Security Solution Sample Clauses

Security Solution. All Included Programs distributed by Licensee must be protected by the Security Solution.
Security Solution. All transmissions of the Licensed Programs shall be encrypted and protected with applicable Security Solution, and each Permitted Device shall employ the applicable Security Solution to protect the Licensed Programs from unauthorized access, use and distribution and to meet the requirements herein, including the Usage Rules. Each security upgrade for each Security Solution that is reasonably necessary to maintain security shall be implemented within a commercially reasonable period of time after such upgrade first becomes commercially available.
Security Solution. In accordance with the Netbank Agreement, the Customer is given a password that will give the Customer access to enter into this Agreement regarding Information Services via the Internet, etc, as soon as the Bank has made the service available to the Customer. The regulations regarding security solutions stipulated in the Netbank Agreement otherwise apply.
Security Solution. <Name of the solution>
Security Solution. (a) For the purpose of protecting the Licensed Programs from unauthorized access, use and distribution, all Licensed Programs must be encrypted and protected with a Security Solution prior to transmission to end users. Such encryption must be on a file level basis with AES 128 (or more robust) encryption and each instance of the Licensed Programs shall be encrypted with a unique encrypted cryptographic key. All Security Solution licenses, keys, certificates and similar security assets must be encrypted. Each instance of the Authorized App/Player shall contain a Security Solution client (or client- side Security Solution component). In each instance, the Security Solution shall be implemented in accordance with industry-standard security practices with the “View Only”, “Copy Never”, “Copy Count = 0”, “No Copies”, “No Transfer” and equivalent settings used for all Licensed Programs wherever the Security Solution supports these settings. Security Solution updates/upgrades that are reasonably necessary to maintain security shall be implemented promptly within a reasonable time after their release. Updates/upgrades to the Authorized App/Player shall be implemented promptly upon such updates/upgrades becoming available if they address a known security issue, and access to the Licensed Service(s) via Internet Streaming Delivery on the applicable Authorized Internet Devices shall be suspended until the user upgrades to the latest authorized version of the Authorized App/Player which addresses that known security issue. Notwithstanding the foregoing, in the case of Licensee’s transmission to HbbTV televisions where Licensee uses a version of HbbTV that does not support encryption (i.e., a version prior to HbbTV 2.0.1), such transmission is not required to comply with the encryption and output requirements herein.
Security Solution. The Customer will receive a password to be used when logging on to the Secured services. The password is personal and must under no circumstances be used by a third party. The Customer shall be aware that a third party who has knowledge of the Customer’s password may log on to and use the Secured services on which the Customer has entered into an agreement. If the Customer is a company or the like, the Customer is responsible for appointing a private individual/contact person in the company who will receive passwords, etc, at any time. The person stated as contact in the separate registration form, has been given sufficient authorisation to retrieve and receive the necessary documents, password etc. If the Customer is a private individual, the Customer will receive BankID and must enter into an agreement for PersonBankID. BankID together with a password and a security code are used to log on to the Netbank. The Bank sends the Customer a security card with security codes and a start code for the security card. The Customer may also use a BankID issued by another bank. The liability provisions of Nordea's terms of agreement for PersonBankID, if relevant, apply to the Customer and Nordea.
Security Solution. Apple shall use the Security Solution on all eContent. [***]. At any time after either Party becomes aware of a Security Breach, Audible shall have the right to require Apple to immediately remove any or all eContent from distribution, including distribution via ITMS. If the Security Breach is not cured during the Cure Period, then, upon Audible’s request, Apple shall suspend distributing eContent until such time as the Security Breach is actually cured, [***].
Security Solution. Nordea uses different security solutions or a combination of security solutions for the logging on to Secured services. For example, the security solution may be electronic certificates, security cards, applications on mobile units, units as such or only passwords, codes and biometric characteristics. The security solutions are personal and must not be transferred or given to or be used by other persons than the customer. For some security solutions passwords or codes are used. In such cases the Customer may create his own password or receive passwords and codes from the Bank. Passwords, personal codes and other security procedures must not be revealed to anyone, not even to the Police, the Bank nor members of the household. Passwords must not be written down as this may enable misuse by others.

Related to Security Solution

  • Security Systems The Service may not be compatible with security systems. You may be required to maintain a telephone connection through your local exchange carrier in order to use any alarm monitoring functions for any security system installed in your home or business. You are responsible for contacting the alarm monitoring company to test the compatibility of any alarm monitoring or security system with the Service.

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Security Services In performing the Services, the Agent shall properly comply at all times with, and perform all of, the Security Procedures.

  • Security Safeguards Contractor shall maintain a comprehensive security program that is reasonably designed to protect the security, privacy, confidentiality, and integrity of District Data. Contractor shall store and process District Data in accordance with industry standards and best practices, including implementing appropriate administrative, physical, and technical safeguards that are no less rigorous than those outlined in CIS Critical Security Controls (CIS Controls), as amended, to secure such data from unauthorized access, disclosure, alteration, and use. Contractor shall ensure that all such safeguards, including the manner in which District Data is collected, accessed, used, stored, processed, disposed of and disclosed, comply with all applicable federal and state data protection and privacy laws, regulations and directives, including without limitation the Act, as well as the terms and conditions of this Addendum. Without limiting the foregoing, and unless expressly agreed to the contrary in writing, Contractor warrants that all electronic District Data will be encrypted in transmission and at rest in accordance with NIST Special Publication 800-57, as amended, or such other standard as the District’s Chief Privacy Officer or designee may agree to in writing. Contractor shall also encrypt any backup, backup media, removable media, tape, or other copies. In addition, Contractor shall fully encrypt disks and storage for all laptops and mobile devices.

  • Security Service Tenant acknowledges and agrees that, while Landlord may patrol the Project, Landlord is not providing any security services with respect to the Premises and that Landlord shall not be liable to Tenant for, and Tenant waives any claim against Landlord with respect to, any loss by theft or any other damage suffered or incurred by Tenant in connection with any unauthorized entry into the Premises or any other breach of security with respect to the Premises.

  • Security Cameras Security cameras have been installed throughout the Facility; however, they will not routinely be used in areas where there is an expectation of privacy, such as restrooms or patient care areas.

  • Security Management The Contractor shall comply with the requirements of the DOD 5200.1-M and the DD Form 254. Security of the Contractor’s electronic media shall be in accordance with the above documents. Effective Program Security shall require the Contractor to address Information Security and Operations Security enabled by the Security Classification Guides. The Contractor’s facility must be able to handle and store material up to the Classification Level as referenced in Attachment J-01, DD Form 254.

  • Cybersecurity (i)(x) There has been no security breach or other compromise of or relating to any of the Company’s or any Subsidiary’s information technology and computer systems, networks, hardware, software, data (including the data of its respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of it), equipment or technology (collectively, “IT Systems and Data”) and (y) the Company and the Subsidiaries have not been notified of, and has no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to its IT Systems and Data; (ii) the Company and the Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification, except as would not, individually or in the aggregate, have a Material Adverse Effect; (iii) the Company and the Subsidiaries have implemented and maintained commercially reasonable safeguards to maintain and protect its material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and Data; and (iv) the Company and the Subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practices.

  • Network Security The AWS Network will be electronically accessible to employees, contractors and any other person as necessary to provide the Services. AWS will maintain access controls and policies to manage what access is allowed to the AWS Network from each network connection and user, including the use of firewalls or functionally equivalent technology and authentication controls. AWS will maintain corrective action and incident response plans to respond to potential security threats.

  • Cybersecurity Training A. Contractor represents and warrants that it will comply with the requirements of Section 2054.5192 of the Texas Government Code relating to cybersecurity training and required verification of completion of the training program. B. Contractor represents and warrants that if Contractor or Subcontractors, officers, or employees of Contractor have access to any state computer system or database, the Contractor, Subcontractors, officers, and employees of Contractor shall complete cybersecurity training pursuant to and in accordance with Government Code, Section 2054.5192.