Security choices and trade-offs Sample Clauses

Security choices and trade-offs. It will be important to capture trade-offs between security properties of the 5G-ENSURE architecture or supported 5G application scenarios. As noted in Section 6.1, there is an inevitable trade-off between the need for mechanisms to protect privacy and the need to support lawful interception of communications and also lawful access to communications data. Many privacy concerns can obviously be captured by modelling threats to privacy. These will mostly be concerned with unauthorized access to personal data via management services like HLR lookup services, interception of personal data such as the location of individuals, or propagation of personal data in communication context information that may be accessible to applications. These threats can then be analysed and addressed in a given architecture, scenario or application. However, other trust issues may exist that conflict with privacy, and these could also be captured in the form of potential threats. For example, subscribers may expect that if their child goes missing, they can be traced by inspecting communication data generated by their interactions with the mobile network. Failure to meet these expectations would be a threat to trust, though not explicitly to privacy. The relevant countermeasure would be to retain communication data generated by some of the technology components in the network. To do this, one will certainly need additional services that have privileged access to monitor assets involved in transfer of communication content or generation of communication metadata. These services should allow access by authorised agencies to the real-time monitoring streams or to previously stored communication data. Obviously, threats to privacy will then exist representing unauthorized access to these services – in fact making these services highly secure should be a major concern for architects and implementers. In specific scenarios it may make sense to provide more or less of this monitoring, based on the expectations of users, to minimise potential threats to privacy while ensuring the network behaves in ways its users would consider trustworthy.
AutoNDA by SimpleDocs

Related to Security choices and trade-offs

  • Operator’s Security Contact Information Xxxxxxx X. Xxxxxxx Named Security Contact xxxxxxxx@xxxxxxxxx.xxx Email of Security Contact (000) 000-0000 Phone Number of Security Contact

  • Customer and Trade Relations As of the Closing Date, there exists no actual or, to the knowledge of any Credit Party, threatened termination or cancellation of, or any material adverse modification or change in: the business relationship of any Credit Party with any customer or group of customers whose purchases during the preceding 12 months caused them to be ranked among the ten largest customers of such Credit Party; or the business relationship of any Credit Party with any supplier material to its operations.

  • Customer Support and Training System Agency will provide support for the CMBHS, including problem tracking and problem resolution. System Agency will provide telephone numbers for Grantees to obtain access to expert assistance for CMBHS-related problem resolution. System Agency will provide initial CMBHS training. Grantee shall provide subsequent ongoing end-user training.

  • Trademarks and Trade Names Except as specifically set out in this Agreement, nothing in this Agreement shall grant, suggest, or imply any authority for one Party to use the name, trademarks, service marks, or trade names of the other for any purpose whatsoever.

  • Further Assurances; Change in Name or Jurisdiction of Origination, etc (i) The Borrower hereby authorizes and hereby agrees from time to time, at its own expense, promptly to execute (if necessary) and deliver all further instruments and documents, and to take all further actions, that may be necessary or desirable, or that the Administrative Agent may reasonably request, to perfect, protect or more fully evidence the security interest granted pursuant to this Agreement or any other Transaction Document, or to enable the Administrative Agent (on behalf of the Secured Parties) to exercise and enforce the Secured Parties’ rights and remedies under this Agreement and the other Transaction Document. Without limiting the foregoing, the Borrower hereby authorizes, and will, upon the request of the Administrative Agent, at the Borrower’s own expense, execute (if necessary) and file such financing statements or continuation statements, or amendments thereto, and such other instruments and documents, that may be necessary, or that the Administrative Agent may reasonably request, to perfect, protect or evidence any of the foregoing. (ii) The Borrower authorizes the Administrative Agent to file financing statements, continuation statements and amendments thereto and assignments thereof, relating to the Receivables, the Related Security, the related Contracts, Collections with respect thereto and the other Collateral without the signature of the Borrower. A photocopy or other reproduction of this Agreement shall be sufficient as a financing statement where permitted by law. (iii) The Borrower shall at all times be organized under the laws of the State of Delaware and shall not take any action to change its jurisdiction of organization. (iv) The Borrower will not change its name, location, identity or corporate structure unless (x) the Borrower, at its own expense, shall have taken all action necessary or appropriate to perfect or maintain the perfection of the security interest under this Agreement (including, without limitation, the filing of all financing statements and the taking of such other action as the Administrative Agent may request in connection with such change or relocation) and (y) if requested by the Administrative Agent, the Borrower shall cause to be delivered to the Administrative Agent, an opinion, in form and substance satisfactory to the Administrative Agent as to such UCC perfection and priority matters as the Administrative Agent may request at such time.

  • PERSONAL INFORMATION PRIVACY AND SECURITY CONTRACT 11 Any reference to statutory, regulatory, or contractual language herein shall be to such language as in 12 effect or as amended. 13 A. DEFINITIONS

  • Security Cameras Security cameras have been installed throughout the Facility; however, they will not routinely be used in areas where there is an expectation of privacy, such as restrooms or patient care areas.

  • No Reliance on Administrative Agent’s Customer Identification Program Each Lender acknowledges and agrees that neither such Lender, nor any of its Affiliates, participants or assignees, may rely on the Administrative Agent to carry out such Lender’s, Affiliate’s, participant’s or assignee’s customer identification program, or other obligations required or imposed under or pursuant to the USA Patriot Act or the regulations thereunder, including the regulations contained in 31 CFR 103.121 (as hereafter amended or replaced, the “CIP Regulations”), or any other Anti-Terrorism Law, including any programs involving any of the following items relating to or in connection with any of the Loan Parties, their Affiliates or their agents, the Loan Documents or the transactions hereunder or contemplated hereby: (i) any identity verification procedures, (ii) any recordkeeping, (iii) comparisons with government lists, (iv) customer notices or (v) other procedures required under the CIP Regulations or such other Laws.

  • Direction to Account Debtors; Contracting Parties; etc Upon the occurrence and during the continuance of an Event of Default, if the Collateral Agent so directs any Assignor, such Assignor agrees (x) to cause all payments on account of the Receivables and Contracts to be made directly to one or more Cash Collateral Accounts (as the Collateral Agent shall so direct), (y) that the Collateral Agent may, at its option, directly notify the obligors with respect to any Receivables and/or under any Contracts to make payments with respect thereto as provided in the preceding clause (x), and (z) that the Collateral Agent may enforce collection of any such Receivables and Contracts and may adjust, settle or compromise the amount of payment thereof, in the same manner and to the same extent as such Assignor. Without notice to or assent by any Assignor, the Collateral Agent may, upon the occurrence and during the continuance of an Event of Default, apply any or all amounts then in, or thereafter deposited in, the Cash Collateral Accounts which application shall be effected in the manner provided in Section 7.4 of this Agreement. The reasonable costs and expenses (including reasonable attorneys' fees) of collection, whether incurred by an Assignor or the Collateral Agent, shall be borne by the relevant Assignor. The Collateral Agent shall deliver a copy of each notice referred to in the preceding clause (y) to the relevant Assignor, provided, that the failure by the Collateral Agent to so notify such Assignor shall not affect the effectiveness of such notice or the other rights of the Collateral Agent created by this Section 3.3.

  • Security Violations and Accounts Updates Grantee will adhere to the Confidentiality Article requirements and HHS Data Usage Agreement of this contract and immediately contact System Agency if a security violation is detected, or if Grantee has any reason to suspect that the security or integrity of the CMBHS data has been or may be compromised in any way.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!