SECURITY VALIDATION Sample Clauses

SECURITY VALIDATION. Validate complete WiMAX end-2-end IP assignment flow [***]
AutoNDA by SimpleDocs
SECURITY VALIDATION. 25 8. [*]..................................................................... 25 8.1 [*]................................................................. 26 ---------- * CONFIDENTIAL TREATMENT REQUESTED. CONFIDENTIAL PORTION HAS BEEN FILED WITH THE SECURITIES AND EXCHANGE COMMISSION.
SECURITY VALIDATION. Throughout the term hereof, InterTrust and NatWest ------------------- will reasonably cooperate and work together to maintain, enhance and promote the robustness of the security aspects of InterTrust Technology and NatWest Products and associated services, as reasonably determined by InterTrust and/or NatWest with respect to its technology, products or services, as applicable, and taking into account and balancing relevant interests such as commercial feasibility and desirability, the varying nature of applications and implementations of NatWest Products, regulatory and governmental restrictions, and overall commercial use of InterTrust Technology by NatWest. InterTrust agrees to use commercially reasonable, practical and affordable efforts with respect to InterTrust Technology, and NatWest agrees to use commercially reasonable, practical and affordable efforts with respect to NatWest Products, to establish and perform or have performed, security testing procedures and practices, including use of appropriate, circumscribed, third party "tiger testing." The Parties will further discuss and work together to consider, where (and as) practical, affordable and appropriate, obtaining validation and/or certification for appropriate portions of the respective Party's security related technologies and/or services from one or more relevant and appropriate third parties or organizations. Each Party agrees to share with the other relevant aspects of test results for, and/or identified security breaches of, InterTrust Technology and NatWest Products where practical, subject to confidentiality obligations, requirements of law, and appropriate security practices.

Related to SECURITY VALIDATION

  • Validation To validate the notice requirements outlined in Section 5.3, the Assuming Institution shall provide the Receiver (i) an Affidavit of Publication to meet the publication requirements outlined in Section 5.3(a) and (ii) the Assuming Institution will prepare an Affidavit of Mailing in a form substantially similar to Exhibit 2.3B after mailing the seven (7) day Notice to Depositors as required under Section 5.3(b).

  • MAINTENANCE OF STANDARDS The Employer agrees, subject to the following provisions, that all conditions of employment in his/her individual operation relating to wages, hours of work, overtime differentials and general working conditions shall be maintained at not less than the highest standards in effect at the time of the signing of this Agreement, and the conditions of employment shall be improved whenever specific provisions for improvement are made elsewhere in this Agreement.

  • Registry Interoperability and Continuity Registry Operator shall comply with the Registry Interoperability and Continuity Specifications as set forth in Specification 6 attached hereto (“Specification 6”).

  • Security Safeguards Contractor shall store and process District Data in accordance with commercial best practices, including implementing appropriate administrative, physical, and technical safeguards that are no less rigorous than those outlined in SANS Top 20 Security Controls, as amended, to secure such data from unauthorized access, disclosure, alteration, and use. Contractor shall ensure that all such safeguards, including the manner in which District Data is collected, accessed, used, stored, processed, disposed of and disclosed, comply with all applicable federal and state data protection and privacy laws, regulations and directives, including without limitation C.R.S. § 00-00-000 et seq., as well as the terms and conditions of this Addendum. Without limiting the foregoing, and unless expressly agreed to the contrary in writing, Contractor warrants that all electronic District Data will be encrypted in transmission and at rest in accordance with NIST Special Publication 800-57, as amended.

  • Security of processing (a) The data importer and, during transmission, also the data exporter shall implement appropriate technical and organisational measures to ensure the security of the data, including protection against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to that data (hereinafter ‘personal data breach’). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purpose(s) of processing and the risks involved in the processing for the data subjects. The Parties shall in particular consider having recourse to encryption or pseudonymisation, including during transmission, where the purpose of processing can be fulfilled in that manner. In case of pseudonymisation, the additional information for attributing the personal data to a specific data subject shall, where possible, remain under the exclusive control of the data exporter. In complying with its obligations under this paragraph, the data importer shall at least implement the technical and organisational measures specified in Annex II. The data importer shall carry out regular checks to ensure that these measures continue to provide an appropriate level of security. (b) The data importer shall grant access to the personal data to members of its personnel only to the extent strictly necessary for the implementation, management and monitoring of the contract. It shall ensure that persons authorised to process the personal data have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality. (c) In the event of a personal data breach concerning personal data processed by the data importer under these Clauses, the data importer shall take appropriate measures to address the breach, including measures to mitigate its adverse effects. The data importer shall also notify the data exporter without undue delay after having become aware of the breach. Such notification shall contain the details of a contact point where more information can be obtained, a description of the nature of the breach (including, where possible, categories and approximate number of data subjects and personal data records concerned), its likely consequences and the measures taken or proposed to address the breach including, where appropriate, measures to mitigate its possible adverse effects. Where, and in so far as, it is not possible to provide all information at the same time, the initial notification shall contain the information then available and further information shall, as it becomes available, subsequently be provided without undue delay. (d) The data importer shall cooperate with and assist the data exporter to enable the data exporter to comply with its obligations under Regulation (EU) 2016/679, in particular to notify the competent supervisory authority and the affected data subjects, taking into account the nature of processing and the information available to the data importer.

  • Contractor Security Clearance Customers may designate certain duties and/or positions as positions of “special trust” because they involve special trust responsibilities, are located in sensitive locations, or have key capabilities with access to sensitive or confidential information. The designation of a special trust position or duties is at the sole discretion of the Customer. Contractor or Contractor’s employees and Staff who, in the performance of this Contract, will be assigned to work in positions determined by the Customer to be positions of special trust, may be required to submit to background screening and be approved by the Customer to work on this Contract.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Traceability 11.1 Under the terms of this Agreement, Supplier shall have and operate a process to ensure that all Products, sub-assemblies and the components contained therein supplied to the Buyer are completely Traceable back to manufacturer by batch or lot or date code. 11.2 Further Supplier hereby agrees, unless directed otherwise by the Buyer, to procure components through franchised distributors or direct component Suppliers. Supplier agrees to indemnify and hold the Buyer harmless from and against all costs and expenses for the removal, repair or replacement and reinstallation of counterfeit components incorporated into a Product sold by Supplier to the Buyer where the counterfeit component was procured by Supplier from a person or entity other than a franchised distributor or direct component Supplier or other person or entity pre-approved by the Buyer in writing.

  • Maintenance of Status The Borrower will maintain its separate corporate existence and remain in good standing under the laws of the Xxxxxxxx Islands.

  • Security Assessment If Accenture reasonably determines, or in good faith believes, that Supplier’s security practices or procedures do not meet Supplier’s obligations under the Agreement, then Accenture will notify Supplier of the deficiencies. Supplier will without unreasonable delay: (i) correct such deficiencies at its own expense; (ii) permit Accenture, or its duly authorized representatives, to assess Supplier’s security-related activities that are relevant to the Agreement; and (iii) timely complete a security questionnaire from Accenture on a periodic basis upon Accenture’s request. Security issues identified by Accenture will be assigned risk ratings and an agreed-to timeframe to remediate. Supplier will remediate all the security issues identified within the agreed to timeframes. Upon Supplier’s failure to remediate any high or medium rated security issues within the stated timeframes, Accenture may terminate the Agreement in accordance with Section 8 above.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!