Security of the Services Sample Clauses

Security of the Services. 1. Content retained by the End User under the Services is a confidential information that will not be disclosed to third parties. In performing the Services, Argevide will comply with the Argevide security and privacy policies. Argevide is committed to making best effort to protect the Content, including End User and Authorized Users data, stored under the Services. 2. The End User is obliged not to share passwords to the Services with unauthorized persons and is solely responsible for the confidentiality of these passwords. When an initial password for the Services is provided, it shall be promptly changed by the End User. 3. Every use of the Service by means of the End User login and password will be treated as authorized use of the Service by the End User and that the End User is responsible for such use of the Services. 4. End Users may not use and will be responsible for any consequences of the use of any malicious software (including viruses, Trojan horses, spyware, malware) or devices that violate the Services Security and this Agreement. When using the Services, End User may not in any way infringe any third party's rights, including intellectual property rights. 5. Argevide makes all due care so that the Service is free from any malicious software including computer viruses. Argevide, however, does not affect the behavior of other Internet users and cannot guarantee that the use of the Internet, including the Services, will always be free of threats related to the activities of third parties and malicious software. Ensuring the security of using the Internet is the End User responsibility. 6. By using the Services, the End User can get access to external websites via links, which contain content Argevide does not control in any way. We recommend caution when switching to external sites (links), as this may involve exposure to the threats or content that you do not want to access. 7. Argevide continuously monitors the Services to facilitate its operation; to help resolve End User service requests; to detect and address threats to the Services as well as to the Content; and to detect and address illegal acts or violations of the Agreement. Argevide monitoring tools do not collect or store any of End User Content residing in the Services, except as needed for such purposes.
AutoNDA by SimpleDocs
Security of the Services. 6.5.1 seethelight cannot guarantee Internet security and strongly recommends that you make use of addi- tional security products such as fire walls and anti-virus software due to the “always-on” nature of the Combined Residential Telephone and Internet Service. 6.5.2 We do not guarantee the security of the Services against unlawful or un-authorised access or use. You understand and agree that access to and use of the Service using the Combined Residential Telephone and Internet Service is at your own risk.
Security of the Services. 7.5.1. We cannot guarantee internet security and strongly recommend that you make use of additional security products such as fire walls and anti-virus software due to the “always-on” nature of the Data Services. 7.5.2. We do not guarantee the security of the Data Services against unlawful or unauthorised access or use. You understand and agree that access to and use of the Data Services is at your own risk.
Security of the Services. 8.1 HBT provides no guarantee or warranty as to the security of the Services and the Customer shall indemnify, keep indemnified and hold harmless HBT from and against any claim or demand of whatsoever nature and howsoever arising as a result of the said security or any failure thereof. 8.2 Where the Customer is aware or becomes aware of any matter which the Customer knows or ought reasonably to be expected to know constitutes a threat to the security of the Services, then the Customer has a duty pursuant to this Contract immediately to advise HBT of such matter. 8.3 The Customer is responsible for all use and misuse of any passwords giving access to the Services. 8.4 HBT and its Third Party Service Providers and/or other sub-contractors shall be entitled to inspect and monitor from time to time all usage being made of the Services including communications being made and received to verify compliance with this Contract.
Security of the Services. 1. Content retained by the End User under the Services is a confidential information that will not be disclosed to third parties. In performing the Services, Argevide will comply with the Argevide privacy policy. Argevide is committed to making best effort to protect the Content, including End User and Authorized Users data, stored under the Services. 2. The End User is obliged not to share passwords to the Services with unauthorized persons and is solely responsible for the confidentiality of these passwords. When an initial password for the Services is provided, it shall be promptly changed by the End User. 3. End Users may not use and will be responsible for any consequences of the use of any malicious software (including viruses, Trojan horses, spyware, malware) or devices that violate the Services Security and this Agreement. When using the Services, End User may not in any way infringe any third party's rights, including intellectual property rights.
Security of the Services. 8.1 HBT provides no guarantee or warranty as to the security of the Services and the Customer shall indemnify, keep indemnified and hold harmless HBT from and against any claim or demand of whatsoever nature and howsoever arising as a result of the said security or any failure thereof.
Security of the Services. 9.1 HBT provides no guarantee or warranty as to the security of the Services and the Customer shall indemnify, keep indemnified and hold harmless HBT and the Hosting Service Provider, and shall pay to HBT such sums as would if paid to the Hosting Service Provider indemnify in full, keep indemnified and hold harmless the Hosting Service Provider from and against any claim or demand of whatsoever nature and howsoever arising as a result of the said security or any failure thereof. 9.2 Where the Customer is aware or becomes aware of any matter which the Customer knows or ought reasonably to be expected to know constitutes a threat to the security of the Services, then the Customer has a duty pursuant to this Contract immediately to advise HBT of such matter. 9.3 The Customer is responsible for all use and misuse of any passwords giving access to the Services. 9.4 HBT and its Third Party Service Providers and/or other sub-contractors shall be entitled to inspect and monitor from time to time all usage being made of the Services including communications being made and received to verify compliance with this Contract.
AutoNDA by SimpleDocs
Security of the Services. To ensure reliability, we use high grade hosting services and security technologies that we believe will provide you with a secure and safe environment when using the Site. However, no system is perfectly secure or reliable. The internet is an inherently insecure medium, and the reliability of hosting services, internet intermediaries, your internet service provider, and other service providers cannot be assured. When you use the Site, you accept these risks and the responsibility for choosing to use a technology that cannot guarantee complete security and reliability.
Security of the Services. You will maintain reasonable and appropriate technical and organizational measures for the protection of the security, confidentiality, and integrity of the Services (including protection against unauthorized or unlawful processing and against accidental or unlawful destruction, loss, or alteration or damage, unauthorized disclosure of, or access to, such data). In the event you discover a data incident involving the Services, you shall promptly notify MaxMind and fully cooperate with MaxMind, at your own expense, in remediating the incident.

Related to Security of the Services

  • Description of the Services 1.1 The scope of the service to be rendered is described more fully in the Annexures and Schedules referred to below: ❑ Annexure A – Scope / Specification ❑ Annexure C – Pricing Schedule The Deliverables, due for completion by and governed by this Schedule 1. In the event that the Service Provider fails to meet the delivery dates as agreed, the following penalties will be imposed:

  • Use of the Services 1.1 We will make the Oracle services listed in Your order (the “Services”) available to You pursuant to this Agreement and Your order. Except as otherwise stated in this Agreement or Your order, You have the non- exclusive, worldwide, limited right to use the Services during the period defined in Your order, unless earlier terminated in accordance with this Agreement or Your order (the “Services Period”), solely for Your internal business operations. You may allow Your Users (as defined below) to use the Services for this purpose, and You are responsible for their compliance with this Agreement and Your order. 1.2 The Service Specifications describe and govern the Services. During the Services Period, we may update the Services and Service Specifications (with the exception of the Data Processing Agreement as described below) to reflect changes in, among other things, laws, regulations, rules, technology, industry practices, patterns of system use, and availability of Third Party Content (as defined below). Oracle updates to the Services or Service Specifications will not materially reduce the level of performance, functionality, security or availability of the Services during the Services Period of Your order. 1.3 You may not, and may not cause or permit others to: (a) use the Services to harass any person; cause damage or injury to any person or property; publish any material that is false, defamatory, harassing or obscene; violate privacy rights; promote bigotry, racism, hatred or harm; send unsolicited bulk e-mail, junk mail, spam or chain letters; infringe property rights; or otherwise violate applicable laws, ordinances or regulations; (b) perform or disclose any benchmarking or availability testing of the Services; (c) perform or disclose any performance or vulnerability testing of the Services without Oracle’s prior written approval, or perform or disclose network discovery, port and service identification, vulnerability scanning, password cracking or remote access testing of the Services; or (d) use the Services to perform cyber currency or crypto currency mining ((a) through (d) collectively, the “Acceptable Use Policy”). In addition to other rights that we have in this Agreement and Your order, we have the right to take remedial action if the Acceptable Use Policy is violated, and such remedial action may include removing or disabling access to material that violates the policy.

  • Procurement of the Site (i) The Authority Representative, the Contractor and Authority’s Engineer shall, within 10 (ten) days of the date of this Agreement, inspect the Site and prepare a detailed memorandum containing an inventory of the Site including the vacant and unencumbered land, buildings, structures, road works, trees and any other immovable property on or attached to the Site (hereinafter referred to as the “Handover Memorandum”). Subject to the provisions of Clause 8.2 (iii), the Handover Memorandum shall have appended thereto an appendix (the “Appendix”) specifying in reasonable detail those parts of the Site to which vacant access and Right of Way has not been given to the Contractor along with details of hindrances in the Construction Zone. For sake of clarity the Handover Memorandum shall clearly specify the parts of Site where work can be executed. Signing of the Handover Memorandum, in three counterparts (each of which shall constitute an original), by the authorized representatives of the Authority, Contractor and Authority’s Engineer shall be deemed to constitute a valid evidence of giving the Right of Way to the Contractor for discharging its obligations under and in accordance with the provisions of this Agreement and for no other purpose whatsoever. (ii) Whenever the Authority is ready to hand over any part or parts of the Site included in the Appendix, it shall inform the Contractor, by notice, of the proposed date and time such of hand over. The Authority Representative and the Contractor shall, on the date so notified, inspect the specified parts of the Site, and prepare a memorandum containing an inventory of the vacant and unencumbered land, buildings, structures, road works, trees and any other immovable property on or attached to the Site so handed over. The signing of the memorandum, in three (3) counterparts (each of which shall constitute an original), by the authorised representatives of the Parties shall be deemed to constitute a valid evidence of giving the relevant Right of Way to the Contractor. If the contractor fails to join for site inspection or disputes the parts of the site available for work, the Authority’s Engineer shall decide the parts of the site where work can be executed and notify to both the parties within 3 days of the proposed date of inspection. The parties agree that such notification of the Authority’s Engineer as mentioned hereinabove shall be final and binding on the parties. (iii) The Authority shall provide the Right of Way to the Contractor in respect of all land included in the Appendix by the date specified in Schedule-A for those parts of the Site referred to therein, and in the event of delay for any reason other than Force Majeure or breach of this Agreement by the Contractor, it shall pay to the Contractor, Damages in a sum calculated in accordance with Clause 8.3. The Contractor agrees that it shall not be entitled to claim any other damages on account of any such delay by the Authority. (iv) Notwithstanding anything to the contrary contained in this Clause 8.2, the Authority shall specify the parts of the Site, if any, for which Right of Way shall be provided to the Contractor on the dates specified in Schedule-A. Such parts shall also be included in the Appendix prepared in pursuance of Clause 8.2 (i). (v) The Authority further acknowledges and agrees that prior to the Appointed Date, it shall have procured issuance of the statutory notification under Applicable Laws for vesting of all the land comprising the Project in the Authority and has taken possession of area for Construction Zone for at least 90% (ninety per cent) of the total length of the Project Highway. The Parties also acknowledge and agree that the conditions specified in this Clause 8.2 (iii) shall not be modified or waived by either Party. (vi) For the avoidance of doubt, the Parties expressly agree that the Appendix shall in no event contain sections of the Project Highway the cumulative length of which exceeds 10% (ten percent) of the total length of the Project Highway. (vii) Pursuant to signing of Handover Memorandum under clause 8.2 (i), Contractor shall submit to the Authority’s Engineer, a monthly land possession report till expiry of 180 (one hundred and eighty) days from Appointed Date, in respect of those parts of the site to which vacant access and right of way was not given to the contractor and included in Appendix to the memorandum signed under clause 8.2 (i), duly specifying the part of the site, if any, for which the right of way is yet to be handed over.

  • Security of processing (a) The data importer and, during transmission, also the data exporter shall implement appropriate technical and organisational measures to ensure the security of the data, including protection against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to that data (hereinafter ‘personal data breach’). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purpose(s) of processing and the risks involved in the processing for the data subjects. The Parties shall in particular consider having recourse to encryption or pseudonymisation, including during transmission, where the purpose of processing can be fulfilled in that manner. In case of pseudonymisation, the additional information for attributing the personal data to a specific data subject shall, where possible, remain under the exclusive control of the data exporter. In complying with its obligations under this paragraph, the data importer shall at least implement the technical and organisational measures specified in Annex II. The data importer shall carry out regular checks to ensure that these measures continue to provide an appropriate level of security. (b) The data importer shall grant access to the personal data to members of its personnel only to the extent strictly necessary for the implementation, management and monitoring of the contract. It shall ensure that persons authorised to process the personal data have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality. (c) In the event of a personal data breach concerning personal data processed by the data importer under these Clauses, the data importer shall take appropriate measures to address the breach, including measures to mitigate its adverse effects. The data importer shall also notify the data exporter without undue delay after having become aware of the breach. Such notification shall contain the details of a contact point where more information can be obtained, a description of the nature of the breach (including, where possible, categories and approximate number of data subjects and personal data records concerned), its likely consequences and the measures taken or proposed to address the breach including, where appropriate, measures to mitigate its possible adverse effects. Where, and in so far as, it is not possible to provide all information at the same time, the initial notification shall contain the information then available and further information shall, as it becomes available, subsequently be provided without undue delay. (d) The data importer shall cooperate with and assist the data exporter to enable the data exporter to comply with its obligations under Regulation (EU) 2016/679, in particular to notify the competent supervisory authority and the affected data subjects, taking into account the nature of processing and the information available to the data importer.

  • Description of the service 10.1.1 Automatic transfer service implies a transfer by the bank of the funds from the client’s account without further consent of the client, on the basis of fixed amount determined by the client in its application form or of information provided by the client’s creditor to the bank on the client’s debt. 10.1.2 The parties agree that the payment order created (generated) by the bank for the purposes of automatic transfer services shall have the legal force equal to the document having been printed on the paper and executed by the person(s) authorized to manage of the account. 10.1.3 The bank shall carry out the automatic transfer services in accordance with requirements and conditions stipulated in this agreement, the application on registration for automatic transfer service and the sources disseminated by the bank. 10.1.4 For the purposes of obtaining automatic transfer services the client shall apply to the bank with the application as per paragraph 1.2 of this agreement.

  • Provision of the Services The Supplier acknowledges and agrees that the Customer relies on the skill and judgment of the Supplier in the provision of the Services and the performance of its obligations under this Call Off Contract. The Supplier shall ensure that the Services: comply in all respects with any description of the Services in Call Off Schedule 2 (Services) or elsewhere in this Call Off Contract; and are supplied in accordance with the provisions of this Call Off Contract or the Tender. The Supplier shall perform its obligations under this Call Off Contract in accordance with: all applicable Law; Good Industry Practice; the Standards; the Security Policy; the ICT Policy (if so required by the Customer); the Supplier's own established procedures and practices to the extent the same do not conflict with the requirements of Clauses 7.1.3(a) to 7.1.3(e) and, where necessary the provisions of xxxxx://xxx.xxx.xx/government/publications/cyber-essentials-scheme-overview, or equivalent. The Supplier shall: at all times allocate sufficient resources with the appropriate technical expertise to supply the Deliverables and to provide the Services in accordance with this Call Off Contract; subject to Clause 22.1 (Variation Procedure), obtain, and maintain throughout the duration of this Call Off Contract, all the consents, approvals, licences and permissions (statutory, regulatory contractual or otherwise) it may require and which are necessary for the provision of the Services; ensure that any products or services recommended or otherwise specified by the Supplier for use by the Customer in conjunction with the Deliverables and/or the Services shall enable the Deliverables and/or the Services to meet the requirements of the Customer; ensure that the Supplier Assets will be free of all encumbrances (except as agreed in writing with the Customer); and ensure that the Services are fully compatible with any Customer Property or Customer Assets described in Part B of Call Off Schedule 4 (Implementation Plan, Customer Responsibilities and Key Personnel) (or elsewhere in this Call Off Contract) or otherwise used by the Supplier in connection with this Call Off Contract; minimise any disruption to the Sites and/or the Customer's operations when providing the Services; ensure that any Documentation and training provided by the Supplier to the Customer are comprehensive, accurate and prepared in accordance with Good Industry Practice; co-operate with the Other Suppliers and provide reasonable information (including any Documentation), advice and assistance in connection with the Services to any Other Supplier and, on the Call Off Expiry Date for any reason, to enable the timely transition of the supply of the Services (or any of them) to the Customer and/or to any Replacement Supplier; assign to the Customer, or if it is unable to do so, shall (to the extent it is legally able to do so) hold on trust for the sole benefit of the Customer, all warranties and indemnities provided by third parties or any Sub-Contractor in respect of any Deliverables and/or the Services. Where any such warranties are held on trust, the Supplier shall enforce such warranties in accordance with any reasonable directions that the Customer may notify from time to time to the Supplier; provide the Customer with such assistance as the Customer may reasonably require during the Call Off Contract Period in respect of the supply of the Services; deliver the Services in a proportionate and efficient manner; ensure that neither it, nor any of its Affiliates, embarrasses the Customer or otherwise brings the Customer into disrepute by engaging in any act or omission which is reasonably likely to diminish the trust that the public places in the Customer, regardless of whether or not such act or omission is related to the Supplier’s obligations under this Call Off Contract; and gather, collate and provide such information and co-operation as the Customer may reasonably request for the purposes of ascertaining the Supplier’s compliance with its obligations under this Call Off Contract. An obligation on the Supplier to do, or to refrain from doing, any act or thing shall include an obligation upon the Supplier to procure that all Sub-Contractors and Supplier Personnel also do, or refrain from doing, such act or thing.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!