System and Software Protection Sample Clauses

System and Software Protection. All system and applications must utilize secure authentication and authorization mechanisms
AutoNDA by SimpleDocs
System and Software Protection. 3. 系统与软件防护。
System and Software Protection. 1. Utilize secure authentication and authorization mechanisms for all systems and applications. 2. Use secure coding standards and design principals (e.g., OWASP) for developed applications. 3. Xxxxxx operating systems appropriately according to industry best practices (e.g. NIST 800 series, NSA guidelines, CIS benchmark, etc.).

Related to System and Software Protection

  • Software Use Case Red Hat Enterprise Virtualization Supported on physical hardware solely to support virtual quests. Red Hat Enterprise Virtualization is designed to run and manage virtual instances and does not support user-space applications. Red Hat Enterprise Virtualization may be used as a virtual desktop infrastructure solution, however, the Subscription does not come with any software or support for the desktop operating system. You must purchase the operating system for each instance of a desktop or server separately.

  • Interoperability To the extent required by applicable law, Cisco shall provide You with the interface information needed to achieve interoperability between the Software and another independently created program. Cisco will provide this interface information at Your written request after you pay Cisco’s licensing fees (if any). You will keep this information in strict confidence and strictly follow any applicable terms and conditions upon which Cisco makes such information available.

  • Equipment and Software Requirements In order to view and retain electronic communications that we make available to you, you must have: • A PC or other device with an Internet browser that has “cookies” enabled and supports 128 bit encryption • An Internet connection • An email address • A PDF viewer (such as Adobe Reader) • A printer or computer with sufficient electronic storage space All communications shall be delivered to the last address we have on file for you. These notices will be sent through electronic delivery (email) and will be considered delivered the same day as sent. If you have opted out of electronic delivery, communications sent to you through the United States Postal Service are considered delivered 5 business days after the postmark date. It is your responsibility to notify the Custodian of any email address change or residential address change. We will not be held liable for any losses or damages if you have not provided Custodian with the most current address information. The electronically signed copy of this document should be considered equivalent to a printed hard copy form. It is considered a true and complete record of the document, admissible in arbitration and/or administrative hearings or proceedings. Your electronic signature on the Application and other electronic forms such as the Investment Direction are considered valid and the same as if the paper form or Application were signed.

  • Equipment and Software To use the Mobile Remote Deposit Services, you must obtain and maintain at your expense, compatible equipment and software that we may specify from time to time.

  • Internet Connectivity School must provide sufficient hardline internet connectivity and the required network configurations (provided in Exhibit A) for each Pixellot System to allow live broadcasts. PlayOn will provide the point-to-point wireless internet base station (“Point to Point”) when needed to deliver hardline internet connectivity to Pixellot Systems installed in outdoor venues; provided that PlayOn is able to select the make and model of the Point to Point system. In the event that School requests, or requires, a specific Point to Point system that is different from what is provided by PlayOn, then School must provide and install the Point to Point system at its own expense.

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

  • Hardware and Software Requirements In order to access and retain Disclosures electronically, you must satisfy the following computer hardware and software requirements: access to the Internet; an email account and related software capable of receiving email through the Internet; a web browser which is SSL-compliant and supports secure sessions, and hardware capable of running this software.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!