Security Settings Sample Clauses

The Security Settings clause defines the requirements and standards for protecting data, systems, or premises involved in the agreement. It typically outlines the specific security measures that must be implemented, such as encryption protocols, access controls, or regular security audits, and may specify responsibilities for both parties regarding the maintenance and reporting of security incidents. This clause ensures that sensitive information and assets are safeguarded, reducing the risk of unauthorized access or data breaches and clarifying each party's obligations in maintaining a secure environment.
Security Settings. You acknowledge that when installing the SOFTWARE PRODUCT You may be required to set Your Macro Security Level within Microsoft Excel to ‘Medium’ or lower. Following the installation of the SOFTWARE PRODUCT you may reinstate any Macro Security Level that You desire. MODANO PTY LTD or its suppliers will not accept, under any circumstances, any liability for any damage that may occur as a result of You changing Your Macro Security Level within Microsoft Excel.
Security Settings. Enable this feature when you want to restrict users to access to the WorldCard Team server only from company's internal IP or a device with a specific external IP address. For example, if you only allow a Windows computer in the boss's home to connect, or only the branch office staffs can connect, you can click to fill in the range of IP addresses or an IP segment that can be allowed to connect. .
Security Settings. If selected, PrimoPDF will save your security settings (password, encryption key length, permissions, etc…) for future conversions. • Document Information. If selected, PrimoPDF will save your document information settings (Title, Author, Subject, Keywords) for future conversions. Post PDF Launch. If checked, PrimoPDF will automatically launch the selected application after printing. Click Launch Application for additional configuration options. • Automatically launch default viewer upon completion. If checked, PrimoPDF will automatically open the output PDF in your computer’s default PDF viewer. • Launch Application. If set, PrimoPDF will launch the chosen application or file path after the PDF is created. You must disable Automatically launch default viewer upon completion. Conversion Log. If Selected, PrimoPDF will generate a conversion log detailing problems encountered during the PDF conversion. Enable Messages. If pressed, PrimoPDF will once again display any message(s) previously ignored via the “Remember my choice” selection. Customizing your PDFs All PrimoPDF’s custom settings can be accessed by clicking the Customize button on the main PrimoPDF dialog box.
Security Settings. ‌ In Security Tab, you could change the type of tag protection as below. There are three types of protection as below:
Security Settings. You will update security settings on mobile devices and computers that contain your card or account information.
Security Settings. The document shall describe all of the systems security settings (including access control) and instructions on how to modify security settings and add new users.
Security Settings i) Tools=>Internet Options=>Security=>Disable protected Mode If enabled- i.e., Remove the tick from the box mentioning “Enable Protected Mode”. ii) Tools => Internet Options => Security =>Custom Level=> • Active X control & plug-ins: Enable all Active-X Controls • Scripting: Enable “Allow Status Bar Update Via Script” • Disable “Use Pop-up Blocker”
Security Settings. These settings will restrict a user’s ability to change the PDF document. If the password to change security is set, the user must enter the password in order to change these settings. The following security settings can be selected: • Allow users to print my PDF • Allow users to copy text and graphics from my PDF • Allow users to add comments • Allow users to change my PDF, including editing text and adding or removing pages NOTE: The Security Setting options remain dimmed until you specify an Owner Password. Document Properties You can use Document Properties to record information about your document to help organize your PDFs so that you can find them easily later (see Figure 3).
Security Settings. In order to improve privacy and security, we have implemented the following requirements: - Minimum password length; - Minimum password strength; - Established number of unsuccessful attempts before account is locked; - Established number of minutes of inactivity before user is automatically logged out; and - Each user is assigned to a defined role as described below.

Related to Security Settings

  • Security Service Tenant acknowledges and agrees that, while Landlord may patrol the Project, Landlord is not providing any security services with respect to the Premises and that Landlord shall not be liable to Tenant for, and Tenant waives any claim against Landlord with respect to, any loss by theft or any other damage suffered or incurred by Tenant in connection with any unauthorized entry into the Premises or any other breach of security with respect to the Premises.

  • Security Services CONTRACTOR shall provide security services designed for preventing escapes, maintaining order, providing care, custody, control, supervision and management of the inmate population. A successful security program depends heavily on staff training, effective administration, and the establishment of inmate programs. The organization, staffing, and administration of the security program are vital to the Facility. The direction provided by a well-organized and clearly articulated operations manual, and emergency planning provides a solid base for successful administration. The final operations manual shall be submitted to the Bureau prior to the Service Commencement Date and shall be reviewed annually and updated as needed. Documentation of the review shall be provided annually to the On- Site Contract Monitor. Changes to the plan require written permission by the Contract Manager. The Department reserves the right to require changes to plans submitted to the Bureau.

  • Security Cameras Security cameras have been installed throughout the Facility; however, they will not routinely be used in areas where there is an expectation of privacy, such as restrooms or patient care areas.

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Security Systems The Service may not be compatible with security systems. You may be required to maintain a telephone connection through your local exchange carrier in order to use any alarm monitoring functions for any security system installed in your home or business. You are responsible for contacting the alarm monitoring company to test the compatibility of any alarm monitoring or security system with the Service.