Security aspects Sample Clauses

Security aspects. The provisions of [2] apply as modified by section 5 of this document.
AutoNDA by SimpleDocs
Security aspects. CloudBand security design has been hardened with numerous measures, such as encryption of messages between system components. For example, messages between system components are encrypted. CloudBand also provides role-based access control in a multi- tenant environment, allowing different teams to securely share the NFV platform. The integrated Nuage Networks Virtualized Services Platform provides secure connectivity between the VNFs and their components, both within the data centre and across multiple locations.
Security aspects. Coming from the network slicing perspectives a comprehensive level of security have been discussed. - Isolation of Network slice instance in terms of resource and components including constituent functions. - Identification & authentication of the end users in terms of network slicing administration - Different security & policy rule enforcement depending on the network slice - Admission control for communications between network slice instances Distributed 5G core management platform provides secure and trusty network slicing orchestration & management mechanism for various application providers across the distributed networks.
Security aspects. A. NAT and Firewall traversal Not applicable. Access Gateways are trusted elements within the Operator’s network.
Security aspects. This cluster collects research topics such as reputation-based web of trust (WoT), aspects of security, security of proxy re-encryption schemes, new technologies, processes and security features for physical and virtual identity management. 7 xxxxx://xxx.xxx.xx/Regulation 8 ibid. ● e-Signature aspects. Research topics such as long-term preservation of signatures, remote signatures, attribute management and exchange, cloud signature, signing of online contracts and global trust validation of electronic signatures. ● Mobile identity: mobile signing, mobile eID, mobile phone wallet systems and mobile-ID. ● Interoperability includes the topics of cross-border interoperability of electronic representation and electronic mandates and cross-border interoperability. ● Biometric aspects cluster includes research needs such as biometric identity, strengthening the link between physical documents linked to the biometric and the digital (online and also mobile) identity and Identity management and biometrics. ● Societal, ethical and legal aspects include needs related to the societal, ethical and legal aspects of identity theft, privacy-by-design principles, and ethical, legal and sociological requirements in the development of ePassport solutions and liability provisions in the eID and trust services regulation. Identified training needs that result from the collected projects include: interoperability aspects, different types of standards (identification protocols, authentication assurance, data protection, wireless public key infrastructure (PKI), open standards, standards for exchanging authentication and authorization data (XXXX), authentication), privacy (personal data), trust, security, distributed ledger techniques, ethics, mobile signature techniques, cloud computing, authentication methods/techniques/schemes, security in integrated circuits (detection of functional clones or of counterfeited circuits), societal aspects of identity, legal aspects of identity, usability, biometric technologies, encryption techniques, system friendliness, project management. FP7-ICT-2009- 5 ABC4Trust xxxxx://xxx0xxxxx.xx/index.php/h ome/fact-sheet finished 4 e-Identity / e- Signature proof of concept Federation and “interchangeability” of technologies that support trustworthy yet privacy-preserving Attribute- based Credentials (ABC) ● Privacy technologies ● Standards (authentication) ● Authentication methods H2020-FCT- 2015 ARIES xxxxx://xxxxx-xxxxxxx.xx/ ongoing 2.5 e-Identity...
Security aspects. The majority of the material to which the Contractor shall be exposed will be a maximum classification of RESTRICTED. The Contractor shall ensure that a sufficient number of contractors with appropriate security clearance are available to undertake the required work.

Related to Security aspects

  • Security Assessment If Accenture reasonably determines, or in good faith believes, that Supplier’s security practices or procedures do not meet Supplier’s obligations under the Agreement, then Accenture will notify Supplier of the deficiencies. Supplier will without unreasonable delay: (i) correct such deficiencies at its own expense; (ii) permit Accenture, or its duly authorized representatives, to assess Supplier’s security-related activities that are relevant to the Agreement; and (iii) timely complete a security questionnaire from Accenture on a periodic basis upon Accenture’s request. Security issues identified by Accenture will be assigned risk ratings and an agreed-to timeframe to remediate. Supplier will remediate all the security issues identified within the agreed to timeframes. Upon Supplier’s failure to remediate any high or medium rated security issues within the stated timeframes, Accenture may terminate the Agreement in accordance with Section 8 above.

  • DESCRIPTION OF THE PROPERTY 13.1 The Property as referred to in the Proclamation of Sale shall be deemed to have been correctly and sufficiently described. 13.2 All intended bidders including the Purchaser shall be deemed to have sought independent legal advice, made necessary enquiries, searches and inspection of the Property and is satisfied with the identity, description, state and condition of the Property. 13.3 In the event of any error, misstatement, omission and/or misdescription of any kind relating to the Property in the Proclamation of Sale or any other documents, such error, misstatement, omission and/or misdescription shall not in any manner annul the sale, nor shall there be any adjustment of the Purchase Price nor shall compensation be allowed nor shall the Bank be open to any liability of any form. 13.4 If the land or floor area of the property is found to exceed that as described and additional payment is imposed for the excess area by the Developer and/or relevant authorities, then such additional payment shall be solely and absolutely borne and paid by the Purchaser 13.5 If the land or floor area of the property is found to be less that as described, any claim for the reduced area shall be undertaken solely by the Purchaser against the Developer and/or such party and neither the Assignee/ Bank , the Assignee/ Bank’s solicitors nor the Auctioneer shall in any way responsible or liable for such claim. The auction sale herein shall not be annulled and there shall not be any adjustment of the Purchase Price as a result of such shortfall in the area of the Property.

  • DESCRIPTION OF COLLATERAL AND GUARANTIES Repayment of the Indebtedness is secured by the Collateral as described in the Loan Agreement. Hereinafter, the above-described security documents and guaranties, together with all other documents securing repayment of the Indebtedness shall be referred to as the "Security Documents". Hereinafter, the Security Documents, together with all other documents evidencing or securing the Indebtedness shall be referred to as the "Existing Loan Documents".

  • Intellectual Property Security Agreements Duly executed originals of Trademark Security Agreements, Copyright Security Agreements and Patent Security Agreements, each dated the Closing Date and signed by each Credit Party which owns Trademarks, Copyrights and/or Patents, as applicable, all in form and substance reasonably satisfactory to Agent, together with all instruments, documents and agreements executed pursuant thereto.

  • Description of the procurement Under this Lot the supplier will provide the below packs (this list is not exhaustive): o Orthopaedic Day Case o Hip Arthroplasty o Knee Arthroplasty o Shoulder Arthroplasty o Arthroscopy- Knee, Hip, Shoulder, Ankle o Hand Surgery o Foot & Ankle Surgery o ACL (Anterior Cruciate Ligament) o Spine- Lumbar, Cervical TERMS AND CONDITIONS / ACTIVITY BASED INCOME (ABI) The terms and conditions of this Agreement and any resulting call-off contract is appended to the ITT. These terms include provisions requiring the payment by the supplier of an ABI management charge in consideration of the award of this Agreement, the management and administration by HTE of the overall contract structure and associated documentation, as well as the requirement to submit regular management information to HTE. SUBMISSION OF EXPRESSIONS OF INTEREST AND PROCUREMENT INFORMATION This exercise will be conducted on the HTE Bravo portal. Candidates wishing to be considered must register expressions of interest as follows: Register on the HTE portal at xxxxx://xxxxxxxxxxxxxxxxx.xxxxxxxxxxxxx.xx.xx. Login to the portal with username/password. Click the SQs/ITTs Open to All Suppliers link. These are the SQs/ITTs open to any registered supplier. Click on the relevant SQ/ ITT to access the content. Click the Express Interest button at the top of the page. This will move the SQ/ITT into your My SQs/My ITTs page. You can access any attachments by clicking Buyer Attachments in the SQ/ITT Details box. Follow the onscreen instructions to complete the SQ/ITT. Submit your reply using the Submit Response button at the top of the page. If you require any further advice, contact the Bravo e- Tendering Help Desk at xxxx@xxxxxxxxxxxxx.xx.xx. Sid4Gov HTE utilises the sid4gov supplier information database. Candidates should register on sid4gov at xxxxx://xxx0xxx.xxxxxxxxxxxxx.xxx.xx/organisation/register and submit their sid4gov company profile for publication on the database. Candidates already registered on sid4gov must ensure information is up to date. Where access to sid4gov is unavailable, please contact the sid4gov helpdesk at xxx0xxx@xxx.xxx.xxx.xx. Please note that sid4gov does not prepopulate any fields of the SQ on HTE's Bravo portal. Candidates must complete the Qualification & Technical Envelopes of the SQ in Bravo in full.

  • Security Audits Each Contract Year, County may perform or have performed security reviews and testing based on an IT infrastructure review plan. Such testing shall ensure all pertinent County security standards as well as any customer agency requirements, such as federal tax requirements or HIPPA.

  • Maintenance of Security Interests in Financed Equipment The Servicer shall, in accordance with its customary servicing procedures, take such steps as are necessary to maintain perfection of the security interest created by each Receivable in the related Financed Equipment. The Servicer is hereby authorized to take such steps as are necessary to re-perfect such security interest on behalf of the Issuing Entity and the Indenture Trustee in the event of the relocation of the Financed Equipment or for any other reason.

  • Maintenance of Security Interests in Financed Vehicles The Servicer shall, in accordance with its customary servicing procedures, take such steps as are necessary to maintain perfection of the security interest created by each Receivable in the related Financed Vehicle. The Servicer is hereby authorized to take such steps as are necessary to re-perfect such security interest on behalf of the Issuing Entity and the Indenture Trustee in the event of the relocation of a Financed Vehicle or for any other reason.

  • RATIFICATION OF INTELLECTUAL PROPERTY SECURITY AGREEMENT Borrower hereby ratifies, confirms, and reaffirms, all and singular, the terms and conditions of the IP Agreement and acknowledges, confirms and agrees that the IP Agreement contains an accurate and complete listing of all Intellectual Property.

  • Description of the Project THIS SHOULD BE NO MORE THAN A TWO PARAGRAPH DESCRIPTION THAT PROVIDES A BACKGROUND OF THE PROBLEM, AS WELL AS HOW THE CONTRACTOR INTENDS TO SOLVE THE PROBLEM. KEEP IN MIND THAT THE CONTRACT SHOULD “STAND ON ITS OWN,” I.E. ANYONE SHOULD BE ABLE TO PICK IT UP AND FIGURE OUT WHAT IS GOING ON.)

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!