Security IT configuration Sample Clauses

Security IT configuration. The security and protection of data is a key element in the design of the service. The users’ experience of data security has also been investigated in a previous EU project, TARGET [9]. The extent to which the data was considered sensitive in a game/virtual environment was found to depend on four factors. First, subjects wanted their data to be preserved in a safe place with security measures. Secondly, the ability to link data to the individual was a concern and the use of pseudonyms (ID code and nicknames) was considered as less threatening than the use of real identities. Thirdly, the nature of data affected the willingness to share information, that is, the subjects wanted to share positive data, but not negative data, about themselves. Fourthly, the subjects wanted to be sure of the validity of data and have an opportunity to correct inaccurate data. These measures are in line with general recommendations in the field and will also be implemented in the design of the PRECIOUS service. The following recommendations for privacy (based on the TARGET project) are made for the PRECIOUS service: 1. A clear description of which data is collected and why will be given to the users. 2. Collected data will be stored securely and made accessible only to authorised persons. 3. Users will be allowed to use the service with pseudonyms (ID code) instead of their real name. 4. Users will be able to control which data is made public. 5. Users will be given the opportunity to correct/erase erroneous data and stop data sharing at any moment. 6. Users must accept data protection terms and conditions to use the service. The service will have a set of applications that collect data from sensors and interact with the user through actuators. These applications will either process the data locally to provide user real time information or the applications will send the data to an external server i.e. home server or web server where data would be processed and securely stored. The user can determine the details of the processed data that can be shared with different user groups.
AutoNDA by SimpleDocs

Related to Security IT configuration

  • Configuration The configuration for the Purchase Right Aircraft will be the Detail Specification for Model 767-3S2F aircraft at the revision level in effect at the time of the Supplemental Agreement. Such Detail Specification will be revised to include (i) changes required to obtain required regulatory certificates and (ii) other changes as mutually agreed upon by Boeing and Customer.

  • AIRCRAFT CONFIGURATION The guarantees defined below ("the Guarantees") are applicable to the A330-200 Aircraft as described in the Technical Specification ***, as amended by the Specification Change Notices ("SCN's") for: i) implementation of engines: GENERAL ELECTRIC CF6-80E1A3

  • Configuration Management The Contractor shall maintain a configuration management program, which shall provide for the administrative and functional systems necessary for configuration identification, control, status accounting and reporting, to ensure configuration identity with the UCEU and associated cables produced by the Contractor. The Contractor shall maintain a Contractor approved Configuration Management Plan that complies with ANSI/EIA-649 2011. Notwithstanding ANSI/EIA-649 2011, the Contractor’s configuration management program shall comply with the VLS Configuration Management Plans, TL130-AD-PLN-010-VLS, and shall comply with the following:

  • Registry Interoperability and Continuity Registry Operator shall comply with the Registry Interoperability and Continuity Specifications as set forth in Specification 6 attached hereto (“Specification 6”).

  • Interoperability To the extent required by applicable law, Cisco shall provide You with the interface information needed to achieve interoperability between the Software and another independently created program. Cisco will provide this interface information at Your written request after you pay Cisco’s licensing fees (if any). You will keep this information in strict confidence and strictly follow any applicable terms and conditions upon which Cisco makes such information available.

  • Functionality Customer is entitled to additional functionality previously purchased or bundled with the software if available in the version or update released on or after the start date of the Agreement. Customer acknowledges that certain functionality in current and previous software versions may not be available in future upgrades. Added functionality may require additional paid services (clinical and technical) to configure and support.

  • Maintenance Services Subject to Client’s timely payment of the applicable maintenance fees, Accenture will make available the following maintenance services (“Maintenance Services”):

  • Security Services In performing the Services, the Agent shall properly comply at all times with, and perform all of, the Security Procedures.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Security Systems The Service may not be compatible with security systems. You may be required to maintain a telephone connection through your local exchange carrier in order to use any alarm monitoring functions for any security system installed in your home or business. You are responsible for contacting the alarm monitoring company to test the compatibility of any alarm monitoring or security system with the Service.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!