Virtual Security Sample Clauses

Virtual Security. You understand and agree that no security solution is one hundred percent effective, and any security paradigm may be circumvented and/or rendered ineffective by certain malware, such as certain ransomware or rootkits that were unknown to the malware prevention industry at the time of infection, and/or which are downloaded or installed into the Environment. We do not warrant or guarantee that all malware or malicious activity will be capable of being detected, avoided, quarantined or removed, or that any data deleted, corrupted, or encrypted by such malware (“Impacted Data”) will be recoverable. Unless otherwise expressly stated in a Quote, the recovery of Impacted Data is out-of-scope. Moreover, unless expressly stated in a Quote or Services Guide, we will not be responsible for activating multifactor authentication in any application in or connected to the Environment. You are strongly advised to (i) educate your employees to properly identify and react to “phishing” activity (i.e., fraudulent attempts to obtain sensitive information or encourage behavior by disguising oneself as a trustworthy entity or person through email), and (ii) obtain insurance against cyberattacks, data loss, malware-related matters, and privacy-related breaches, as such incidents can occur even under a “best practice” scenario. Unless a malware-related incident is caused by our intentionally malicious behavior or our gross negligence, we are held harmless from any costs, expenses, or damages arising from or related to such incidents.
AutoNDA by SimpleDocs
Virtual Security. You understand and agree that no security solution is one hundred percent effective, and any security paradigm may be circumvented and/or rendered ineffective by certain malware, such as certain ransomware or rootkits that were unknown to the malware prevention industry at the time of infection, and/or which are downloaded or installed into the Environment. We do not warrant or guarantee that any security-related product or solution implemented or facilitated by us will be capable of being detecting, avoiding, quarantining or removing all malicious code, spyware, malware, etc., or that any data deleted, corrupted, or encrypted by any of the foregoing (“Impacted Data”) will be recoverable. Unless otherwise expressly stated in a Quote, the recovery of Impacted Data is out-of-scope. Moreover, unless expressly stated in a Quote or Services Guide, we will not be responsible for activating multifactor authentication in any application in or connected to the Environment. You are strongly advised to (i) educate your employees to properly identify and react to “phishing” activity (i.e., fraudulent attempts to obtain sensitive information or encourage behavior by disguising oneself as a trustworthy entity or person through email), and (ii) obtain insurance against cyberattacks, data loss, malware-related matters, and privacy-related breaches, as such incidents can occur even under a “best practice” scenario. Unless a malware-related incident is caused by our intentionally malicious behavior or our gross negligence, we are held harmless from any costs, expenses, or damages arising from or related to such incidents.
Virtual Security. You understand and agree that no security solution is one hundred percent effective, and any security paradigm may be circumvented and/or rendered ineffective by certain malicious actors, intentional (or unintentional) actions, or malware such as certain ransomware or rootkits that were unknown to the malware prevention industry at the time of infection, and/or which are downloaded or installed into the Environment. We do not warrant or guarantee that any security-related service, product, or solution offered, implemented, or facilitated by us will be capable of detecting, avoiding, quarantining, or removing all malicious code, spyware, malware, etc., or that any data deleted, corrupted, or encrypted by any of the foregoing (“Impacted Data”) will be recoverable. Unless otherwise expressly stated in a Quote, the recovery of Impacted Data is out-of-scope. Moreover, unless expressly stated in a Quote or Services Guide, we will not be responsible for activating multifactor authentication in any application in or connected to the Environment. You are strongly advised to (i) educate your employees to properly identify and react to “phishing” activity (i.e., fraudulent attempts to obtain sensitive information or encourage behavior by disguising oneself as a trustworthy entity or person through email), and (ii) obtain insurance against cyberattacks, data loss, malware-related matters, and privacy-related breaches, as such incidents can occur even under a “best practice” scenario. Unless a malware-related incident is caused by our intentionally malicious behavior or our gross negligence, we are held harmless from any costs, expenses, or damages arising from or related to such incidents.
Virtual Security. You understand and agree that no security solution is one hundred percent effective, and any security paradigm may be circumvented and/or rendered ineffective by certain malware, such as certain ransomware or rootkits that were unknown to the malware prevention industry at the time of infection, and/or which are downloaded or installed into the Environment. We do not warrant or guarantee that all malware or malicious activity will be capable of being detected, avoided, quarantined or removed, or that any data deleted, corrupted, or encrypted by such malware (“Impacted Data”) will be recoverable. Unless otherwise expressly stated in a Quote, the recovery of Impacted Data is out-of-scope. Moreover, unless expressly stated in a Quote or Services Guide, we will not be responsible for activating multifactor authentication in any application in or connected to the Environment. You are strongly advised to (i) educate your employees to properly identify and react to “phishing” activity (i.e., fraudulent attempts to obtain sensitive information or encourage behavior by disguising oneself as
Virtual Security. Clarity maintains a completely private network at our hosting facility. Using Cisco firewalls and Windows 2017 Servers, Clarity uses the highest level of security possible. Patches are applied monthly with a two week notice. Critical patches are applied as needed. SAMPLE Connectivity is made through an SSL connection that uses a 2048 bit key combined with SHA1 and RSA algorithms. Clarity does periodic security scans/audits of all of the Healthcare SafetyZone® Portal servers verifying that host operating systems provide the lowest risk possible. We contract with third party vendors for these scans/audits. Clarity uses monitoring tools on all hosts to review the health and performance and receives immediate notification on all threshold alerts as well as any outages. The hardware, operating systems and network are also monitored by our third party host 24/7.

Related to Virtual Security

  • Physical Security Contractor shall ensure that Medi-Cal PII is used and stored in an area that is physically safe from access by unauthorized persons during working hours and non- working hours. Contractor agrees to safeguard Medi-Cal PII from loss, theft or inadvertent disclosure and, therefore, agrees to: A. Secure all areas of Contractor facilities where personnel assist in the administration of the Medi-Cal program and use or disclose Medi-Cal PII. The Contractor shall ensure that these secure areas are only accessed by authorized individuals with properly coded key cards, authorized door keys or access authorization; and access to premises is by official identification. B. Ensure that there are security guards or a monitored alarm system with or without security cameras 24 hours a day, 7 days a week at Contractor facilities and leased facilities where a large volume of Medi-Cal PII is stored. C. Issue Contractor personnel who assist in the administration of the Medi-Cal program identification badges and require County Workers to wear the identification badges at facilities where Medi-Cal PII is stored or used. D. Store paper records with Medi-Cal PII in locked spaces, such as locked file cabinets, locked file rooms, locked desks or locked offices in facilities which are multi-use (meaning that there are personnel other than contractor personnel using common areas that are not securely segregated from each other.) The contractor shall have policies which indicate that Contractor and their personnel are not to leave records with Medi-Cal PII unattended at any time in vehicles or airplanes and not to check such records in baggage on commercial airlines. E. Use all reasonable measures to prevent non-authorized personnel and visitors from having access to, control of, or viewing Medi-Cal PII.

  • Essential Security Nothing in this Chapter shall be construed to: (a) require a Party to furnish or allow access to any information, the disclosure of which determines to be contrary to its essential security interests; or (b) preclude a Party from applying measures that it considers necessary for the fulfillment of its obligations under United Nation Charter for the maintenance or restoration of international peace or security, or the protection of its own essential security interests (19).

  • Regulation S Global Security to Restricted Global Security If a holder of a beneficial interest in a Regulation S Global Security deposited with or on behalf of DTC wishes at any time to transfer its interest in such Regulation S Global Security to a Person who wishes to take delivery thereof in the form of an interest in a Restricted Global Security, such holder may, subject to the rules and procedures DTC, exchange or cause the exchange of such interest for an equivalent beneficial interest in a Restricted Global Security. Upon receipt by the Trustee, as Certificate Registrar, of (I) instructions from DTC directing the Trustee, as Certificate Registrar, to cause to be credited a beneficial interest in a Restricted Global Security in an amount equal to the beneficial interest in such Regulation S Global Security to be exchanged but not less than the minimum denomination applicable to such holder’s Certificates held through a Restricted Global Security, to be exchanged, such instructions to contain information regarding the participant account with DTC to be credited with such increase, and (II) a certificate in the form of Exhibit N-2 hereto given by the holder of such beneficial interest and stating, among other things, that the Person transferring such interest in such Regulation S Global Security reasonably believes that the Person acquiring such interest in a Restricted Global Security is a QIB, is obtaining such beneficial interest in a transaction meeting the requirements of Rule 144A and in accordance with any applicable securities laws of any State of the United States or any other jurisdiction, then the Trustee, as Certificate Registrar, will reduce the principal amount of the Regulation S Global Security and increase the principal amount of the Restricted Global Security by the aggregate principal amount of the beneficial interest in the Regulation S Global Security to be transferred and the Trustee, as Certificate Registrar, shall instruct DTC, concurrently with such reduction, to credit or cause to be credited to the account of the Person specified in such instructions a beneficial interest in the Restricted Global Security equal to the reduction in the principal amount of the Regulation S Global Security.

  • National Security 28.01 The Canadian government, either directly or through its agencies, may instruct the Employer with respect to the security of information and materials and the personnel permitted to do certain work. The Union recognizes that the Employer is obliged to meet such instructions and that for such reason the Employer may refuse certain Employees access to the work or may transfer Employees covered by such instructions.

  • E7 Security The Authority shall be responsible for maintaining the security of the Authority premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority premises, and shall ensure that all Staff comply with such requirements.

  • Restricted Global Security to Regulation S Global Security If a holder of a beneficial interest in a Restricted Global Security deposited with or on behalf of DTC wishes at any time to exchange its interest in such Restricted Global Security for an interest in a Regulation S Global Security, or to transfer its interest in such Restricted Global Security to a Person who wishes to take delivery thereof in the form of an interest in a Regulation S Global Security, such holder, provided such holder is not a U.S. person, may, subject to the rules and procedures of DTC, exchange or cause the exchange of such interest for an equivalent beneficial interest in the Regulation S Global Security. Upon receipt by the Trustee, as Certificate Registrar, of (I) instructions from DTC directing the Trustee, as Certificate Registrar, to be credited a beneficial interest in a Regulation S Global Security in an amount equal to the beneficial interest in such Restricted Global Security to be exchanged but not less than the minimum denomination applicable to such holder’s Certificates held through a Regulation S Global Security, (II) a written order given in accordance with DTC’s procedures containing information regarding the participant account of DTC and, in the case of a transfer pursuant to and in accordance with Regulation S, the Euroclear or Clearstream account to be credited with such increase and (III) a certificate in the form of Exhibit N-1 hereto given by the holder of such beneficial interest stating that the exchange or transfer of such interest has been made in compliance with the transfer restrictions applicable to the Global Securities, including that the holder is not a U.S. person, and pursuant to and in accordance with Regulation S, the Trustee, as Certificate Registrar, shall reduce the principal amount of the Restricted Global Security and increase the principal amount of the Regulation S Global Security by the aggregate principal amount of the beneficial interest in the Restricted Global Security to be exchanged, and shall instruct Euroclear or Clearstream, as applicable, concurrently with such reduction, to credit or cause to be credited to the account of the Person specified in such instructions a beneficial interest in the Regulation S Global Security equal to the reduction in the principal amount of the Restricted Global Security.

  • Physical Security of Media DST shall implement controls, consistent with applicable prevailing industry practices and standards, that are designed to deter the unauthorized viewing, copying, alteration or removal of any media containing Fund Data. Removable media on which Fund Data is Schedule 10.2 p.3 stored by DST (including thumb drives, CDs, and DVDs, and PDAS) will be encrypted based on DST encryption policies.

  • Additional Security This guarantee is in addition to and is not in any way prejudiced by any other guarantee or security now or subsequently held by any Finance Party.

  • Personnel Security 6.1 Staff recruitment in accordance with government requirements for pre- employment checks; 6.2 Staff training and awareness of Departmental security and any specific contract requirements.

  • Collateral Security (a) The Obligations shall be secured by (a) a perfected first-priority security interest (subject to Permitted Liens entitled to priority under Applicable Law) in all Collateral, whether now owned or hereafter acquired, pursuant to the terms of the Security Agreement to which each Borrower is a party to the extent perfected by the filing of UCC financing statements; (b) a pledge of 100% of the capital stock or other Equity Interests of such Borrowers (other than the Parent) and of the Non-Borrower Subsidiaries (other than the Foreign Subsidiaries) to the Administrative Agent on behalf of the Secured Parties pursuant to the Pledge Agreement; and (c) a pledge of the capital stock or other Equity Interests of each Foreign Subsidiary (provided that not more than 65% of the total voting power of all outstanding capital stock or other Equity Interest of any such first-tier Foreign Subsidiary of a Borrower shall be required to be so pledged and no Equity Interests of any non-first-tier Foreign Subsidiary shall be provided to be so pledged); provided that the Borrowers hereby agree, upon the request of the Administrative Agent and the Required Lenders, to deliver, as promptly as practicable, but in any event within ninety (90) days after request therefor, or such other later time, if any, to which the Administrative Agent may agree, (i) certificates of titles for all or substantially all vehicles, trucks, trailers, tractors, automobiles and any other equipment covered by certificates of title owned by a Borrower (collectively, “Motor Vehicles”) with the Administrative Agent listed as lienholder therein (subject to a limited power of attorney in favor of the Parent to dispose of titled equipment) and, if required by the Administrative Agent, the Borrowers shall retain Corporation Service Company (or other similar company satisfactory to the Administrative Agent) pursuant to agreements reasonably satisfactory to the Administrative Agent pursuant to which Corporation Service Company (or such other company) will agree to act as agent for the Secured Parties with respect to the perfection of security interests in the Motor Vehicles; and (ii) mortgages with respect to Real Property and to take such other steps and make such other deliveries as may be reasonably requested by the Administrative Agent (including, without limitation, the delivery of legal opinions, Consulting Engineer’s reports, surveys, title insurance, environmental assessment reports, flood hazard certifications, evidence of flood insurance, if required, and a certification of the name and address of each real estate recording office where a mortgage on the real estate on which any Collateral consisting of fixtures may be located would be recorded) so as to provide the Administrative Agent, for the benefit of the Secured Parties, a perfected first-priority security interest in such assets, provided that to the extent that any lease of (or operating/management agreement with respect to) Real Property prohibits assignment of such lease (or operating/management agreement) without the consent of the lessor or another party thereunder, the Borrowers shall not be required to grant a mortgage on the leasehold interest under such lease, but in such event, the Borrowers agree to diligently and in good faith use its reasonable best efforts to obtain the consent (which consent shall be in form and substance reasonably satisfactory to the Administrative Agent) of the applicable lessor or other party to such leasehold mortgage (and, upon the receipt of such consent, the Borrowers shall promptly grant such leasehold mortgage and comply with the other provisions of this Section 10.15 with respect thereto). (b) In the event any Borrower disposes of any assets or Equity Interests as permitted under, and in compliance with, Section 7.04(b) (including any amendment thereof or consent thereunder), or in the event that the Parent designates any Borrower as an Excluded Subsidiary or a Non-Borrower Subsidiary hereunder and no Default would result from such designation, and so long as such Borrower (or the Parent, in the case of designating a Borrower as an Excluded Subsidiary hereunder) shall have provided the Administrative Agent with such certifications or documents, if any, as the Administrative Agent shall reasonably request, the Administrative Agent will, at the Borrowers’ sole cost and expense, and without recourse to or warranty by the Administrative Agent, execute and deliver all such forms, releases, discharges, assignments, termination statements, and similar documents as the Borrowers may reasonably request in order to release such Person from its Obligations under the Loan Documents and to release the Liens granted to the Administrative Agent with respect to such assets, Equity Interests or Borrower, as applicable.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!