Security Resources Sample Clauses

Security Resources. The Parties’ may, upon mutual agreement, provide resources from its security group to assist with an identified Data Security Breach for the purpose of meeting its obligations in relation to the notification of a Data Security Breach under Applicable Laws or other notification obligations or requirements.
AutoNDA by SimpleDocs
Security Resources. Dropbox provides the following Security Resources for these services: (a) the Dropbox Security Whitepaper available at xxxxx://xxx.xxxxxxx.xxx/static/business/resources/Security_Whitepaper.pdf; and
Security Resources. The next sections present three individual scenarios providing an example of each of the available security resource types. For each example, we choose to deploy the resource inside the ADS testbed. The newly created machine will be attached to the private network and OpenStack will provide a floating IP to reach the resource. In order to log on the machine, we provide our public SSH key. Below there are the yaml definition of the security resources available. 4.2.1. Example 1
Security Resources. A Security Resource is a commonly used security agent that the Experimenter can include in her experiment. She can access and configure it through a static initial configuration, included in the TOSCA description of the Resource, or, once deployed, through a REST interface that exposes its main services. The Experimenter can also ask the Security Resource to send its log messages to a remote log collector, which makes them available in a simple web page reserved to her. The Experimenter could easily access it through its web browser and check the behaviour of her all security agents, and to see some statistics. The Experimenter can get the Security Resource in two different formats: • As an agent directly installed in the VM that she wants to monitor. The system will provide her a script that the Experimenter has just to run inside the VM. It will be already configured as required in the TOSCA description of the resource. The output of the script will provide to the Experimenter information on how to access the deployed resource (URLs, etc.) • As a standalone VM the Security Resource will be deployed directly by the Security Manager in the testbed chosen by the Experimenter. The Security Manager will take care of the initial configuration of the resource. The Experimenter has to set up on her own the redirection of the network traffic that she wants to control through the Security Resource VM (by means of tunnelling or SDN capabilities). To date the only Security Resource available on the SoftFIRE environment is the firewall.
Security Resources. Security Resources regarding these Services are available at xxxxx://xxx.xxxxxxxxx.xxx/trust/security.

Related to Security Resources

  • Electric Storage Resources Developer interconnecting an electric storage resource shall establish an operating range in Appendix C of its LGIA that specifies a minimum state of charge and a maximum state of charge between which the electric storage resource will be required to provide primary frequency response consistent with the conditions set forth in Articles 9.5.5, 9.5.5.1, 9.5.5.2, and 9.5.5.3 of this Agreement. Appendix C shall specify whether the operating range is static or dynamic, and shall consider (1) the expected magnitude of frequency deviations in the interconnection; (2) the expected duration that system frequency will remain outside of the deadband parameter in the interconnection; (3) the expected incidence of frequency deviations outside of the deadband parameter in the interconnection; (4) the physical capabilities of the electric storage resource; (5) operational limitations of the electric storage resources due to manufacturer specification; and (6) any other relevant factors agreed to by the NYISO, Connecting Transmission Owner, and Developer. If the operating range is dynamic, then Appendix C must establish how frequently the operating range will be reevaluated and the factors that may be considered during its reevaluation. Developer’s electric storage resource is required to provide timely and sustained primary frequency response consistent with Article 9.5.5.2 of this Agreement when it is online and dispatched to inject electricity to the New York State Transmission System and/or receive electricity from the New York State Transmission System. This excludes circumstances when the electric storage resource is not dispatched to inject electricity to the New York State Transmission System and/or dispatched to receive electricity from the New York State Transmission System. If Developer’s electric storage resource is charging at the time of a frequency deviation outside of its deadband parameter, it is to increase (for over-frequency deviations) or decrease (for under-frequency deviations) the rate at which it is charging in accordance with its droop parameter. Developer’s electric storage resource is not required to change from charging to discharging, or vice versa, unless the response necessitated by the droop and deadband settings requires it to do so and it is technically capable of making such a transition.

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Security Requirements 7.1 The Authority will review the Contractor’s Security Plan when submitted by the Contractor in accordance with the Schedule (Security Requirements and Plan) and at least annually thereafter.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!