We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.

For more information visit our privacy policy.

Security Issues Sample Clauses

Security IssuesThe Consultant shall comply with all policies of the Company, industry practice, and law and regulation to ensure that it affords security to information and assets of the Company and that the Consultant, or any persons with whom the Consultant works or with whom the Consultant deals, do not employ information of the Company in any manner contrary to law, good practice, good faith, confidentiality or fiduciary obligations.
Security Issues. If a security breach occurs, unless our internal security is proved to have been breached, there will be a presumption that your security has been breached. If you request Services that allow for you to appoint an administrator(s) (collectively and individually, “Administrator”), that Administrator may have the ability to appoint additional Administrators and each Administrator will have the ability to determine which of your Authorized Users will have access to the Services, the type of access they will have (including access to information about your Accounts and the ability to initiate transactions therein), and the ability to add, delete, and modify Security Credentials. Your Administrators are solely responsible for determining, on your behalf, who should be trusted with your Security Credentials and for supervising their use thereof. You are responsible for all transactions initiated by your Authorized Users even though they engage in transactions that you have not authorized, regardless of the purpose and regardless of whether the Authorized User violates your rules. If an Authorized User loses or forgets their Security Credentials, they should contact your Administrator. If an Administrator loses or forgets their Security Credentials, they should contact us. You understand and agree that ANY ONE (1) AUTHORIZED USER may be able to initiate transactions (including transfers) from any of your Accounts using the Services, regardless of whether the Authorized User is authorized on those Accounts and regardless of whether any of those Accounts normally require two (2) or more signatures or has other restrictions.
Security Issues. We make every effort to protect the integrity of your information. Any personal information you enter into online forms or surveys may be encrypted to ensure it remains private. We limit the right of access to your information to employees that need to use the information to respond to or process your request or transaction. We also take industry standard (IPSEC) measures to protect our sites from malicious intrusions or hacking.
Security IssuesThe parties agree that they are responsible for disclosing to the mediator in advance of the first joint mediation session any concerns about safety or security. If there has been any physical aggression or threats of physical aggression, each party should disclose that information to the mediator prior to the first joint session in a telephone message or in writing, so that a decision can be made about the appropriateness of mediation and/or planning for the security of both parties during the sessions.
Security IssuesThe Cooperator is encouraged to obtain the latest Department of State Travel Advisory Notices before traveling. These Notices are available to the general public and may be obtained directly from the State Department, or via Internet. Where security is a concern in a specific region, Cooperators may choose to notify the US Embassy of their presence when they have entered the country. This may be especially important for long-term posting. If security issues are affecting the Cooperator’s ability to meet time lines and/or to substantially accomplish the goals and objectives established under this Agreement, then the Cooperator must contact FAS immediately.
Security Issues. The security of the political leaders in Kinshasa shall be ensured as follows:
Security IssuesNothing in this Agreement shall exclude the right of the Government of the Host Country to take all relevant measures of protection in the interest of public safety or to prevent the implementation of the laws of the Host Country, which are necessary for the maintenance of public health and order. If the Government of the Host Country considers that the application of the provisions referred to in paragraph 1 above is necessary, as soon as the circumstances permit, it shall contact the Secretariat so as to make a joint decision on measures that may be necessary to protect the interests of the Secretariat. The Secretariat shall be obliged to cooperate with the authorities of the Host Country so as to avoid any harm to public security resulting from any activity of the Secretariat.
Security Issues. As defined in the MOU, the BMC is responsible for all aspects of building security.
Security Issues a) If any user discovers faults in system security, it is their responsibility to bring it to the attention of the Information Systems Department immediately. b) Any copyrighted software is not to be copied to or from any VFMAC computer. c) A computer, computer account, user password, or e-mail account assigned to an individual will not be used by others. If a user feels that knowledge of their password has been obtained by others or otherwise compromised, they should change their password. d) Users may apply password protection, file encryption, and other devices for security, but will not attempt to deprive authorized personnel of any necessary access. e) Network access to any Faculty or Staff computer is strictly prohibited unless authorized by appropriate Information Systems personnel. (Major) f) Users will not attempt to circumvent system security or disguise themselves or their machine identity for any reason. A user will not change their computer/Internet address or network configuration. (Major) g) Users must log in to their computer when working and log out when finished. Leaving a machine logged in could allow someone else to make use of unauthorized network resources.
Security IssuesThe Borrower shall provide adequate security necessary for the safe mobility of persons carrying out the Project to ensure timely and uninterrupted implementation of the Project.