Security Parameters Sample Clauses

Security Parameters. EGS and <<VENDOR SYSTEM>> use RESTful web services over HTTPS using most current NIST and Federal Government recommended versions of TLS to implement its system-to-system interface. The EGS system shall connect to the <<VENDOR SYSTEM>> system using the system- to-system interface.
AutoNDA by SimpleDocs
Security Parameters. The following detailed security measures and controls implemented by each organization to protect the confidentiality, integrity, and availability of the connected systems and the information/data that will pass between them are outlined below; [VA Organization 1] implements the following security measures and controls: • Identification and Authentication - User Access control is managed by strong authentication method and must be assigned on the "Least Privilege" Principal. VA utilizes “two-factor authentication” for general users. A separate token and non-mail enabled account is required for users who require elevated privileges on IT systems. • Logical Access Controls - VA accounts are separated into domains and the system administrators only manage those accounts within their domain. Accounts are audited every ninety (90) days. VA policy requires account termination within twenty-four (24) hours of an employee/contractor departure. Accounts are terminated immediately in the event of a hostile termination. • Physical and Environmental Security - Physical and environmental controls are maintained at VA facilities. Badges are required for employees and contract staff. Access to networking closets and computer rooms require authorization from the facility Chief Information Officer (CIO) and a log is maintained. VA computer rooms are environmentally controlled for operation of the equipment is contains. This includes power; network; heating, ventilation, and air conditioning (HVAC); and fire suppression. • Firewall, IDS, and Encryption - Intrusion detection systems (IDS) are in place at gateways and throughout the VA network. The VA’s Network Security Operations Center monitors the VA network 24x7. Suspicious activity is reviewed and determined recommendations are formulated and assigned to the system administrators. FIPS 140-2 validated encryption is required for transmission of sensitive information. [Organization 2] implements the following security measures and controls: • Identification and Authentication - [Detailed description of policy] • Logical Access Controls - [Detailed description of policy] • Physical and Environmental Security - [Detailed description of policy] • Firewall, IDS, and Encryption - [Detailed description of policy as well as confirmation of properly configured firewalls.]
Security Parameters. Data is exchanged using the latest secure connection protocol. SBA currently supports TLS 1.2 and 1.3.
Security Parameters. All Parties are required to protect NMT’s systems and data in accordance with applicable statutory, regulatory and contractual compliance obligations; Provider shall establish procedures, supporting business processes and implement technical measures to ensure the continuity and availability of operations while operating in other-than-normal conditions; Unless otherwise protected by NMT-defined alternative physical safeguards, Provider must: Implement cryptographic mechanisms to prevent unauthorized disclosure of information;
Security Parameters. {Specify the security parameters exchanged between systems to authenticate that the requesting system is the legitimate system and that the class(es) of service requested is approved by the ISA. For example, at the system level, if a new service such as e-mail is requested without prior coordination, it should be detected, refused, and documented as a possible intrusion until the interconnected service is authorized. Also, additional security parameters may be required (e.g., personal accountability) to allow the respondent system to determine whether a requestor is authorized to receive the information and/or services requested and whether all details of the transaction fall with the scope of user services authorized by the ISA. Give the server names/directories and their full location. Examples to include are: encryption being used during transport; whether the data (including passwords) is encrypted in storage; type of connection (e.g. single VPN connection); etc.}
Security Parameters. Interconnections will be used to transmit data between Members and the Network via secured data streams for the purposes specified in this Agreement. If an exchange not covered by this Agreement is detected without prior appropriate approval, it must be refused, and documented as a possible intrusion until the interconnected service is authorized. Also, additional security parameters may be required (e.g., personal accountability) to allow the respondent system to determine whether a requestor is authorized to receive the information and/or services requested and whether all details of the transaction fall within the scope of user services authorized in this Agreement.
Security Parameters. [Required for systems that allow users of one system to directly access the other system. Specify the security parameters that are exchanged among/between systems that authenticates that the requesting system is the legitimate system and that the class(es) of service being requested are approved by the ISA. For example, at the system level, if a new service such as E-mail is requested without prior coordination, it should be detected, refused, and documented as a possible intrusion until the interconnected service is authorized. Also, additional security parameters may be required (e.g., personal accountability) to allow the respondent system to determine whether a requestor is authorized to receive the information and/or services requested and whether all details of the transaction fall within the scope of user services authorized in the ISA.]
AutoNDA by SimpleDocs
Security Parameters. Credit card numbers, fixed log-in passwords, and other security parameters that can be used to gain access to goods or services, shall not be sent over the Internet in readable form. The SSL or SET encryption processes are both acceptable Internet encryption standards for the protection of security parameters. Other encryption processes, such as PGP, are permissible if approved by Gateway.

Related to Security Parameters

  • RATIFICATION OF INTELLECTUAL PROPERTY SECURITY AGREEMENT Borrower hereby ratifies, confirms, and reaffirms, all and singular, the terms and conditions of the IP Agreement and acknowledges, confirms and agrees that the IP Agreement contains an accurate and complete listing of all Intellectual Property.

  • Certified Copies of Charter Documents Each of the Lenders shall have received from the Borrower and each of its Subsidiaries a copy, certified by a duly authorized officer of such Person to be true and complete on the Closing Date, of each of (a) its charter or other incorporation documents as in effect on such date of certification, and (b) its by-laws as in effect on such date.

  • Certified Copies of Organizational Documents The Agent shall have received from the Borrower a copy, certified as of a recent date by the appropriate officer of each State in which the Borrower, the Guarantors or any of their respective Subsidiaries, as applicable, is organized or in which the Real Estate is located and a duly authorized partner, member or officer of such Person, as applicable, to be true and complete, of the partnership agreement, corporate charter, declaration of trust or other organizational documents of the Borrower, the Guarantors, or any Subsidiary, as applicable, or its qualification to do business, as applicable, as in effect on such date of certification.

  • Additional Financial Information (a) In addition to all other information required to be provided pursuant to this Article 6, the Borrower promptly shall provide the Agent (and any guarantor of the Liabilities), with such other and additional information concerning the Borrower, the Collateral, the operation of the Borrower’s business, and the Borrower’s financial condition, including original counterparts of financial reports and statements, as the Agent may from time to time reasonably request from the Borrower.

  • Uniform Commercial Code Security Agreement This Deed of Trust is intended to be a security agreement pursuant to the Uniform Commercial Code, as in effect in the State of Washington, as amended or recodified from time to time (the “Uniform Commercial Code”) for any of the items specified above as part of the Collateral which, under applicable law, may be subject to a security interest pursuant to the Uniform Commercial Code, and Trustor hereby grants Beneficiary a security interest in said items. Trustor agrees that Beneficiary may file this Deed of Trust, or a reproduction thereof, in the real estate records or other appropriate index, as a financing statement for any of the items specified above as part of the Collateral. Any reproduction of this Deed of Trust or of any other security agreement or financing statement shall be sufficient as a financing statement. In addition, Trustor agrees to execute and deliver to Beneficiary, upon Beneficiary’s request, any financing statements, as well as extensions, renewals and amendments thereof, and reproductions of this Deed of Trust in such form as Beneficiary may reasonably require to perfect a security interest with respect to said items. Trustor shall pay all costs of filing such financing statements and any extensions, renewals, amendments and releases thereof, and shall pay all reasonable costs and expenses of any record searches for financing statements Beneficiary may reasonably require. Without the prior written consent of Beneficiary, except as expressly provided in the Credit Agreement, Trustor shall not create or suffer to be created pursuant to the Uniform Commercial Code any other security interest in said items, including replacements and additions thereto. Upon a Default, Beneficiary shall have the remedies of a secured party under the Uniform Commercial Code and, at Beneficiary’s option, may also invoke the remedies provided herein or in any of and subject to the terms of the Loan Documents, or pursuant to any applicable law as to such items. In exercising any of said remedies, Beneficiary may proceed against the items of real property and any items of personal property specified above as part of the Collateral separately or together and in any order whatsoever, without in any way affecting the availability of Beneficiary’s remedies under the Uniform Commercial Code or of the remedies provided herein or in any of the Loan Documents. This Deed of Trust constitutes a fixture filing in accordance with the Washington Uniform Commercial Code (RCW 62A.9A-102(40)) as to all or any part of the Collateral which now or hereafter constitutes "Fixtures" under RCW 62A.9A-102(41).

  • Modification of Organizational Documents Not permit the charter, by-laws or other organizational documents of any Loan Party to be amended or modified in any way which could reasonably be expected to materially adversely affect the interests of the Lenders; not change, or allow any Loan Party to change, its state of formation or its organizational form.

  • Security Agreement under Uniform Commercial Code (a) It is the intention of the parties hereto that this Mortgage shall constitute a Security Agreement within the meaning of the Uniform Commercial Code (the “Code”) of the State in which the Mortgaged Property is located. If an Event of Default shall occur and be continuing under this Mortgage, then in addition to having any other right or remedy available at law or in equity, Mortgagee shall have the option of either (i) proceeding under the Code and exercising such rights and remedies as may be provided to a secured party by the Code with respect to all or any portion of the Mortgaged Property which is personal property (including, without limitation, taking possession of and selling such property) or (ii) treating such property as real property and proceeding with respect to both the real and personal property constituting the Mortgaged Property in accordance with Mortgagee’s rights, powers and remedies with respect to the real property (in which event the default provisions of the Code shall not apply). If Mortgagee shall elect to proceed under the Code, then ten days’ notice of sale of the personal property shall be deemed reasonable notice and the reasonable expenses of retaking, holding, preparing for sale, selling and the like incurred by Mortgagee shall include, but not be limited to, reasonable attorneys’ fees and legal expenses. At Mortgagee’s request, Mortgagor shall assemble the personal property and make it available to Mortgagee at a place designated by Mortgagee which is reasonably convenient to both parties.

  • Organization; Corporate Powers The Borrower and each of its Subsidiaries (i) is a corporation duly organized, validly existing and in good standing under the laws of the jurisdiction of its organization, (ii) is duly qualified to do business and is in good standing under the laws of each jurisdiction in which failure to be so qualified and in good standing could not reasonably be expected to have a Material Adverse Effect and (iii) has all requisite corporate power and authority to own, operate and encumber its property and to conduct its business as presently conducted and as proposed to be conducted.

  • Modifications of Organizational Documents The Parent and the Borrower shall not, and shall not permit any Loan Party or other Subsidiary to, amend, supplement, restate or otherwise modify its articles or certificate of incorporation, by-laws, operating agreement, declaration of trust, partnership agreement or other applicable organizational document if such amendment, supplement, restatement or other modification could reasonably be expected to have a Material Adverse Effect.

  • Acknowledgement and Consent to Bail-In of EEAAffected Financial Institutions Notwithstanding anything to the contrary in any Loan Document or in any other agreement, arrangement or understanding among any such parties, each party hereto acknowledges that any liability of any EEAAffected Financial Institution arising under any Loan Document, to the extent such liability is unsecured, may be subject to the write-down and conversion powers of an EEAthe applicable Resolution Authority and agrees and consents to, and acknowledges and agrees to be bound by:

Time is Money Join Law Insider Premium to draft better contracts faster.