Web Site Security Sample Clauses

Web Site Security. You are prohibited from violating or attempting to violate the security of this Web Site, including, but not limited to the following activities: (1) accessing data not intended for you or obtaining personal information about any Check ‘n Go Web Site user or customer; (2) attempting to probe, test, or scan the vulnerability of a system or network or to breach security or authentication measures without proper authorization; (3) attempting to interfere with service to any user, host or network, or otherwise disrupt Check ‘n Go business, including, without limitation, by submitting a virus to the Web Site, overloading, "flooding," "spamming," "mailbombing" or "crashing;", or sending unsolicited email, including promotions and/or advertising of products or services. Mobile Terms and Conditions Effective Date: MAY 1, 2020 Transactional Texts To receive Account Management Messages from Check ‘N Go through your mobile device text JOIN to 33484 to receive text messages regarding your loan. Message and data rates may apply. By opting in to this service, you consent to receive mobile text alerts using an automatic telephone dialing system. This short code will not be used for sending any delinquent notices or to complete any financial transactions. Consent to receive marketing text messages is not required as a condition of purchasing any goods or services. By signing up, you are confirming you are over the age of 18. STOP Information Text STOP to 33484 to stop receiving Account Management messages from Check ‘N Go (you will receive a confirmation text). HELP Information For additional information, text HELP to 33484 or contact 000-000-0000. Supported carriers are: AT&T, Sprint, T-Mobile®, Verizon Wireless, Boost, Cricket, MetroPCS, U.S. Cellular, Virgin Mobile, ACS Wireless, Appalachian Wireless, Bluegrass Cellular, Carolina West Wireless, Cellcom, C-Spire Wireless (formerly Cellsouth), Cellular One of East Central Illinois, Cincinnati Bell Wireless, Cross (dba Sprocket), Duet IP, Element Mobile, EpicTouch, GCI Communications, Golden State, Hawkeye (Chat Mobility), Hawkeye (NW Missouri Cellular), Illinois Valley Cellular, Immix (Keystone Wireless / PC Management), Inland Cellular, iWireless, Mobi PCS (Coral Wireless LLC), Mosaic, MTPCS / Cellular One (Cellone Nation), Nex-Tech Wireless, nTelos, Panhandle Telecommunications, Peoples Wireless, Pioneer, Plateau, Revol Wireless, Rina - Xxxxxx, Xxxx - All Xxxx, Xxxx - Cambridge Telecom Coop, Rina - Eagle Valley Comm, R...
AutoNDA by SimpleDocs
Web Site Security. You are prohibited from violating or attempting to violate the security of the Web Site, including, without limitation, (a) accessing data not intended for your viewing or logging into a server or account which you are not authorized to access, (b) attempting to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without proper authorization or (c) attempting to interfere with service to any user, host or network. Violations of system or network security may result in civil or criminal liability. Chassix will investigate occurrences which may involve such violations and may involve, and cooperate with, law enforcement authorities in prosecuting users who are involved in such violations. Enforcement of Terms and Conditions Chassix makes no representation that content provided is applicable or appropriate for use in all locations. These terms and conditions are governed and interpreted pursuant to the laws of the State of Michigan, United States of America, notwithstanding any principles of conflicts of law. If you take legal action relating to these terms, you agree to file such action only in the state and federal courts located in the State of Michigan. If any part of these terms and conditions is unlawful, void or unenforceable, that part will be deemed severable and will not affect the validity and enforceability of remaining provisions.
Web Site Security. You are prohibited from violating or attempting to violate the security of this Web Site, including, but not limited to the following activities: (1) accessing data not intended for you or obtaining personal information about any XACT Web Site user or customer; (2) attempting to probe, test, or scan the vulnerability of a system or network or to breach security or authentication measures without proper authorization; (3) attempting to interfere with service to any user, host or network, or otherwise disrupt XACT business, including, without limitation, by submitting a virus to the Web Site, overloading, "flooding," "spamming," "mailbombing" or "crashing;", or sending unsolicited email, including promotions and/or advertising of products or services. Mobile Terms and Conditions Effective Date: MAY 1, 2020 Transactional Texts To receive Account Management Messages from XACT through your mobile device, text JOIN to 35694 to receive text messages regarding your loan. Message and data rates may apply. By opting in to this service, you consent to receive mobile text alerts using an automatic telephone dialing system. Consent to receive marketing text messages is not required as a condition of purchasing any goods or services. By signing up, you are confirming you are over the age of 18. To opt into marketing text, such as marketing related please text JOIN to 91864 STOP Information Text STOP to 35694 to stop receiving Account Management Messages from XACT (you will receive a confirmation text). Text STOP to 91864 to stop receiving Marketing Messages from XACT (you will receive a confirmation text). HELP Information For additional information, text HELP to 35694 or contact 000-000-0000. Supported carriers are: AT&T, Sprint, T-Mobile®, Verizon Wireless, Boost, Cricket, MetroPCS, U.S. Cellular, Virgin Mobile, ACS Wireless, Appalachian Wireless, Bluegrass Cellular, Carolina West Wireless, Cellcom, C-Spire Wireless (formerly Cellsouth), Cellular One of East Central Illinois, Cincinnati Bell Wireless, Cross (dba Sprocket), Duet IP, Element Mobile, EpicTouch, GCI Communications, Golden State, Hawkeye (Chat Mobility), Hawkeye (NW Missouri Cellular), Illinois Valley Cellular, Immix (Keystone Wireless / PC Management), Inland Cellular, iWireless, Mobi PCS (Coral Wireless LLC), Mosaic, MTPCS / Cellular One (Cellone Nation), Nex-Tech Wireless, nTelos, Panhandle Telecommunications, Peoples Wireless, Pioneer, Plateau, Revol Wireless, Rina - Xxxxxx, Xxxx - All Xxxx, Xxxx - Cam...
Web Site Security. The Internet web site provided to Customer by FDR shall include multiple hardware firewalls. FDR's stored value system will at all times utilize a minimum encryption level of 128 bits, and information and system protection may be enhanced to the extent offered by any exchange of additional software based security certificates between Customer and FDR. Regularly scheduled maintenance services will employ virus detection and diagnostic software. EXHIBIT B
Web Site Security. While Angil Design will do all due diligence to ensure that critical data is encrypted and that best practices are followed both in coding and system security, no warranty, expressed or implied is made in regards to unauthorized access. Customer expressly (i) grants to Angil Design, Inc. a license to cache the entirety of Customer’s Web Site, including content supplied by third parties, hosted by Angil Design, Inc. under this Agreement and (ii) agree that such caching is not an infringement of any of Customer’s intellectual property rights or any third party's intellectual property rights.

Related to Web Site Security

  • Data Security The Provider agrees to utilize administrative, physical, and technical safeguards designed to protect Student Data from unauthorized access, disclosure, acquisition, destruction, use, or modification. The Provider shall adhere to any applicable law relating to data security. The provider shall implement an adequate Cybersecurity Framework based on one of the nationally recognized standards set forth set forth in Exhibit “F”. Exclusions, variations, or exemptions to the identified Cybersecurity Framework must be detailed in an attachment to Exhibit “H”. Additionally, Provider may choose to further detail its security programs and measures that augment or are in addition to the Cybersecurity Framework in Exhibit “F”. Provider shall provide, in the Standard Schedule to the DPA, contact information of an employee who XXX may contact if there are any data security concerns or questions.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Cyber Security; Data Protection The Company’s and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted and are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with their businesses, and there have been no material breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any material incidents under internal review or investigations relating to the same. The Company and its subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification (“Data Protection Requirements”), in each case, except for such failures as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect. To ensure compliance with the Data Protection Requirements, the Company and its subsidiaries have in place, comply with, and take appropriate steps reasonably designed to ensure compliance in all material respects with their policies and procedures relating to data privacy and security and the collection, storage, use, disclosure, handling, and analysis of Personal Data (the “Policies”). The Company and its subsidiaries have at all times made all disclosures to users or customers required by applicable laws and regulatory rules or requirements, and none of such disclosures made or contained in any Policy have, to the knowledge of the Company, been inaccurate or in violation of any applicable laws and regulatory rules or requirements in any material respect. The Company further certifies that neither it nor any subsidiary: (i) has received notice of any actual or potential liability under or relating to, or actual or potential violation of, any of the Data Protection Requirements, and has no knowledge of any event or condition that would reasonably be expected to result in any such notice; (ii) is currently conducting or paying for, in whole or in part, any investigation, remediation, or other corrective action pursuant to any Data Protection Requirement; or (iii) is a party to any order, decree, or agreement that imposes any obligation or liability by any governmental authority under any Data Protection Requirement, in each case except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect.

  • Security; Reliance; Unauthorized Use The Fund will cause all persons utilizing the Software and System to treat all applicable user and authorization codes, passwords and authentication keys with extreme care, and it will establish internal control and safekeeping procedures to restrict the availability of the same to persons duly authorized to give Instructions. Custodian is hereby irrevocably authorized to act in accordance with and rely on Instructions received by it through the System. The Fund acknowledges that it is its sole responsibility to assure that only persons duly authorized use the System and that Custodian shall not be responsible nor liable for any unauthorized use thereof.

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Privacy and Data Security (a) The parties will keep confidential any information regarding the Trust, the Variable Accounts, and Contract Owners received in connection with providing services and meeting their respective obligations hereunder, except: (a) as necessary to provide the services or otherwise meet their respective obligations under this Agreement; (b) as necessary to comply with applicable law; and (c) information regarding the Trust or Variable Accounts which is otherwise publicly available. The parties will maintain internal safekeeping procedures to safeguard and protect the confidentiality of the data transmitted to another party or its designees or agents in accordance with Section 248.11 of Regulation S-P (17 CFR 248.1–248.30) (“Reg S-P”) and any other applicable federal or state privacy laws and regulations, including without limitation 201 CFR 17.00 et seq. and applicable security breach notification regulations (collectively “Privacy Laws”). Each party shall use such data solely to effect the services contemplated herein, and none of the parties will directly, or indirectly through an affiliate, disclose any non-public personal information protected under Privacy Laws (“Non-public Personal Information”) received from another party to any person that is not an affiliate, designee, service provider, or agent of the receiving party and provided that any such information disclosed to an affiliate, designee, service provider, or agent will be under the same or substantially similar contractual limitations on use and non-disclosure and will comply with all legal requirements. The Company will not use information, including Non-public Personal Information, directly or indirectly provided to it by Nationwide or its designees or agents pursuant to this Agreement for the purpose of marketing to Contract Owners or any other similar purpose, except as may be agreed by the parties hereto. Except for confidential information consisting of Non-public Personal Information, which will be governed in all respects in accordance with the immediately preceding sentence, confidential information does not include information which (i) was publicly known and/or was in the possession of the party receiving confidential information (“Receiving Party”) from other sources prior to the Receiving Party’s receipt of confidential information from the party disclosing confidential information (“Disclosing Party”), or (ii) is or becomes publicly available other than as a result of a disclosure by the Receiving Party or its representatives, or (iii) is or becomes available to the Receiving Party on a non-confidential basis from a source (other than the Disclosing Party) which, to the best of the Receiving Party’s knowledge, is not prohibited from disclosing such information to the Receiving Party by a legal, contractual, or fiduciary obligation to the Disclosing Party, or (iv) describes the fees payable to Nationwide under this Agreement.

  • Financing Services The Manager shall:

  • Not a Security None of the Notes shall be deemed to be a security within the meaning of the Securities Act of 1933 or the Securities Exchange Act of 1934.

  • Access and Security Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.

Time is Money Join Law Insider Premium to draft better contracts faster.