Security Components Sample Clauses

Security Components. You understand that the Service and software embodied therein may include security components that permit digital materials to be protected, and that use of these materials is subject to usage rules set by Senses and/or content providers who provide content to Senses. You may not attempt to override, disable, circumvent or otherwise interfere with any such security components and usage rules embedded into the Service.
AutoNDA by SimpleDocs
Security Components. You understand that the Service and software embodied therein may include security components that permit digital materials to be protected, and that use of these materials is subject to usage rules set by GlowBe and/or content providers who provide content to GlowBe. You may not attempt to override, disable, circumvent or otherwise interfere with any such security components and usage rules embedded into the Service.
Security Components. HP-OMS acknowledges that the Customer has in place, immediately prior to the Commencement Date, security standards that allow for or have: PORTIONS OF THIS AGREEMENT HAVE BEEN OMITTED PURSUANT TO A REQUEST FOR CONFIDENTIAL TREATMENT FROM THE SEC Transition and Stabilization o [**] o [**] o [**] o [**] o [**] o [**] o [**] o [**] o [**] o [**] o [**] o [**] o [**] o [**] o [**] For the first [**] months of the Transition and Stabilization phases, HP-OMS will maintain at least the same level of security as detailed above and will implement or suggest security improvements that will be defined no later then [**] months after commencement date. The time frame for security components versions upgrade (e.g. Fire wall, Antivirus definition files) will be mutually defined per version release. [**].
Security Components. You understand that the Service and software embodied therein may include security components that permit digital materials to be protected, and that use of these materials is subject to usage rules set by Yogiville and/or content providers who provide content to Yogiville. You may not attempt to override, disable, circumvent or otherwise interfere with any such security components and usage rules embedded into the Service.
Security Components. You understand that the Website and software embodied within the Website may include security components that permit digital materials to be protected, and that use of these materials is subject to usage rules set by ROMWOD and/or content providers who provide content to ROMWOD. You may not attempt to override, disable, circumvent or otherwise interfere with any such security components and usage rules embedded into the Website.
Security Components. Audit Hanover’s IT staff performs internal audits on a periodic basis and external network vulnerability scans once per month. Any identified issues are tracked according to severity and appropriate fixes are implemented as necessary. Customers may request additional external penetration tests and are responsible for the coordination of such testing and any associated costs. Personnel Security All employees, contractors, temporary workers and interns are required to adhere to Hanover’s Information Security Program and all applicable company policies and procedures. ▪ Hanover Research conducts a mandatory company wide information and data security training once per year, and all new employees will receive information and data security training within their first month of employment. ▪ Where appropriate, Hanover performs relevant background checks on employees and interns. ▪ Procedures are in place to ensure that upon termination of any employee, contractor, temporary worker or intern, all equipment is returned and all access rights are revoked immediately. ▪ The IT Department will enable access to only those information resources necessary for each individual to perform their assigned job functions. Physical Security of Data Processing Centers Hanover maintains one primary data processing center located in Arlington VA (headquarters) and one colocation data center in Reston, VA. Physical access to facilities, data centers, systems, networks and data at Hanover will be limited to those authorized personnel who require access to perform assigned duties. In addition to access controls, physical safeguards will be deployed to protect sensitive systems and data from fire, theft orother hazard. ▪ All entrances to Hanover offices and data processing areas are secured and accessible by Hanover employees only. ▪ Access is restricted to authorized personnel and access privileges are granted and removed by the Chief Information Officer or his/her appointee. ▪ Access cards are required to access appropriate floors within headquarters. ▪ Access cards are required at headquarters to gain entry to the buildings outside of regular business hours, and the satellite offices are secured by double locked doors outside of regular business hours (8 am to 6 pm Monday through Friday). ▪ Physical access is monitored at headquarters with alarms, access logs, video monitoring, and an electronic key card system. ▪ Access to Hanover’s IT and server rooms is restricted to IT staff and a...
Security Components. You understand that the Website and software embodied within the Website may include security components that permit digital materials to be protected, and that use of these materials is subject to usage rules set by YOGA30 and/or content providers who provide content to YOGA30. You may not attempt to override, disable, circumvent or otherwise interfere with any such security components and usage rules embedded into the Website.
AutoNDA by SimpleDocs
Security Components. Audit Hanover’s IT staff performs internal audits on a periodic basis and external network vulnerability scans once per month. Any identified issues are tracked according to severity and appropriate fixes are implemented as necessary. Customers may request additional external penetration tests and are responsible for the coordination of such testing and any associated costs. Personnel Security All employees, contractors, temporary workers and interns are required to adhere to Hanover’s Information Security Program and all applicable company policies and procedures. ▪ Hanover Research conducts a mandatory company wide information and data security training once per year, and all new employees will receive information and data security training within their first month of employment. ▪ Where appropriate, Xxxxxxx performs relevant background checks on employees and interns. ▪ Procedures are in place to ensure that upon termination of any employee, contractor, temporary worker or intern, all equipment is returned and all access rights are revoked immediately. ▪ The IT Department will enable access to only those information resources necessary for each individual to perform their assigned job functions.

Related to Security Components

  • Components Patheon will purchase and test all Components (with the exception of Client-Supplied Components) at Patheon’s expense and as required by the Specifications.

  • Engines POSITION SERIAL NO. TOTAL HOURS TOTAL CYCLES HRS/CYCLES SINCE LAST SHOP VISIT Time Remaining to Next LIFE LIMITED PART REMOVAL PART NAME HOURS CYCLES MSN MSN

  • SECURITY CODES If the Custodian issues to the Company security codes, passwords or test keys in order that it may verify that certain transmissions of information, including Proper Instructions, have been originated by the Company, the Company shall take all commercially reasonable steps to safeguard any security codes, passwords, test keys or other security devices which the Custodian shall make available.

  • Tooling Unless otherwise specified in this Agreement, all tooling and/or all other articles required for the performance hereof shall be furnished by Seller, maintained in good condition and replaced when necessary at Seller's expense. If NETAPP agrees to pay Seller for special tooling or other items either separately or as a stated part of the unit price of Goods purchased herein, title to same shall be and remain in NETAPP upon payment therefore.

  • Security Controls Annually, upon Fund’s reasonable request, Transfer Agent shall provide Fund’s Chief Information Security Officer or his or her designee with a copy of its corporate information security controls that form the basis for Transfer Agent’s Security Policy and an opportunity to discuss Transfer Agent’s information security measures, and a high level summary of any vulnerability testing conducted by Transfer Agent on its information security controls, with a qualified member of Transfer Agent’s information technology management team. Transfer Agent shall review its Security Policy annually.

  • Equipment The Fund shall obtain and maintain at its own cost and expense all equipment and services, including but not limited to communications services, necessary for it to utilize the Software and obtain access to the System, and Custodian shall not be responsible for the reliability or availability of any such equipment or services.

  • Equipment, Etc Each Grantor shall, (i) within ten (10) days after a written request by the Administrative Agent, in the case of Equipment now owned, and (ii) following a request by the Administrative Agent pursuant to subclause (i) above, within ten (10) days after acquiring any other Equipment, deliver to the Administrative Agent, any and all certificates of title, and applications therefor, if any, of such Equipment and shall cause the Administrative Agent to be named as lienholder on any such certificate of title and applications. No Grantor shall permit any such items to become a fixture to real estate or an accession to other personal property unless such real estate or personal property is the subject of a fixture filing (as defined in the UCC) creating a first priority perfected Lien in favor of the Administrative Agent.

  • Capital Equipment Collaborator’s commitment, if any, to provide ICD with capital equipment to enable the research and development activities under the Research Plan appears in Appendix B. If Collaborator transfers to ICD the capital equipment or provides funds for ICD to purchase it, then ICD will own the equipment. If Collaborator loans capital equipment to ICD for use during the CRADA, Collaborator will be responsible for paying all costs and fees associated with the transport, installation, maintenance, repair, removal, or disposal of the equipment, and ICD will not be liable for any damage to the equipment.

  • Systems The details of any systems work will be determined after a thorough business analysis. System's work will be billed on a time and material basis. Investors Bank provides an allowance of 10 systems hours for data extract set up and reporting extract set up. Additional hours will be billed on a time and material basis.

Time is Money Join Law Insider Premium to draft better contracts faster.