agreement; and (iii) timely complete a security questionnaire from Accenture on a periodic basis upon Accenture’s request. Security issues identified by Accenture will be assigned risk ratings and an agreed-to timeframe to remediate. Supplier will remediate all the security issues identified within the agreed to timeframes. Upon Supplier’s failure to remediate any high or medium rated security issues within the stated timeframes, Accenture may terminate the Agreement in accordance with Section 8 above.

  • Security Badging Any Company employee, or any employee of its contractors or agents, that require unescorted access to the Security Identification Display Area (SIDA) to perform work under this Agreement will be badged with an Airport identification badge (hereinafter referred to as "Badge") provided by Authority’s ID Badging Department and will be subject to an FBI fingerprint-based criminal history records check (CHRC) and an annual Security Threat Assessment (STA). A new or renewed Badge will not be issued to an individual until the results of the CHRC and the STA are completed and indicate that the applicant has not been convicted of a disqualifying criminal offense. If the CHRC or STA discloses a disqualifying criminal offense, the individual’s new or renewed badge application will be rejected. The costs of the CHRC and the annual STA will be paid by Company. These costs are subject to change without notice, and Company will be responsible for paying any increase in the costs. All badged employees of Company and its contractors or agents will comply with Authority's regulations regarding the use and display of Badges. Company will be assessed a fine for each Badge that is lost, stolen, unaccounted for or not returned to Authority at the time of Badge expiration, employee termination, termination of the Agreement, or upon written request by Authority. This fine will be paid by Company within 15 days from the date of invoice. The fine is subject to change without notice, and Company will be responsible for paying any increase in the fine. If any Company employee is terminated or leaves Company’s employment, Authority must be notified immediately, and the Badge must be returned to Authority promptly.

  • Security Assessments Upon advance written notice by the JBE, Contractor agrees that the JBE shall have reasonable access to Contractor’s operational documentation, records, logs, and databases that relate to data security and the Contractor’s Information Security Program. Upon the JBE’s request, Contractor shall, at its expense, perform, or cause to have performed an assessment of Contractor’s compliance with its privacy and data security obligations. Contractor shall provide to the JBE the results, including any findings and recommendations made by Contractor’s assessors, of such assessment, and, at its expense, take any corrective actions.

  • Security Audits Each Contract Year, County may perform or have performed security reviews and testing based on an IT infrastructure review plan. Such testing shall ensure all pertinent County security standards as well as any customer agency requirements, such as federal tax requirements or HIPPA.

  • Security of All Software Components Supplier will inventory all software components (including open source software) used in Deliverables, and provide such inventory to Accenture upon request. Supplier will assess whether any such components have any security defects or vulnerabilities that could lead to a Security Incident. Supplier will perform such assessment prior to providing Accenture with access to such software components and on an on-going basis thereafter during the term of the Agreement. Supplier will promptly notify Accenture of any identified security defect or vulnerability and remediate same in a timely manner. Supplier will promptly notify Accenture of its remediation plan. If remediation is not feasible in a timely manner, Supplier will replace the subject software component with a component that is not affected by a security defect or vulnerability and that does not reduce the overall functionality of the Deliverable(s).

  • Security Audit Customer agrees that PROS’ Audit Report will be used to satisfy any audit or inspection requests by or on behalf of Customer, and PROS will make Audit Reports available to Customer upon request. PROS will promptly remediate any material weaknesses or significant control deficiencies identified in any Audit Reports. In the event that an audit opinion is qualified and the qualification has not been remediated by the date of the Audit Report, PROS shall (i) provide Customer with PROS remediation plan; and (ii) execute such plan in accordance with its terms.

  • Compliance Monitoring Grantee must be subject to compliance monitoring during the period of performance in which funds are Expended and up to three years following the closeout of all funds. In order to assure that the program can be adequately monitored, the following is required of Grantee:

  • Security Management The Contractor shall comply with the requirements of the DOD 5200.1-M and the DD Form 254. Security of the Contractor’s electronic media shall be in accordance with the above documents. Effective Program Security shall require the Contractor to address Information Security and Operations Security enabled by the Security Classification Guides. The Contractor’s facility must be able to handle and store material up to the Classification Level as referenced in Attachment J-01, DD Form 254.

  • Security Technology When the service is accessed using a supported web browser, Secure Socket Layer (“SSL”), or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall include server authentication and data encryption. Provider shall host data pursuant to the DPA in an environment using a firewall that is periodically updated according to industry standards.

  • Security Safeguards (1) Each party acknowledges that it is solely responsible for determining and communicating to the other the appropriate technological, physical, and organizational security measures required to protect Personal Data.

Time is Money Join Law Insider Premium to draft better contracts faster.