Security Threats Sample Clauses

Security Threats. QSR reserves the right, in its sole and complete discretion, to suspend Client’s Account and access by Client to the Services without notice if Client's Account is (as determined in the sole discretion of QSR) directly or indirectly involved in creating a security threat, including without limitation a denial of service attack. QSR may reinstate Client’s Account, at QSR’s sole discretion and without any refund of Subscription Fees or other costs, upon resolution of the security threat.
AutoNDA by SimpleDocs
Security Threats. In the event of a terrorist or other security threat, Contractor agrees to follow the procedures set forth below such an event occur in, on or around the Jobsite and Project. In the event of an emergency in, on or around the Jobsite or Project, the Contractor, its employees and all of the Sub-contractors and their respective employees shall communicate with the Owner’s Representative and shall take direction from the Owner’s Representative in addressing any security threat identified, through resolution of the threat. The Contractor shall take all measures needed to secure the Jobsite and Project against any such threats. The Contractor shall assist the Owner’s Representative and any other of Owner’s employees located at the Jobsite or Project, if requested to do so in addressing the security threat. When Contractor or any of its agents or Subcontractors are working in, on or around the Jobsite and/or Project and a potential or actual security threat has been identified, the Contractor and all of its employees, Subcontractors, and all of their respective employees shall follow the guidance of the Owner’s Reprehensive or Owner’s other representatives located in, on or around the Jobsite or Project. The Owner’s employees have been provided with specific policies, procedures and directions designed to address such situations. It is the Contractor’s responsibility to inform its employees, and its Subcontractors of the requirement to contact Owner’s Representative in order to properly address security threats to the Jobsite and Project.
Security Threats. Many of the South Asian states are witnessing conflicts in which ideological, ethnic, communal and political issues are intertwined. In recent years, 75 percent of terrorism related casualties in the world occurred in South Asia. The worst part is that the increasing transnational coordination of the terrorists, insurgents and radical groups has added a critical dimension to the security of nations. These linkages across the border support, encourage, train, arm and often direct terrorists and insurgent groups for their own ends.31 Proxy wars have, consequently, thrown up a number of challenges before the border security agencies. Transgressions along the border were, in the past, often localised in nature and had no major security implications. Now, the pattern of border crimes has changed. The intricate relationship among narcotics smuggling, International Financial Corporation (IFC) rackets, small arms proliferation and terrorist activities now have far-reaching implications for internal security.32 The fanatic religious ideologies help to xxxxxx polarising values in terms of right and wrong, good and evil, which has been coopted by terrorist organisations to convert a “seeker” into a lethal killer. The Islamist militant groups such as Islamic State, Ansarullah Bangladesh, Jama’at-ul Mujahideen Bangladesh (with close links with Afghan jihadis), Harkat-ul- Jehad-al-Islami Bangladesh (with close links with Al-Qaeda) and Hizbut Tohid in Bangladesh have consolidated and expanded their institutional transnational networks.33 Bangladesh’s land has also been used by the Indian northeast insurgent groups like the United Liberation Front of Assam (ULFA), Nationalist Socialist Council of Nagaland (NSCN), and Muslim United Liberation Tigers of Assam (MULTA), that started getting training in Bangladesh since 1992.34
Security Threats. In our scheme, control unit is trusted. Bio-sensors are honest to keep their keys secret. Devices beyond one specific BAN generally cannot sense personal physiolog- ical information. Even if some devices are able to sense physiological features, they can hardly to be adversaries because if they intend to play as adversaries and obtain the negotiated keys, they should be supposed to be physically close to users, which is easy to discover for general medical users. The security threats faced by a BAN are the adversaries that can transmit incorrect health data to access the medical users or eavesdrop physiological information for health data privacy leak- age. We categorize the security threats into active adver- saries and passive eavesdroppers as follows. (1)

Related to Security Threats

  • Bomb Threats In the event of a bomb threat, the worksite shall be evacuated until persons with appropriate expertise deem it to be safe. Employees shall not return to schools or other employment centers which have been evacuated due to bomb threats until clearance for such returns has been given by proper authorities. Employees shall not search for bombs.

  • Threats Using service to transmit any material (by e-mail or otherwise) that illegally threatens or encourages bodily harm or destruction of property.

  • Security Badging Any Company employee, or any employee of its contractors or agents, that require unescorted access to the Security Identification Display Area (SIDA) to perform work under this Agreement will be badged with an Airport identification badge (hereinafter referred to as "Badge") provided by Authority’s ID Badging Department and will be subject to an FBI fingerprint-based criminal history records check (CHRC) and an annual Security Threat Assessment (STA). A new or renewed Badge will not be issued to an individual until the results of the CHRC and the STA are completed and indicate that the applicant has not been convicted of a disqualifying criminal offense. If the CHRC or STA discloses a disqualifying criminal offense, the individual’s new or renewed badge application will be rejected. The costs of the CHRC and the annual STA will be paid by Company. These costs are subject to change without notice, and Company will be responsible for paying any increase in the costs. All badged employees of Company and its contractors or agents will comply with Authority's regulations regarding the use and display of Badges. Company will be assessed a fine for each Badge that is lost, stolen, unaccounted for or not returned to Authority at the time of Badge expiration, employee termination, termination of the Agreement, or upon written request by Authority. This fine will be paid by Company within 15 days from the date of invoice. The fine is subject to change without notice, and Company will be responsible for paying any increase in the fine. If any Company employee is terminated or leaves Company’s employment, Authority must be notified immediately, and the Badge must be returned to Authority promptly.

  • Security Technology When the service is accessed using a supported web browser, Secure Socket Layer (“SSL”), or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall include server authentication and data encryption. Provider shall host data pursuant to the DPA in an environment using a firewall that is periodically updated according to industry standards.

  • Cybersecurity Training A. Contractor represents and warrants that it will comply with the requirements of Section 2054.5192 of the Texas Government Code relating to cybersecurity training and required verification of completion of the training program.

  • Security Safeguards (1) Each party acknowledges that it is solely responsible for determining and communicating to the other the appropriate technological, physical, and organizational security measures required to protect Personal Data.

  • Collateral The Collateral for this Note includes the Funding Agreement and the Guarantee specified on the face hereof.

  • Security Audits Each Contract Year, County may perform or have performed security reviews and testing based on an IT infrastructure review plan. Such testing shall ensure all pertinent County security standards as well as any customer agency requirements, such as federal tax requirements or HIPPA.

  • Security Breaches In order to protect your security, it is your sole responsibility to ensure that all usernames and passwords used to access the Website are kept secure and confidential. You must immediately notify us of any unauthorized use of your account, including the unauthorized use of your password, or any other breach of security. We will investigate any breach of security on the Website that we determine in our sole discretion to be serious in nature, but we will not be held responsible or liable in any manner for breaches of security or any unauthorized access to your account however arising.

  • Hazards The Tenant shall not undertake, or permit his/her family or guests to undertake, any hazardous acts or do anything that will increase the project's insurance premiums. Such action constitutes a material non-compliance. If the unit is damaged by fire, wind, or rain to the extent that the unit cannot be lived in and the damage is not caused or made worse by the Tenant, the Tenant will be responsible for rent only up to the date of the destruction. Additional rent will not accrue until the unit has been repaired to a livable condition.

Time is Money Join Law Insider Premium to draft better contracts faster.