Security Procedures and Protocols Sample Clauses

Security Procedures and Protocols. We may establish and inform you in writing about security features and methods to prevent unauthorized access to the CRS Software and the Central Reservation System. You will follow the commercially reasonable security procedures and protocols we establish. You shall not permit the PTU to be used to breach, attack, evade, destroy or invade the Central Reservation System in violation of the security procedures and protocols. You shall safeguard the User ID and Password we give you as a trade secret, revealed only to your employees on a need to know basis. You will immediately inform us if and when you believe that the User ID and Password have been lost, stolen, misappropriated or compromised and will follow our instructions regarding any replacement User ID and Password. We may incorporate in the CRS Software security features that disable or identify any computer other than the PTU that seeks access to the Central Reservation System.
AutoNDA by SimpleDocs
Security Procedures and Protocols. 4.11.1 The TPSP warrants that it shall always comply with all instructions or recommendations that the DFS Provider may issue from time to time regarding integration and security. The TPSP agrees that the DFS Provider is not responsible for the privacy, security or integrity of the TPSP’s Products. The TPSP shall be solely liable for setting up, maintaining, and regularly reviewing security arrangements concerning access to, and use of, the Services, APIs, File Upload Platform, White- Labeled App, Netbank Virtual, any element within the XxxX Program including information stored on the TPSP’s computing and communications systems, and authorized and designated TPSPs’ control of passwords, security devices and access to the Services, APIs, File Upload Platform, White-Labeled App, Netbank Virtual, and/or any element within the XxxX Program. 4.11.2 The TPSP confirms and warrants that it has assessed the security procedures and protocols within the XxxX API Program and has determined that these features, in combination with its own security measures, are adequate for the services and accounts opened in connection with this Agreement across all development environments. 4.11.3 The TPSP shall ensure that its duly authorized and designated users, personnel, and/or staff shall keep their credentials and authentication tokens secure and strictly confidential, and take steps to prevent unauthorized use thereof. The TPSP shall indemnify and agrees to hold the DFS Provider free and harmless from any and all claims, whether filed or threatened, of liability, loss, injury or damage caused to any party related to, arising from or incidental to such unauthorized access, 4.11.4 The TPSP is solely responsible for the performance and protection of any browser, operating system, or application used to connect to the elements within the XxxX Program including the prompt adoption by the TPSP of all security patches and other security measures issued or recommended from time to time by the suppliers of such browsers, operating systems, or applications. 4.11.5 In the event that the TPSP requests for access to the UAT environment, the TPSP shall first submit said request to the DFS Provider with all information required by the DFS Provider which shall include, at a minimum, the specific scope and functionalities of the TPSP’s Products. The DFS Provider shall have a right to require access to the test version of the TPSP’s Products to perform the DFS Provider's own testing or a produ...

Related to Security Procedures and Protocols

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Security Procedure The Client acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Client from Security Procedures offered by State Street. The Client agrees that the Security Procedures are reasonable and adequate for its wire transfer transactions and agrees to be bound by any payment orders, amendments and cancellations, whether or not authorized, issued in its name and accepted by State Street after being confirmed by any of the selected Security Procedures. The Client also agrees to be bound by any other valid and authorized payment order accepted by State Street. The Client shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated in writing to State Street. The Client must notify State Street immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Client’s authorized personnel. State Street shall verify the authenticity of all instructions according to the Security Procedure.

  • Safety Procedures The Contractor shall: (a) comply with all applicable safety regulations according to Attachment H; (b) take care for the safety of all persons entitled to be on the Site; (c) use reasonable efforts to keep the Site and Works clear of unnecessary obstruction so as to avoid danger to these persons; (d) provide fencing, lighting, guarding and watching of the Works until completion and taking over under clause 10 [Employer's Taking Over]; and (e) provide any Temporary Works (including roadways, footways, guards and fences) which may be necessary, because of the execution of the Works, for the use and protection of the public and of owners and occupiers of adjacent land.

  • Violence Policies and Procedures The Employer agrees to have in place explicit policies and procedures to deal with violence. The policy will address the prevention of violence, the management of violent situations, provision of legal counsel and support to employees who have faced violence. The policies and procedures shall be part of the employee's health and safety policy and written copies shall be provided to each employee. Prior to implementing any changes to these policies, the employer agrees to consult with the Association.

  • Safety and Security Procedures Contractor shall maintain and enforce, at the Contractor Work Locations, industry-standard safety and physical security policies and procedures. While at each Court Work Location, Contractor shall comply with the safety and security policies and procedures in effect at such Court Work Location.

  • Policies and Procedures i) The policies and procedures of the designated employer apply to the employee while working at both sites. ii) Only the designated employer shall have exclusive authority over the employee in regard to discipline, reporting to the College of Nurses of Ontario and/or investigations of family/resident complaints. iii) The designated employer will ensure that the employee is covered by WSIB at all times, regardless of worksite, while in the employ of either home. iv) The designated employer will ensure that the employee is covered by liability insurance at all times, regardless of worksite, while in the employ of either home. v) The designated employer shall have exclusive authority over the employee’s personnel files and health records. These files will be maintained on the site of the designated employer.

  • Compliance Policies and Procedures To assist the Fund in complying with Rule 38a-1 of the 1940 Act, BBH&Co. represents that it has adopted written policies and procedures reasonably designed to prevent violation of the federal securities laws in fulfilling its obligations under the Agreement and that it has in place a compliance program to monitor its compliance with those policies and procedures. BBH&Co will upon request provide the Fund with information about our compliance program as mutually agreed.

  • WARRANTY PROCEDURES You need proof of purchase for warranty service.

  • Procurement procedures 11.1 The Recipient must secure the best value for money and shall act in a fair, open and non-discriminatory manner in all purchases of goods and services.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!