Security Products Sample Clauses

Security Products. When you receive access to our security Products as part of a delivery of our analytics and mobility Products, you may only use those security Products to authenticate access to analytics reports. You are responsible for (a) configuring the security Products to integrate with your network and the Security Applications; and (b) making available to your Named Users terms of use and a privacy policy for the Security Applications that is consistent with the terms of use and privacy policy we include as part of the Security Applications on each platform where the Security Applications are available (e.g., the Apple App Store for iOS devices and the Google Play Store for Android devices). “Security Application” means the iOS and Android versions of any of our proprietary, standard mobile security software applications that users can download onto their smartphones, as may be modified by us from time to time. OUR SECURITY PRODUCTS ARE NOT DESIGNED TO AND WILL NOT BE USED TO MANAGE PHYSICAL OR LOGICAL ACCESS TO FACILITIES OR SYSTEMS WHERE DELAY IN OR FAILURE OF SUCH ACCESS COULD THREATEN HEALTH OR SAFETY, OR CAUSE PROPERTY, ENVIRONMENTAL OR SIMILAR DAMAGE OR LOSS, AND YOU AGREE NOT TO USE THEM TO MANAGE SUCH ACCESS UNLESS YOU PROVIDE A FAILSAFE MECHANISM FOR LOCAL BYPASS OF THE SECURITY PRODUCTS FOR USE IN AN EMERGENCY FOR WHICH YOU WILL BE FULLY RESPONSIBLE.
AutoNDA by SimpleDocs
Security Products. A complete and comprehensive offering of security products such as access control products, security and CCTV cameras, sound systems, strobe and warning lights, monitoring, entrance protection, security sensors and contacts and all other related security products offered by Proposer.
Security Products. When you receive access to our security Products as part of a delivery of our analytics and mobility Products, you may only use those security Products to authenticate access to analytics reports. You are responsible for (a) configuring the security Products to integrate with your network and the Security Applications; and (b) making available to your Named Users terms of use and a privacy policy for the Security Applications that is consistent with the terms of use and privacy policy we include as part of the Security Applications on each platform where the Security Applications are available (e.g., the Apple App Store for iOS devices and the Google Play Store for Android devices). “Security Application” means the iOS and Android versions of any of our proprietary, standard mobile security software applications that users can download onto their smartphones, as may be modified by us from time to time. OUR SECURITY PRODUCTS ARE NOT DESIGNED TO AND WILL NOT BE USED TO MANAGE PHYSICAL OR LOGICAL ACCESS TO FACILITIES OR SYSTEMS WHERE DELAY IN OR FAILURE OF SUCH ACCESS COULD THREATEN HEALTH OR SAFETY, OR CAUSE PROPERTY, ENVIRONMENTAL OR SIMILAR DAMAGE OR LOSS, AND YOU AGREE NOT TO USE THEM TO MANAGE SUCH ACCESS UNLESS YOU PROVIDE A FAILSAFE MECHANISM FOR LOCAL BYPASS OF THE SECURITY PRODUCTS FOR USE IN AN EMERGENCY FOR WHICH YOU WILL BE FULLY RESPONSIBLE. 4. 보안제품. 당사의 분석 및 이동통신 제품이 인도되어 귀사가 당사의 보안제품에 대한 접근권한을 받을 경우, 귀사는 분석 보고서에 대한 접근을 인증 받기 위해서만 해당 보안제품을 사용할 수 있습니다. 귀사는 (a) 귀사의 네트워크와 통합될 수 있도록 보안제품을 설정하고, (b) 귀사의 지정사용자들에게 보안 애플리케이션이 제공되는 각 플랫폼(가령, iOS 기기를 위한 애플 앱스토어 및 안드로이드를 위한 구글 플레이 스토어)의 보안 애플리케이션에 당사가 포함시킨 사용조건과 개인정보보호정책에 일치하는 보안 애플리케이션에 대한 사용조건과 개인정보보호정책을 제공할 책임이 있습니다. “보안 애플리케이션”이라 함은 사용자들이 그들의 스마트폰으로 다운로드 할 수 있는 당사가 소유하는 표준 이동통신 보안 소프트웨어 애플리케이션의 iOS 및 안드로이드 버전을 의미하고, 보안 애플리케이션은 당사가 수시로 변경할 수 있습니다. 당사의 보안제품은 시설이나 시스템에 대한 물리적 또는 로지컬 액세스가 지연되거나 실패할 경우 건강 또는 안전을 위협하거나, 재산이나 환경에 대한 손해‧손실 또는 유사한 손해‧손실을 일으키는 물리적 또는 로지컬 액세스를 관리하기 위해 설계된 것이 아니며 그러한 물리적 또는 로지컬 액세스를 관리하기 위하여 사용되어서도 안 됩니다. 나아가 귀사는 응급 상황 시 사용 중인 보안제품을 무시하고 작동될 오작동 가능성이 배제된 안전한 메커니즘(failsafe mechanism)을 제공하지 않는 이상 그러한 액세스를 관리하는데 있어 당사의 보안제품을 사용하지 않기로 합의합니다.
Security Products. When Licensee receives access to MicroStrategy’s security Products as part of a delivery of MicroStrategy’s analytics and mobility Products, Licensee may only use those security Products to authenticate access to analytics reports. Licensee is responsible for (a) configuring the security Products to integrate with Licensee’s network and the Security Applications; and (b) making available to Licensee’s Named Users terms of use and a privacy policy for the Security Applications that is consistent with the terms of use and privacy policy MicroStrategy includes as part of the Security Applications on each platform where the Security Applications are available (e.g., the Apple App Store for iOS devices and the Google Play Store for Android devices). “Security Application” means the iOS and Android versions of any of MicroStrategy’s proprietary, standard mobile security software applications that users can download onto their smartphones, as may be modified by MicroStrategy from time to time. MICROSTRATEGY’S SECURITY PRODUCTS ARE NOT DESIGNED TO AND WILL NOT BE USED TO MANAGE PHYSICAL OR LOGICAL ACCESS TO FACILITIES OR SYSTEMS WHERE DELAY IN OR FAILURE OF SUCH ACCESS COULD THREATEN HEALTH OR SAFETY, OR CAUSE PROPERTY, ENVIRONMENTAL OR SIMILAR DAMAGE OR LOSS, AND LICENSEE AGREES NOT TO USE THEM TO MANAGE SUCH ACCESS UNLESS LICENSEE PROVIDES A FAILSAFE MECHANISM FOR LOCAL BYPASS OF THE SECURITY PRODUCTS FOR USE IN AN EMERGENCY FOR WHICH LICENSEE WILL BE FULLY RESPONSIBLE.
Security Products. A) Do you use an Endpoint Protection (EPP) product across your enterprise? ☐Y ☐N B) Do you use an Endpoint Detection and Response (EDR) product across your enterprise? ☐Y ☐N

Related to Security Products

  • Security Program Contractor will develop and implement an effective security program for the Project Site, which program shall require the Contractor and subcontractors to take measures for the protection of their tools, materials, equipment, and structures. As between Contractor and Owner, Contractor shall be solely responsible for security against theft of and damage of all tools and equipment of every kind and nature and used in connection with the Work, regardless of by whom owned.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks. (2) The Information Security Program shall require encryption of any Personal Information in electronic format while in transit or in storage, and enhanced controls and standards for transport and disposal of physical media containing Personal Information. DTI shall, and shall require its agents, contractors and subcontractors who access or use Personal Information or Confidential Information to, regularly test key controls, systems and procedures relating to the Information Security Program ("ISP Tests"). DTI shall advise the Funds of any material issues identified in the ISP Tests potentially affecting the Information Security Program. (3) DTI shall comply with its Information Security Program.

  • Third Party Products 12.1 Third-party products provided to you by NCR Voyix for use with your subscription to the Service are subject to any terms provided by their supplier, including but not limited to those terms and conditions set forth in the exhibits attached hereto. Third-party terms and conditions are subject to change at any time by the supplier, and you agree that your use of such third-party products and services is governed by such supplier’s terms and conditions. You hereby release NCR Voyix from any and all liability associated with any damages or claims arising out of or related to third-party products. UNLESS NCR Xxxxx SPECIFICALLY AGREES OTHERWISE IN WRITING, YOU ACKNOWLEDGE AND AGREE THAT SUCH THIRD-PARTY PRODUCTS ARE PROVIDED “AS-IS” WITHOUT A WARRANTY FROM NCR Voyix. ACCORDINGLY, NCR Voyix EXPRESSLY DISCLAIMS ALL WARRANTIES OF ANY NATURE WITH RESPECT TO ANY SUCH THIRD-PARTY PRODUCTS, WHETHER ORAL OR WRITTEN, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT OF ANY THIRD-PARTY RIGHTS. 12.2 Third-party products and services may be advertised or made available to you for purchase directly from their supplier by email or other electronic communications, including notifications made through the Service or the Account Portal. Any representations or warranties that may be provided in connection with any such third-party products or services are provided solely by their supplier. NCR Voyix will not be responsible for any of your dealings or interactions with any of those third-party suppliers.

  • Third Party Products and Services Any third-party hardware, software and/or services that is delivered by ResMed for use either standalone or in conjunction with ResMed products and/or services, shall be subject to the third-party terms and conditions and/or license agreements between Customer and the third party. Such third-party hardware, software and/or services is provided by ResMed "AS IS," without any warranty of any kind. Any representations or warranties as to such hardware, software and/or services shall only be as granted by the applicable third parties, if any, that accompany such products and/or software and/or services. Any representations, warranties, or other similar obligations with respect to such third-party hardware, software and/or services flow directly from the third party to Customer and ResMed shall have no responsibility at all for any such representations, warranties, obligations or lack thereof.

  • Custom Products Effective upon creation of Custom Products, Contractor hereby conveys, assigns and transfers to Authorized User the sole and exclusive rights, title and interest in Custom Product(s), whether preliminary, final or otherwise, including all trademark and copyrights. Contractor hereby agrees to take all necessary and appropriate steps to ensure that the Custom Products are protected against unauthorized copying, reproduction and marketing by or through Contractor, its agents, employees, or Subcontractors. Nothing herein shall preclude the Contractor from otherwise using the related or underlying general knowledge, skills, ideas, concepts, techniques and experience developed under a Purchase Order, project definition or work order in the course of Contractor’s business. Authorized User may, by providing written notice thereof to the Contractor, elect in the alternative to take a non-exclusive perpetual license to Custom Products in lieu of Authorized User taking exclusive ownership and title to such Products. In such case, Licensee on behalf of all Authorized Users shall be granted a non-exclusive perpetual license to use, execute, reproduce, display, perform, adapt and distribute Custom Product as necessary to fully effect the general business purpose(s) as stated in paragraph (b)(i)(2), above.

  • Security Technology When the service is accessed using a supported web browser, Secure Socket Layer (“SSL”), or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall include server authentication and data encryption. Provider shall host data pursuant to the DPA in an environment using a firewall that is periodically updated according to industry standards.

  • Product ACCEPTANCE Unless otherwise provided by mutual agreement of the Authorized User and the Contractor, Authorized User(s) shall have thirty (30) days from the date of delivery to accept hardware products and sixty (60) days from the date of delivery to accept all other Product. Where the Contractor is responsible for installation, acceptance shall be from completion of installation. Failure to provide notice of acceptance or rejection or a deficiency statement to the Contractor by the end of the period provided for under this clause constitutes acceptance by the Authorized User(s) as of the expiration of that period. The License Term shall be extended by the time periods allowed for trial use, testing and acceptance unless the Commissioner or Authorized User agrees to accept the Product at completion of trial use. Unless otherwise provided by mutual agreement of the Authorized User and the Contractor, Authorized User shall have the option to run testing on the Product prior to acceptance, such tests and data sets to be specified by User. Where using its own data or tests, Authorized User must have the tests or representative set of data available upon delivery. This demonstration will take the form of a documented installation test, capable of observation by the Authorized User, and shall be made part of the Contractor’s standard documentation. The test data shall remain accessible to the Authorized User after completion of the test. In the event that the documented installation test cannot be completed successfully within the specified acceptance period, and the Contractor or Product is responsible for the delay, Authorized User shall have the option to cancel the order in whole or in part, or to extend the testing period for an additional thirty (30) day increment. Authorized User shall notify Contractor of acceptance upon successful completion of the documented installation test. Such cancellation shall not give rise to any cause of action against the Authorized User for damages, loss of profits, expenses, or other remuneration of any kind. If the Authorized User elects to provide a deficiency statement specifying how the Product fails to meet the specifications within the testing period, Contractor shall have thirty (30) days to correct the deficiency, and the Authorized User shall have an additional sixty (60) days to evaluate the Product as provided herein. If the Product does not meet the specifications at the end of the extended testing period, Authorized User, upon prior written notice to Contractor, may then reject the Product and return all defective Product to Contractor, and Contractor shall refund any monies paid by the Authorized User to Contractor therefor. Costs and liabilities associated with a failure of the Product to perform in accordance with the functionality tests or product specifications during the acceptance period shall be borne fully by Contractor to the extent that said costs or liabilities shall not have been caused by negligent or willful acts or omissions of the Authorized User’s agents or employees. Said costs shall be limited to the amounts set forth in the Limitation of Liability Clause for any liability for costs incurred at the direction or recommendation of Contractor.

  • Other Products and Services As our customer, you have access to a suite of financial products and services availed by ourselves, our affiliates and strategic partners designed to help you address and achieve your financial needs and goals. You agree that you can obtain information about such Products and Services via our website xxx.xxxxxxxx.xxx.xx and you further agree that we can from time to time communicate information in relation to such Products or Services to you specifically or generally to all cardmembers via such communication mode as we consider appropriate.

  • Procurement of Goods and Works Except as ADB may otherwise agree, Goods and Works shall only be procured on the basis of the methods of procurement set forth below:

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!