Security Weaknesses Sample Clauses

Security Weaknesses. Hackers or other malicious groups or organizations may attempt to interfere with ILK Token and/or the INLOCK Platform in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus-based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, there is a risk that a third party or a member of any Group Entity may intentionally or unintentionally introduce weaknesses into the core infrastructure of ILK Token and/or the INLOCK Lending Platform, which could negatively affect ILK Token and/or the INLOCK Lending Platform.
AutoNDA by SimpleDocs
Security Weaknesses 

Related to Security Weaknesses

  • Weaknesses By far the biggest weakness in Dundee is the high concentration of deprivation. Of the 179 datazones in the city 53(30%) including 28.9% of the population are in the 15% most deprived according to the Scottish Index of Multiple Deprivation. The effect of this level of inequality is that Dundee has outcomes in relation to learning, health and employability which are significantly lower than the Scottish average.

  • Deficiencies Without limiting or waiving any other remedies available to City, City’s remedies shall include the following in connection with deficiencies in Tenant’s operations:

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Correction of Deficiencies The contractor must correct promptly any work of his/her own or his/her subcontractors found to be defective or not complying with the terms of the contract.

  • Security Controls Annually, upon Fund’s reasonable request, Transfer Agent shall provide Fund’s Chief Information Security Officer or his or her designee with a copy of its corporate information security controls that form the basis for Transfer Agent’s Security Policy and an opportunity to discuss Transfer Agent’s information security measures, and a high level summary of any vulnerability testing conducted by Transfer Agent on its information security controls, with a qualified member of Transfer Agent’s information technology management team. Transfer Agent shall review its Security Policy annually.

  • Internal Controls The Company shall maintain a system of internal accounting controls sufficient to provide reasonable assurances that: (i) transactions are executed in accordance with management’s general or specific authorization; (ii) transactions are recorded as necessary in order to permit preparation of financial statements in accordance with GAAP and to maintain accountability for assets; (iii) access to assets is permitted only in accordance with management’s general or specific authorization; and (iv) the recorded accountability for assets is compared with existing assets at reasonable intervals and appropriate action is taken with respect to any differences.

  • MATERIAL SAFETY DATA SHEETS Contractor is required to ensure Material Safety Data Sheets (“MSDS”) are available, employees are trained in the use of MSDS, and MSDS are in a readily accessible place at the Site. This requirement applies to all materials with an associated MSDS per the federal “Hazard Communication” standard or employees’ Right-to-Know laws. Contractor is also required to ensure proper labeling and training on any substance brought onto the Site and that any person working with the material (or who is subject to possible exposure by use of the material or contact with the material), is informed of the possible and/or real hazards of the substance, and follows proper handling and protection procedures.

  • Access Controls a. Authorized Access - DST shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data.

  • Internal Control Effective control and accountability must be maintained for all cash, real and personal property, and other assets. Grantee must adequately safeguard all such property and must provide assurance that it is used solely for authorized purposes. Grantee must also have systems in place that provide reasonable assurance that the information is accurate, allowable, and compliant with the terms and conditions of this Agreement. 2 CFR 200.303.

  • Material Safety Data Sheet Seller shall provide to Buyer with each delivery any Material Safety Data Sheet applicable to the work in conformance with and containing such information as required by the Occupational Safety and Health Act of 1970 and regulations promulgated thereunder or its State approved counterpart.

Time is Money Join Law Insider Premium to draft better contracts faster.