Security Components Sample Clauses

Security Components. You understand that the Service and software embodied therein may include security components that permit digital materials to be protected, and that use of these materials is subject to usage rules set by Senses and/or content providers who provide content to Senses. You may not attempt to override, disable, circumvent or otherwise interfere with any such security components and usage rules embedded into the Service.
AutoNDA by SimpleDocs
Security Components. You understand that the Service and software embodied therein may include security components that permit digital materials to be protected, and that use of these materials is subject to usage rules set by Yogiville and/or content providers who provide content to Yogiville. You may not attempt to override, disable, circumvent or otherwise interfere with any such security components and usage rules embedded into the Service.
Security Components. You understand that the Service and software embodied therein may include security components that permit digital materials to be protected, and that use of these materials is subject to usage rules set by GlowBe and/or content providers who provide content to GlowBe. You may not attempt to override, disable, circumvent or otherwise interfere with any such security components and usage rules embedded into the Service.
Security Components. HP-OMS acknowledges that the Customer has in place, immediately prior to the Commencement Date, security standards that allow for or have: PORTIONS OF THIS AGREEMENT HAVE BEEN OMITTED PURSUANT TO A REQUEST FOR CONFIDENTIAL TREATMENT FROM THE SEC Transition and Stabilization o [**] o [**] o [**] o [**] o [**] o [**] o [**] o [**] o [**] o [**] o [**] o [**] o [**] o [**] o [**] For the first [**] months of the Transition and Stabilization phases, HP-OMS will maintain at least the same level of security as detailed above and will implement or suggest security improvements that will be defined no later then [**] months after commencement date. The time frame for security components versions upgrade (e.g. Fire wall, Antivirus definition files) will be mutually defined per version release. [**].
Security Components. You understand that the Website and software embodied within the Website may include security components that permit digital materials to be protected, and that use of these materials is subject to usage rules set by ROMWOD and/or content providers who provide content to ROMWOD. You may not attempt to override, disable, circumvent or otherwise interfere with any such security components and usage rules embedded into the Website.
Security Components. You understand that the Website and software embodied within the Website may include security components that permit digital materials to be protected, and that use of these materials is subject to usage rules set by YOGA30 and/or content providers who provide content to YOGA30. You may not attempt to override, disable, circumvent or otherwise interfere with any such security components and usage rules embedded into the Website.
Security Components. Audit Personnel Security
AutoNDA by SimpleDocs
Security Components. Audit Network Security Server Systems Security

Related to Security Components

  • Components Patheon will purchase and test all Components (with the exception of Client-Supplied Components) at Patheon’s expense and as required by the Specifications.

  • Engines POSITION SERIAL NO. TOTAL HOURS TOTAL CYCLES HRS/CYCLES SINCE LAST SHOP VISIT Time Remaining to Next LIFE LIMITED PART REMOVAL PART NAME HOURS CYCLES MSN MSN

  • Third Party Components The Products and Services may contain third party components (including open source software) subject to separate license agreements. To the limited extent a third party license expressly supersedes this XXXX, such third party license governs Customer’s use of that third party component.

  • Security Cameras Security cameras have been installed throughout the Facility; however, they will not routinely be used in areas where there is an expectation of privacy, such as restrooms or patient care areas.

  • SECURITY CODES If the Custodian issues to the Company security codes, passwords or test keys in order that it may verify that certain transmissions of information, including Proper Instructions, have been originated by the Company, the Company shall take all commercially reasonable steps to safeguard any security codes, passwords, test keys or other security devices which the Custodian shall make available.

  • Electrical Equipment Residents must use only CSA, UL-approved or Canadian-certified electrical equipment; the rated wattage of light fixtures must never be exceeded; and only replacement bulbs supplied by Waterloo maintenance staff may be used. Do not leave any unattended electrical equipment turned on (i.e. hair straighteners, lights etc.)

  • OPEN SOURCE COMPONENTS The DS Offerings may include open source components. Whenever notices (such as acknowledgment, copies of licenses or attribution notice) are required by the original licensor, such notices are included in the Documentation of the DS Offerings. Moreover, some open source components may not be distributed and licensed under the terms of the Agreement but under the terms of their original licenses as set forth in the Documentation of the DS Offerings themselves. Source code for open source software components is available upon request. Except for components mentioned in the section EXCLUSIONS below, the warranty and indemnification provided by DS under the Agreement apply to all open source software components and shall be provided by DS and not by the original licensor, but only for the use of the DS Offerings that is in compliance with the terms of the Agreement, and in conjunction with the DS Offerings. The original licensors of said open source software components provide them on an “as is” basis and without any liability whatsoever to Customer.

  • Securing Physical Facilities DST shall maintain systems located in DST facilities that host Fund Data or provide services under the Agreement in an environment that is designed to be physically secure and to allow access only to authorized individuals. A secure environment includes the availability of onsite security personnel on a 24 x 7 basis or equivalent means of monitoring locations supporting the delivery of services under the Agreement.

  • Tooling Unless otherwise specified in this Agreement, all tooling and/or all other articles required for the performance hereof shall be furnished by Seller, maintained in good condition and replaced when necessary at Seller's expense. If NETAPP agrees to pay Seller for special tooling or other items either separately or as a stated part of the unit price of Goods purchased herein, title to same shall be and remain in NETAPP upon payment therefore.

  • Security Controls Annually, upon Fund’s reasonable request, DST shall provide Fund’s Chief Information Security Officer or his or her designee with a summary of its corporate information security policy and an opportunity to discuss DST’s information security measures, and a high level and non-confidential summary of any penetration testing related to the provision of in-scope services . DST shall review its Security Policy annually.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!