Security Violations Sample Clauses

Security Violations. 4.01 The CGA must report security violations to the CJIS Systems Officer (CSO) and the Director, FBI, along with indications of actions taken by the CGA and Contractor. 4.02 Security violations can justify termination of the appended agreement. 4.03 Upon notification, the FBI reserves the right to: a. Investigate or decline to investigate any report of unauthorized use; b. Suspend or terminate access and services, including telecommunications links. The FBI will provide the CSO with timely written notice of the suspension. Access and services will be reinstated only after satisfactory assurances have been provided to the FBI by the CGA and Contractor. Upon termination, the Contractor's records containing CHRI must be deleted or returned to the CGA.
AutoNDA by SimpleDocs
Security Violations. Use of the Product to violate the security or integrity of any network, computer or communications system, software application or network or computing device.
Security Violations. BellSouth reserves the right to interview Neutral Tandem’s employees, agents, suppliers, or Guests in the event of wrongdoing in or around a BellSouth Premises or involving BellSouth’s or another collocated telecommunications carrier’s property or personnel, provided that BellSouth shall provide reasonable notice to Neutral Tandem’s Security representative of such interview. Neutral Tandem and its employees, agents, suppliers, or Guests shall reasonably cooperate with BellSouth’s investigation into allegations of wrongdoing or criminal conduct committed by, witnessed by, or involving Neutral Tandem’s employees, agents, suppliers, or Guests. Additionally, BellSouth reserves the right to xxxx Neutral Tandem for all reasonable costs associated with investigations involving its employees, agents, suppliers, or Guests if it is established and mutually agreed in good faith that Neutral Tandem’s employees, agents, suppliers, or Guests are responsible for the alleged act(s). BellSouth shall xxxx Neutral Tandem for BellSouth property, which is stolen or damaged, where an investigation determines the culpability of Neutral Tandem’s employees, agents, suppliers, or Guests and where Neutral Tandem agrees, in good faith, with the results of such investigation. Neutral Tandem shall notify BellSouth in writing immediately in the event that Neutral Tandem discovers one of its employees, agents, suppliers, or Guests already working on the BellSouth Premises is a possible security risk. Upon request of the other Party, the Party who is the employer shall discipline consistent with its employment practices, up to and including removal from BellSouth’s Premises, any employee found to have violated the security and safety requirements of this Section. Neutral Tandem shall hold BellSouth harmless for any damages resulting from such removal of Neutral Tandem’s personnel from a BellSouth Premises.
Security Violations. You are responsible for ensuring and maintaining security of your systems and the machines that connect to and use Service(s), including implementation of necessary patches and operating system updates. The Services may not be used to interfere with, gain unauthorized access to, or otherwise violate the security of any server, network, network access, personal computer or control devices, software or data, or other system, or to attempt to do any of the foregoing.
Security Violations. You are prohibited from engaging in any violations of system or network security. Our internet service may not be used in connection with attempts - whether or not successful - to violate the security of a network, service, or other system. Examples of prohibited activities include, without limitation, hacking, cracking into, monitoring, or using systems without authorization; scanning ports; conducting denial of service attacks; and distributing viruses or other harmful software. We reserve the right to suspend the Internet access upon notification from a recognized Internet authority or ISP regarding such abuse. We may disconnect Your equipment and withhold services if We consider Your hardware or software is, or has become, inappropriate for connection to Our network. You are responsible for Your own virus or malware protection on Your systems and hardware.
Security Violations. You may not use Services Offerings to violate the security or integrity of any network, computer, communications system, software application, network or computing device (each, a “System”).
Security Violations. You may not use the Platform to violate the security or integrity of any network, computer or communications system, software application, or network or computing device (each, a “System”). Prohibited activities include:
AutoNDA by SimpleDocs
Security Violations. 2.1 The Buyer and its End Users shall not access and/or use, or encourage, promote, facilitate or instruct others to access and/or use the Service Elements, the Buyer Content or the Buyer Account in a manner that would compromise or harm the security or integrity of any information technology service or system (including any network, computer, device, communication system or software application), including by means of: 2.1.1 unless otherwise agreed, any API other than that made available by the Supplier; 2.1.2 unauthorised access and/or use, including attempting to probe, scan, or test the vulnerability of any information technology service or system or to breach any security or authentication measures used by any information technology service or system; 2.1.3 the monitoring of data or traffic without permission; or 2.1.4 fraud or other forms of misrepresentation.
Security Violations. Except in the case of Contracts involving products installed at the Customer’s premises or at the Customer’s suppliers for which this Section 6.3 does not apply, if the Supplier becomes aware of a Security Violation of Personal Data, it shall: 6.3.1 inform the Customer without undue delay by notice forwarded to the Notifications Email; 6.3.2 take reasonable measures to limit the possible damage and security of Personal Data; 6.3.3 provide the Customer, to the extent possible, with a description of the Personal Data Security Breach, including the measures taken to avoid or mitigate the potential risks and the tasks recommended by the Supplier to the Customer to manage the Security Breach; 6.3.4 consider as confidential information, in accordance with the provisions of the Contract, any information pertaining to any Security Breaches, related documents, releases and notices, and without the prior written consent of the Data Controller, it shall not disclose any information to third parties, outside the cases strictly necessary for the fulfillment of the Customer’s obligations arising from the Personal Data Protection Legislation.
Security Violations. BellSouth reserves the right to interview Teleconex’s employees, agents, or suppliers in the event of wrongdoing in or around BellSouth’s property or involving BellSouth’s or another collocated telecommunications carrier’s property or personnel, provided that BellSouth shall provide reasonable notice to Teleconex’s Security representative of such interview. Teleconex and its suppliers shall reasonably cooperate with BellSouth’s investigation into allegations of wrongdoing or criminal conduct committed by, witnessed by, or involving Teleconex’s employees, agents, or suppliers. Additionally, BellSouth reserves the right to bill Teleconex for all reasonable costs associated with investigations involving its employees, agents, or suppliers if it is established and mutually agreed in good faith that Teleconex’s employees, agents, or suppliers are responsible for the alleged act. BellSouth shall bill Teleconex for BellSouth property, which is stolen or damaged where an investigation determines the culpability of Teleconex’s employees, agents, or suppliers and where Teleconex agrees, in good faith, with the results of such investigation. Teleconex shall notify BellSouth in writing immediately in the event that the Teleconex discovers one of its employees already working on the BellSouth Remote Site Location is a possible security risk. Upon request of the other Party, the Party who is the employer shall discipline consistent with its employment practices, up to and including removal from BellSouth’s Remote Site Location, any employee found to have violated the security and safety requirements of this section. Teleconex shall hold BellSouth harmless for any damages resulting from such removal of its personnel from BellSouth’s Remote Site Location.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!