Security Products Clause Samples

The 'Security Products' clause defines the types of security-related goods or services covered under the agreement. It typically outlines the specific products, such as alarm systems, surveillance cameras, or cybersecurity software, that are being provided, installed, or maintained by one party for the other. This clause ensures both parties have a clear understanding of what security products are included, thereby preventing disputes over scope and ensuring that the agreed-upon security measures are properly implemented.
POPULAR SAMPLE Copied 1 times
Security Products. When you receive access to our security Products as part of a delivery of our analytics and mobility Products, you may only use those security Products to authenticate access to analytics reports. You are responsible for (a) configuring the security Products to integrate with your network and the Security Applications; and (b) making available to your Named Users terms of use and a privacy policy for the Security Applications that is consistent with the terms of use and privacy policy we include as part of the Security Applications on each platform where the Security Applications are available (e.g., the Apple App Store for iOS devices and the Google Play Store for Android devices). “Security Application” means the iOS and Android versions of any of our proprietary, standard mobile security software applications that users can download onto their smartphones, as may be modified by us from time to time. OUR SECURITY PRODUCTS ARE NOT DESIGNED TO AND WILL NOT BE USED TO MANAGE PHYSICAL OR LOGICAL ACCESS TO FACILITIES OR SYSTEMS WHERE DELAY IN OR FAILURE OF SUCH ACCESS COULD THREATEN HEALTH OR SAFETY, OR CAUSE PROPERTY, ENVIRONMENTAL OR SIMILAR DAMAGE OR LOSS, AND YOU AGREE NOT TO USE THEM TO MANAGE SUCH ACCESS UNLESS YOU PROVIDE A FAILSAFE MECHANISM FOR LOCAL BYPASS OF THE SECURITY PRODUCTS FOR USE IN AN EMERGENCY FOR WHICH YOU WILL BE FULLY RESPONSIBLE.
Security Products. When you receive access to our security Products as part of a delivery of our analytics and mobility Products, you may only use those security Products to authenticate access to analytics reports. You are responsible for (a) configuring the security Products to integrate with your network and the Security Applications; and (b) making available to your Named Users terms of use and a privacy policy for the Security Applications that is consistent with the terms of use and privacy policy we include as part of the Security Applications on each platform where the Security Applications are available (e.g., the Apple App Store for iOS devices and the Google Play Store for Android devices). “Security Application” means the iOS and Android versions of any of our proprietary, standard mobile security software applications that users can download onto their smartphones, as may be modified by us from time to time. OUR SECURITY PRODUCTS ARE NOT DESIGNED TO AND WILL NOT BE USED TO MANAGE PHYSICAL OR LOGICAL ACCESS TO FACILITIES OR SYSTEMS WHERE DELAY IN OR FAILURE OF SUCH ACCESS COULD THREATEN HEALTH OR SAFETY, OR CAUSE PROPERTY, ENVIRONMENTAL OR SIMILAR DAMAGE OR LOSS, AND YOU AGREE NOT TO USE THEM TO MANAGE SUCH ACCESS UNLESS YOU PROVIDE A FAILSAFE MECHANISM FOR LOCAL BYPASS OF THE SECURITY PRODUCTS FOR USE IN AN EMERGENCY FOR WHICH YOU WILL BE FULLY RESPONSIBLE. 4. 安全产品。当贵方获得了与分析和移动产品一并交付的本公司的安全产品时,您仅可将这些安全产品用于验证是否有资格获取分析报告。贵方应负责 (a) 将安全产品配置于您的网络和安全应用程序中;并 (b) 将安全应用程序的使用条款和隐私政策提供给贵方的指定用户,该等使用条款和隐私政策与可获得安全应用程序的每个平台上该安全应用程序的使用条款和隐私政策一致(例如,针对 iOS 设备的苹果应用商店以及针对安卓设备的 Google Play 商店)。“安全应用程序”指本公司不时修订的,本公司的任何专有、标准移动端安全软件应用程序的 iOS 和安卓系统版本,用户可将该等软件下载至自己的智能手机中。本公司的安全产品并非也不会用于管理以物理或逻辑方式进入以下设施或系统,即, 延迟进入或未进入该等设施或系统可能威胁健康或安全,造成财产、环境或类似损害或损失,且贵方同意在管理进入上述设施或系统时不使用这些安全产品, 除非贵方能提供一种旨在在紧急情况下使用的,绕开安全产品的自动防故障机制,且贵方对此承担全部责任。
Security Products. A complete and comprehensive offering of security products such as access control products, security and CCTV cameras, sound systems, strobe and warning lights, monitoring, entrance protection, security sensors and contacts and all other related security products offered by Proposer.
Security Products. A) Do you use an Endpoint Protection (EPP) product across your enterprise? ☐Y ☐N B) Do you use an Endpoint Detection and Response (EDR) product across your enterprise? ☐Y ☐N
Security Products. When Licensee receives access to MicroStrategy’s security Products as part of a delivery of MicroStrategy’s analytics and mobility Products, Licensee may only use those security Products to authenticate access to analytics reports. Licensee is responsible for (a) configuring the security Products to integrate with Licensee’s network and the Security Applications; and (b) making available to Licensee’s Named Users terms of use and a privacy policy for the Security Applications that is consistent with the terms of use and privacy policy MicroStrategy includes as part of the Security Applications on each platform where the Security Applications are available (e.g., the Apple App Store for iOS devices and the Google Play Store for Android devices). “Security Application” means the iOS and Android versions of any of MicroStrategy’s proprietary, standard mobile security software applications that users can download onto their smartphones, as may be modified by MicroStrategy from time to time. MICROSTRATEGY’S SECURITY PRODUCTS ARE NOT DESIGNED TO AND WILL NOT BE USED TO MANAGE PHYSICAL OR LOGICAL ACCESS TO FACILITIES OR SYSTEMS WHERE DELAY IN OR FAILURE OF SUCH ACCESS COULD THREATEN HEALTH OR SAFETY, OR CAUSE PROPERTY, ENVIRONMENTAL OR SIMILAR DAMAGE OR LOSS, AND LICENSEE AGREES NOT TO USE THEM TO MANAGE SUCH ACCESS UNLESS LICENSEE PROVIDES A FAILSAFE MECHANISM FOR LOCAL BYPASS OF THE SECURITY PRODUCTS FOR USE IN AN EMERGENCY FOR WHICH LICENSEE WILL BE FULLY RESPONSIBLE.

Related to Security Products

  • Security Program Contractor will develop and implement an effective security program for the Project Site, which program shall require the Contractor and subcontractors to take measures for the protection of their tools, materials, equipment, and structures. As between Contractor and Owner, Contractor shall be solely responsible for security against theft of and damage of all tools and equipment of every kind and nature and used in connection with the Work, regardless of by whom owned.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks. (2) The Information Security Program shall require encryption of any Personal Information in electronic format while in transit or in storage, and enhanced controls and standards for transport and disposal of physical media containing Personal Information. DTI shall, and shall require its agents, contractors and subcontractors who access or use Personal Information or Confidential Information to, regularly test key controls, systems and procedures relating to the Information Security Program ("ISP Tests"). DTI shall advise the Funds of any material issues identified in the ISP Tests potentially affecting the Information Security Program. (3) DTI shall comply with its Information Security Program.

  • Third Party Products 12.1 Third-party products provided to you by NCR Voyix for use with your subscription to the Service are subject to any terms provided by their supplier, including but not limited to those terms and conditions set forth in the exhibits attached hereto. Third-party terms and conditions are subject to change at any time by the supplier, and you agree that your use of such third-party products and services is governed by such supplier’s terms and conditions. You hereby release NCR Voyix from any and all liability associated with any damages or claims arising out of or related to third-party products. UNLESS NCR ▇▇▇▇▇ SPECIFICALLY AGREES OTHERWISE IN WRITING, YOU ACKNOWLEDGE AND AGREE THAT SUCH THIRD-PARTY PRODUCTS ARE PROVIDED “AS-IS” WITHOUT A WARRANTY FROM NCR Voyix. ACCORDINGLY, NCR Voyix EXPRESSLY DISCLAIMS ALL WARRANTIES OF ANY NATURE WITH RESPECT TO ANY SUCH THIRD-PARTY PRODUCTS, WHETHER ORAL OR WRITTEN, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT OF ANY THIRD-PARTY RIGHTS. 12.2 Third-party products and services may be advertised or made available to you for purchase directly from their supplier by email or other electronic communications, including notifications made through the Service or the Account Portal. Any representations or warranties that may be provided in connection with any such third-party products or services are provided solely by their supplier. NCR Voyix will not be responsible for any of your dealings or interactions with any of those third-party suppliers.

  • Third Party Products and Services Any third-party hardware, software and/or services that is delivered by ResMed for use either standalone or in conjunction with ResMed products and/or services, shall be subject to the third-party terms and conditions and/or license agreements between Customer and the third party. Such third-party hardware, software and/or services is provided by ResMed "AS IS," without any warranty of any kind. Any representations or warranties as to such hardware, software and/or services shall only be as granted by the applicable third parties, if any, that accompany such products and/or software and/or services. Any representations, warranties, or other similar obligations with respect to such third-party hardware, software and/or services flow directly from the third party to Customer and ResMed shall have no responsibility at all for any such representations, warranties, obligations or lack thereof.