Security Solution Sample Clauses

Security Solution. All Included Programs distributed by Licensee must be protected by the Security Solution.
AutoNDA by SimpleDocs
Security Solution. All transmissions of the Licensed Programs shall be encrypted and protected with applicable Security Solution, and each Permitted Device shall employ the applicable Security Solution to protect the Licensed Programs from unauthorized access, use and distribution and to meet the requirements herein, including the Usage Rules. Each security upgrade for each Security Solution that is reasonably necessary to maintain security shall be implemented within a commercially reasonable period of time after such upgrade first becomes commercially available.
Security Solution. In accordance with the Netbank Agreement, the Customer is given a password that will give the Customer access to enter into this Agreement regarding Information Services via the Internet, etc, as soon as the Bank has made the service available to the Customer. The regulations regarding security solutions stipulated in the Netbank Agreement otherwise apply.
Security Solution. <Name of the solution>
Security Solution. (a) For the purpose of protecting the Licensed Programs from unauthorized access, use and distribution, all Licensed Programs must be encrypted and protected with a Security Solution prior to transmission to end users. Such encryption must be on a file level basis with AES 128 (or more robust) encryption and each instance of the Licensed Programs shall be encrypted with a unique encrypted cryptographic key. All Security Solution licenses, keys, certificates and similar security assets must be encrypted. Each instance of the Authorized App/Player shall contain a Security Solution client (or client- side Security Solution component). In each instance, the Security Solution shall be implemented in accordance with industry-standard security practices with the “View Only”, “Copy Never”, “Copy Count = 0”, “No Copies”, “No Transfer” and equivalent settings used for all Licensed Programs wherever the Security Solution supports these settings. Security Solution updates/upgrades that are reasonably necessary to maintain security shall be implemented promptly within a reasonable time after their release. Updates/upgrades to the Authorized App/Player shall be implemented promptly upon such updates/upgrades becoming available if they address a known security issue, and access to the Licensed Service(s) via Internet Streaming Delivery on the applicable Authorized Internet Devices shall be suspended until the user upgrades to the latest authorized version of the Authorized App/Player which addresses that known security issue. Notwithstanding the foregoing, in the case of Licensee’s transmission to HbbTV televisions where Licensee uses a version of HbbTV that does not support encryption (i.e., a version prior to HbbTV 2.0.1), such transmission is not required to comply with the encryption and output requirements herein.
Security Solution. Apple shall use the Security Solution on all eContent. [***]. At any time after either Party becomes aware of a Security Breach, Audible shall have the right to require Apple to immediately remove any or all eContent from distribution, including distribution via ITMS. If the Security Breach is not cured during the Cure Period, then, upon Audible’s request, Apple shall suspend distributing eContent until such time as the Security Breach is actually cured, [***].
Security Solution. Nordea uses different security solutions or a combination of security solutions for the logging on to Secured services. For example, the security solution may be electronic certificates, security cards, applications on mobile units, units as such or only passwords, codes and biometric characteristics. The security solutions are personal and must not be transferred or given to or be used by other persons than the customer. For some security solutions passwords or codes are used. In such cases the Customer may create his own password or receive passwords and codes from the Bank. Passwords, personal codes and other security procedures must not be revealed to anyone, not even to the Police, the Bank nor members of the household. Passwords must not be written down as this may enable misuse by others.
AutoNDA by SimpleDocs
Security Solution. The Customer will receive a password to be used when logging on to the Secured services. The password is personal and must under no circumstances be used by a third party. The Customer shall be aware that a third party who has knowledge of the Customer’s password may log on to and use the Secured services on which the Customer has entered into an agreement. If the Customer is a company or the like, the Customer is responsible for appointing a private individual/contact person in the company who will receive passwords, etc, at any time. The person stated as contact in the separate registration form, has been given sufficient authorisation to retrieve and receive the necessary documents, password etc. If the Customer is a private individual, the Customer will receive BankID and must enter into an agreement for PersonBankID. BankID together with a password and a security code are used to log on to the Netbank. The Bank sends the Customer a security card with security codes and a start code for the security card. The Customer may also use a BankID issued by another bank. The liability provisions of Nordea's terms of agreement for PersonBankID, if relevant, apply to the Customer and Nordea.

Related to Security Solution

  • Cybersecurity (i)(x) There has been no security breach or other compromise of or relating to any of the Company’s or any Subsidiary’s information technology and computer systems, networks, hardware, software, data (including the data of its respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of it), equipment or technology (collectively, “IT Systems and Data”) and (y) the Company and the Subsidiaries have not been notified of, and has no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to its IT Systems and Data; (ii) the Company and the Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification, except as would not, individually or in the aggregate, have a Material Adverse Effect; (iii) the Company and the Subsidiaries have implemented and maintained commercially reasonable safeguards to maintain and protect its material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and Data; and (iv) the Company and the Subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practices.

  • Network Security The AWS Network will be electronically accessible to employees, contractors and any other person as necessary to provide the Services. AWS will maintain access controls and policies to manage what access is allowed to the AWS Network from each network connection and user, including the use of firewalls or functionally equivalent technology and authentication controls. AWS will maintain corrective action and incident response plans to respond to potential security threats.

  • Cybersecurity Training A. Contractor represents and warrants that it will comply with the requirements of Section 2054.5192 of the Texas Government Code relating to cybersecurity training and required verification of completion of the training program. B. Contractor represents and warrants that if Contractor or Subcontractors, officers, or employees of Contractor have access to any state computer system or database, the Contractor, Subcontractors, officers, and employees of Contractor shall complete cybersecurity training pursuant to and in accordance with Government Code, Section 2054.5192.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!