Security Solution Sample Clauses

Security Solution. All Included Programs distributed by Licensee must be protected by the Security Solution.
AutoNDA by SimpleDocs
Security Solution. In accordance with the Netbank Agreement, the Customer is given a password that will give the Customer access to enter into this Agreement regarding Information Services via the Internet, etc, as soon as the Bank has made the service available to the Customer. The regulations regarding security solutions stipulated in the Netbank Agreement otherwise apply.
Security Solution. All transmissions of the Licensed Programs shall be encrypted and protected with applicable Security Solution, and each Permitted Device shall employ the applicable Security Solution to protect the Licensed Programs from unauthorized access, use and distribution and to meet the requirements herein, including the Usage Rules. Each security upgrade for each Security Solution that is reasonably necessary to maintain security shall be implemented within a commercially reasonable period of time after such upgrade first becomes commercially available.
Security Solution. <Name of the solution> Successful completion of the abovementioned Testing at this date indicates that the abovementioned Security Solution (whose configuration is identified in the appendix below) complies with the current PCI Standard and that you have completed all applicable ASV requirements as of the date of this letter. Even though you have been approved as an ASV and the abovementioned Security Solution has successfully completed PCICo Testing and is deemed to be compliant with the PCI Standard at this date, all rights and remedies resulting from your presenting yourself as an ASV or your sale, licensing, distribution or use of the abovementioned Security Solution shall be provided by your organization and not by PCICo. Subject to your compliance with the terms and conditions of the Agreement, you are entitled to advertise your status as a "PCICo-Approved Scanning Vendor" and that the abovementioned Security Solution has "successfully completed PCICo ASV Compliance Testing" and/or that such Security Solution is "ASV Program compliant". If you wish to provide for any other statements or announcements public or not, whether in writing or not, you must request PCICo's prior written approval. The terms and conditions of the Agreement apply mutatis mutandis to this Compliance Notification. Your ASV compliant status, and that of the abovementioned Security Solution, is effective upon dispatch of this Compliance Notification and shall remain valid as provided in the Agreement. Because ASV compliant status is subject to various limitations, including certain events of termination, you and any third parties should confirm that such compliance status is current and has not been terminated by referring to the list of ASVs published on the PCICo web site at xxxx://xxx.xxxxxxxxxxxxxxxxxxxx.xxx. Thank you for your support of the PCI Approved Scanning Vendor Compliance Test Program. Yours Sincerely,
Security Solution. The Customer will receive a password to be used when logging on to the Secured services. The password is personal and must under no circumstances be used by a third party. The Customer shall be aware that a third party who has knowledge of the Customer’s password may log on to and use the Secured services on which the Customer has entered into an agreement. If the Customer is a company or the like, the Customer is responsible for appointing a private individual/contact person in the company who will receive passwords, etc, at any time. The person stated as contact in the separate registration form, has been given sufficient authorisation to retrieve and receive the necessary documents, password etc. If the Customer is a private individual, the Customer will receive BankID and must enter into an agreement for PersonBankID. BankID together with a password and a security code are used to log on to the Netbank. The Bank sends the Customer a security card with security codes and a start code for the security card. The Customer may also use a BankID issued by another bank. The liability provisions of Nordea's terms of agreement for PersonBankID, if relevant, apply to the Customer and Nordea.
Security Solution. (a) For the purpose of protecting the Licensed Programs from unauthorized access, use and distribution, all Licensed Programs must be encrypted and protected with a Security Solution prior to transmission to end users. Such encryption must be on a file level basis with AES 128 (or more robust) encryption and each instance of the Licensed Programs shall be encrypted with a unique encrypted cryptographic key. All Security Solution licenses, keys, certificates and similar security assets must be encrypted. Each instance of the Authorized App/Player shall contain a Security Solution client (or client- side Security Solution component). In each instance, the Security Solution shall be implemented in accordance with industry-standard security practices with the “View Only”, “Copy Never”, “Copy Count = 0”, “No Copies”, “No Transfer” and equivalent settings used for all Licensed Programs wherever the Security Solution supports these settings. Security Solution updates/upgrades that are reasonably necessary to maintain security shall be implemented promptly within a reasonable time after their release. Updates/upgrades to the Authorized App/Player shall be implemented promptly upon such updates/upgrades becoming available if they address a known security issue, and access to the Licensed Service(s) via Internet Streaming Delivery on the applicable Authorized Internet Devices shall be suspended until the user upgrades to the latest authorized version of the Authorized App/Player which addresses that known security issue. Notwithstanding the foregoing, in the case of Licensee’s transmission to HbbTV televisions where Licensee uses a version of HbbTV that does not support encryption (i.e., a version prior to HbbTV 2.0.1), such transmission is not required to comply with the encryption and output requirements herein.
Security Solution. Apple shall use the Security Solution on all eContent. [***]. At any time after either Party becomes aware of a Security Breach, Audible shall have the right to require Apple to immediately remove any or all eContent from distribution, including distribution via ITMS. If the Security Breach is not cured during the Cure Period, then, upon Audible’s request, Apple shall suspend distributing eContent until such time as the Security Breach is actually cured, [***].
AutoNDA by SimpleDocs
Security Solution. Nordea uses different security solutions or a combination of security solutions for the logging on to Secured services. For example, the security solution may be electronic certificates, security cards, applications on mobile units, units as such or only passwords, codes and biometric characteristics. The security solutions are personal and must not be transferred or given to or be used by other persons than the customer. For some security solutions passwords or codes are used. In such cases the Customer may create his own password or receive passwords and codes from the Bank. Passwords, personal codes and other security procedures must not be revealed to anyone, not even to the Police, the Bank nor members of the household. Passwords must not be written down as this may enable misuse by others.

Related to Security Solution

  • Cybersecurity (i)(x) There has been no security breach or other compromise of or relating to any of the Company’s or any Subsidiary’s information technology and computer systems, networks, hardware, software, data (including the data of its respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of it), equipment or technology (collectively, “IT Systems and Data”) and (y) the Company and the Subsidiaries have not been notified of, and has no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to its IT Systems and Data; (ii) the Company and the Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification, except as would not, individually or in the aggregate, have a Material Adverse Effect; (iii) the Company and the Subsidiaries have implemented and maintained commercially reasonable safeguards to maintain and protect its material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and Data; and (iv) the Company and the Subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practices.

  • Security Controls Annually, upon Fund’s reasonable request, DST shall provide Fund’s Chief Information Security Officer or his or her designee with a summary of its corporate information security policy and an opportunity to discuss DST’s information security measures, and a high level and non-confidential summary of any penetration testing related to the provision of in-scope services . DST shall review its Security Policy annually.

Time is Money Join Law Insider Premium to draft better contracts faster.