Security on the Internet Sample Clauses

Security on the Internet. 10.1. In the development of e-banking, special emphasis has been placed on security. To protect the Client, a multi-level security system has been developed which, among other things, makes use of high-standard encryption processes. In principle, this encryption makes it impossible for unauthorised persons to gain access to the Client’s confidential data. However, despite the use of state-of-the-art security procedures, absolute security cannot be guaranteed on either the Bank‘s side of the relationship or the Client‘s side. The Client duly notes that his own workstation and that of his designated Service User can be a particularly weak point in terms of e-banking security. 10.2. The Client duly notes the following risks in particular: • The Bank cannot guarantee either unrestricted access to the relevant services or unrestricted use of the same. Nor can the Bank guarantee the unrestricted operational availability of the Internet. • Inadequate knowledge of the system and faulty security precautions (e. g. inadequately protected storage of data on the hard disk, file transfers, unauthorised “screen peeking”) may facilitate unauthorised access. It is the Client‘s responsibility to ascertain exactly what security precautions are required and to comply with them. • By drawing up an Internet traffic profile, the Client’s Internet provider or that of the Service User is able to determine with whom the Client or Service User has been in contact and when such contacts took place. • There is a latent danger that, when the Internet is being used, a third party could gain access to the Client’s computer or that of the Service User without being noticed (e. g. by means of a Trojan horse, virus, etc.). • In spite of security measures, when using the Internet there is a constant danger of computer viruses spreading to the Client’s computer or that of the Service User as soon as it comes into contact with the outside world. Virus scanners can assist the Client or the Service User in protecting his system and are urgently recommended. For additional information, please refer to the Bank’s website (xxx.xxxxxx.xxx). 10.3. Moreover, it is important to stress the importance of using only software from trustworthy sources.
AutoNDA by SimpleDocs
Security on the Internet. It cannot be guaranteed that unauthorised third parties are unable to view confidential Client data, even in the case of security measures that conform to the latest tech- nology. The terminal device (computer, mobile phone, etc.) and/or network of the User are part of the system. These components are, however, outside of the Bank’s control and may become a weak point in that system. The Client hereby acknowledges the risks set forth below and agrees to read any security information, which is provided on the web pages for the individual Electronic Services or supplied to the User by other means, and to implement any recommended security measures within a reasonable period of time: • The Bank cannot guarantee either unrestricted access to or use of the Electronic Services, nor can the Bank guarantee the unrestricted operational availability of the Internet. • Inadequate knowledge of the system and faulty security precautions (e.g. inadequately protected storage of data on the hard disk, file transfers, unauthorised “screen peeking”) may facilitate unauthorised access. It is the Client’s responsibility to ascertain exactly what security precautions are required and to comply with them. • By drawing up an Internet traffic profile, the User’s ISP is able to determine whom the User has been in contact with and when such contacts took place. • There is a latent danger that, when the Internet is being used, a third party could gain access to the User’s com- puter without being noticed (e.g. by means of a Trojan Horse or virus). • In spite of security measures, when using the Internet, there is a constant danger of computer viruses spread- ing to the User’s computer as soon as it comes into con- tact with the outside world. Virus scanners can assist the User in protecting his system and are urgently recom- mended. For additional information, please refer to the Bank’s website. Moreover, it is important to stress the importance of only using software from trustworthy sources.

Related to Security on the Internet

  • Web Site Information on registration for and use of the E-Verify program can be obtained via the Internet at the Department of Homeland Security Web site: xxxx://xxx.xxx.xxx/E-Verify.

  • Servicer to Maintain Perfection and Priority The Servicer covenants that, in order to evidence the interests of CNHCR and Issuing Entity under this Agreement, Servicer shall take such action, or execute and deliver such instruments as may be necessary or advisable (including, without limitation, such actions as are requested by Issuing Entity) to maintain and perfect, as a first priority interest, Issuing Entity’s security interest in the Receivables. Servicer shall, from time to time and within the time limits established by law, prepare and present to Issuing Entity for Issuing Entity to authorize the Servicer to file all financing statements, amendments, continuations, financing statements in lieu of a continuation statement, terminations, partial terminations, releases or partial releases, or any other filings necessary or advisable to continue, maintain and perfect the Issuing Entity’s security interest in the Receivables as a first-priority interest (each a “Filing”). Issuing Entity shall promptly authorize in writing Servicer to, and Servicer shall, effect such Filing under the Uniform Commercial Code without the signature of CNHCR or Issuing Entity where allowed by applicable law.

  • Internet We will provide internet service to you for your noncommercial use. You acknowledge that the internet service is a shared service. We have no duty to you to edit, censor, review or take any responsibility for any information you or your guests may create, place on the internet, or view. You shall not use the internet we provide to engage in any criminal, illegal or unauthorized activity and any such use is a default of this Lease. Any violation of the Digital Millennium Copyright Act ("DMCA") is a breach of this Lease. You shall not attempt to degrade the performance of the internet service or hamper the ability of others to use the internet. You shall not use rogue devices, including wireless routers or modems, or take any measurers to interfere with our internet systems by configuring devices connected to our network so that they can communicate on our network using the internet protocol. Your use of the internet is at your sole risk and we are not responsible for your equipment, programs or software. Although we strive to provide superior internet service and sufficient bandwidth to our residents, we are not responsible for slow internet or other residents taking up significant bandwidth. WE RESERVE THE RIGHT TO INTERRUPT YOUR INTERNET SERVICE IN RESPONSE TO A BREACH OF THIS LEASE, INCLUDING BUT NOT LIMITED TO A FAILURE TO PAY RENT OR A VIOLATION OF THIS PARAGRAPH 6.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks. (2) The Information Security Program shall require encryption of any Personal Information in electronic format while in transit or in storage, and enhanced controls and standards for transport and disposal of physical media containing Personal Information. DTI shall, and shall require its agents, contractors and subcontractors who access or use Personal Information or Confidential Information to, regularly test key controls, systems and procedures relating to the Information Security Program ("ISP Tests"). DTI shall advise the Funds of any material issues identified in the ISP Tests potentially affecting the Information Security Program. (3) DTI shall comply with its Information Security Program.

  • Security Interests Absolute All rights of the Secured Parties and all obligations of the Debtors hereunder, shall be absolute and unconditional, irrespective of: (a) any lack of validity or enforceability of this Agreement, the Debentures or any agreement entered into in connection with the foregoing, or any portion hereof or thereof; (b) any change in the time, manner or place of payment or performance of, or in any other term of, all or any of the Obligations, or any other amendment or waiver of or any consent to any departure from the Debentures or any other agreement entered into in connection with the foregoing; (c) any exchange, release or nonperfection of any of the Collateral, or any release or amendment or waiver of or consent to departure from any other collateral for, or any guarantee, or any other security, for all or any of the Obligations; (d) any action by the Secured Parties to obtain, adjust, settle and cancel in its sole discretion any insurance claims or matters made or arising in connection with the Collateral; or (e) any other circumstance which might otherwise constitute any legal or equitable defense available to a Debtor, or a discharge of all or any part of the Security Interests granted hereby. Until the Obligations shall have been paid and performed in full, the rights of the Secured Parties shall continue even if the Obligations are barred for any reason, including, without limitation, the running of the statute of limitations or bankruptcy. Each Debtor expressly waives presentment, protest, notice of protest, demand, notice of nonpayment and demand for performance. In the event that at any time any transfer of any Collateral or any payment received by the Secured Parties hereunder shall be deemed by final order of a court of competent jurisdiction to have been a voidable preference or fraudulent conveyance under the bankruptcy or insolvency laws of the United States, or shall be deemed to be otherwise due to any party other than the Secured Parties, then, in any such event, each Debtor’s obligations hereunder shall survive cancellation of this Agreement, and shall not be discharged or satisfied by any prior payment thereof and/or cancellation of this Agreement, but shall remain a valid and binding obligation enforceable in accordance with the terms and provisions hereof. Each Debtor waives all right to require the Secured Parties to proceed against any other person or entity or to apply any Collateral which the Secured Parties may hold at any time, or to marshal assets, or to pursue any other remedy. Each Debtor waives any defense arising by reason of the application of the statute of limitations to any obligation secured hereby.

  • Security Services CONTRACTOR shall provide security services designed for preventing escapes, maintaining order, providing care, custody, control, supervision and management of the inmate population. A successful security program depends heavily on staff training, effective administration, and the establishment of inmate programs. The organization, staffing, and administration of the security program are vital to the Facility. The direction provided by a well-organized and clearly articulated operations manual, and emergency planning provides a solid base for successful administration. The final operations manual shall be submitted to the Bureau prior to the Service Commencement Date and shall be reviewed annually and updated as needed. Documentation of the review shall be provided annually to the On- Site Contract Monitor. Changes to the plan require written permission by the Contract Manager. The Department reserves the right to require changes to plans submitted to the Bureau.

  • Security Interest in Financed Equipment Immediately prior to the sale, assignment and transfer thereof, each Receivable shall be secured by a validly perfected first priority security interest in the Financed Equipment in favor of CNHICA as secured party or all necessary and appropriate actions have been commenced that would result in the valid perfection of a first priority security interest in the Financed Equipment in favor of CNHICA as secured party.

  • Maintenance of Security Interests in Financed Equipment The Servicer shall, in accordance with its customary servicing procedures, take such steps as are necessary to maintain perfection of the security interest created by each Receivable in the related Financed Equipment. The Servicer is hereby authorized to take such steps as are necessary to re-perfect such security interest on behalf of the Issuing Entity and the Indenture Trustee in the event of the relocation of the Financed Equipment or for any other reason.

  • Security Interest (a) As security for the payment or performance, as the case may be, in full of the Secured Obligations, each Grantor hereby grants to the Administrative Agent, its permitted successors and assigns, for the benefit of the Secured Parties, a security interest (the “Security Interest”) in all of such Grantor’s right, title and interest in, to and under any and all of the following assets now owned or at any time hereafter acquired by such Grantor or in which such Grantor now has or at any time in the future may acquire any right, title or interest (collectively, the “Article 9 Collateral”): (i) all Accounts; (ii) all Chattel Paper; (iii) all Documents; (iv) all Equipment; (v) all General Intangibles, including all Intellectual Property; (vi) all Instruments; (vii) all Inventory; (viii) all other Goods; (ix) all Investment Property; (x) all Letter-of-Credit Rights; (xi) all Commercial Tort Claims specifically described on Schedule III hereto, as such schedule may be supplemented from time to time pursuant to Section 3.04; (xii) all books and records pertaining to the Article 9 Collateral; and (xiii) to the extent not otherwise included, all Proceeds and products of any and all of the foregoing and all Supporting Obligations, collateral security and guarantees given by any Person with respect to any of the foregoing; provided that none of “Article 9 Collateral”, any other term defined in the preceding paragraph or any term defined by reference to the UCC shall include, and in no event shall the Security Interest attach to, any Excluded Asset; provided further that Proceeds, substitutions or replacements of Excluded Assets shall not be subject to the preceding proviso unless such Proceeds, substitutions or replacements would themselves constitute Excluded Assets. (b) Each Grantor hereby irrevocably authorizes the Administrative Agent for the benefit of the Secured Parties at any time and from time to time to file in any relevant jurisdiction any financing statements (including fixture filings) and continuation statements with respect to the Article 9 Collateral or any part thereof and amendments thereto that (i) describe the collateral covered thereby in any manner that the Administrative Agent reasonably determines is necessary or advisable to ensure the perfection of the security interest in the Article 9 Collateral granted under this Agreement, including indicating the Collateral as “all assets” of such Grantor or words of similar effect, and (ii) contain the information required by Article 9 of the UCC or the analogous legislation of each applicable jurisdiction for the filing of any financing statement or amendment, including (A) whether such Grantor is an organization, the type of organization and any organizational identification number issued to such Grantor (if required) and (B) in the case of a financing statement filed as a fixture filing, a sufficient description of the real property to which such Article 9 Collateral relates. Each Grantor agrees to provide such information to the Administrative Agent promptly upon request. The Administrative Agent is further authorized to file with the United States Patent and Trademark Office or United States Copyright Office (or any successor office) such documents as may be reasonably necessary or advisable for the purpose of perfecting, confirming, continuing, enforcing or protecting the Security Interest in Article 9 Collateral consisting of registered, issued or applied for Patents, Trademarks or Copyrights granted by each Grantor and naming any Grantor or the Grantors as debtors and the Administrative Agent as secured party. (c) The Security Interest and the security interest granted pursuant to Article II are granted as security only and shall not subject the Administrative Agent or any other Secured Party to, or in any way alter or modify, any obligation or liability of any Grantor with respect to or arising out of the Collateral.

  • Website E-bidders are responsible to identify the property properly and to ensure that the details and description of the Property are correct and accurate before bidding.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!