Technology Security Clause Samples

The Technology Security clause establishes requirements and standards for protecting information systems and data from unauthorized access, breaches, or other security threats. It typically outlines the security measures that must be implemented, such as encryption, access controls, regular security assessments, and incident response protocols. By setting clear expectations for safeguarding technology assets, this clause helps prevent data breaches and ensures compliance with relevant security regulations, thereby reducing the risk of financial and reputational harm.
Technology Security. The Company shall cause SB Oils to appoint a technology officer (recommended by Solazyme, Inc.) at SB Oils who shall, in consultation with Solazyme, Inc. and Bunge Brazil (subject to the consent of Bunge Brazil and Solazyme, Inc.), determine, establish, implement and audit appropriate security procedures regarding Technology used or developed by the JV Companies, including (i) rules regarding visitation to SB Oils’ facilities, (ii) confidentiality documentation requirements and (iii) Technology access procedures and policies, including regarding the transfer of Microbes used or developed by or on behalf of the JV Companies.
Technology Security. MinnState shall be solely responsible for all MinnState Systems, and CONTRACTOR shall be responsible for all non-MinnState Systems, including taking the necessary security and privacy protections as are reasonable under the circumstances. Reasonable security and privacy protections shall include, but not be limited to, network firewall protection, anti-virus software and the ability to maintain regular patching levels of software. Each party shall use commercially reasonable procedures to check for commonly known viruses and to check the integrity of data before sending information electronically to the other party, but each party recognizes that such procedures cannot be a guarantee that transmissions will be virus free. Each party agrees that the receiving party shall be responsible for carrying out virus checks on any attachments before opening any electronic files whether received on disk or otherwise.
Technology Security a. You are responsible for the security of your password, and should take all reasonable precautions to prevent others from being able to use your password. Under no circumstances should you give your password to another person. b. You will immediately notify a teacher or the system administrator if you have identified a possible security problem. Do not look for security problems; this may be construed as an illegal attempt to gain access. c. You will avoid the inadvertent spread of computer viruses and spyware caused by downloading files. d. Personal software may not be installed or used at the school site.
Technology Security a. IETF-standard Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols are used to protect all communication between endpoints. To provide maximum protection against eavesdropping, modification, or replay attacks, the only SSL cipher suite supported for non-Web-site TCP connections is 1024-bit RSA with 128-bit AES-CBC and HMAC-SHA1 b. End-to-end 128 bit encryption that protects both ends of the connection c. Multi-layer cryptography, server, certificate, and user authentication prevent unauthorized access
Technology Security. The District will comply fully with all County information technology security policies, which are detailed in Countywide Policies 1400-1, 1400-2, 1400-3, 1400-4, 1400-5, 1400-6, 1400-7, and 1400-8, and any other information technology policies that may be adopted during the term of this Agreement. If County policies conflict with District policies, the Parties shall meet and confer pursuant to section 23, and if the conflict cannot be resolved, then either Party may terminate the Agreement in accordance with section 8. The District shall hold the County harmless from any loss or damage resulting from the violation of such security procedures or policies by the District, its officers, agents, employees, and subcontractors.

Related to Technology Security

  • Technology Discoveries, innovations, Know-How and inventions, whether patentable or not, including computer software, recognized under U.S. law as intellectual creations to which rights of ownership accrue, including, but not limited to, patents, trade secrets, maskworks and copyrights developed under this Agreement.

  • Security Technology When the service is accessed using a supported web browser, Secure Socket Layer (“SSL”), or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall include server authentication and data encryption. Provider shall host data pursuant to the DPA in an environment using a firewall that is periodically updated according to industry standards.

  • Technology License 4.1 Unless any event described in Article 2.2 or 2.3 of this Agreement occurs, all of the technology required to be licensed for any of Party B’s business shall be provided by Party A on an exclusive basis. Party A will try its best to license Party B to use the technology owned by Party A, or re-license Party B to use the technology as approved by the owner. 4.2 The Parties shall negotiate with each other to enter into specific technology license contracts to expressly specify the detail matters such as the technology to be licensed, the method to license the technology, license fees and payment.

  • Intellectual Property Security Agreements Duly executed originals of Trademark Security Agreements, Copyright Security Agreements and Patent Security Agreements, each dated the Closing Date and signed by each Credit Party which owns Trademarks, Copyrights and/or Patents, as applicable, all in form and substance reasonably satisfactory to Agent, together with all instruments, documents and agreements executed pursuant thereto.

  • Technology Upgrades Notwithstanding any other provision of this Agreement, Verizon shall have the right to deploy, upgrade, migrate and maintain its network at its discretion. The Parties acknowledge that Verizon, at its election, may deploy fiber throughout its network and that such fiber deployment may inhibit or facilitate Covista’s ability to provide service using certain technologies. Nothing in this Agreement shall limit Verizon's ability to modify its network through the incorporation of new equipment or software or otherwise. Covista shall be solely responsible for the cost and activities associated with accommodating such changes in its own network.