Wireless Security Sample Clauses

Wireless Security. You understand that wireless communications may not be encrypted and that there are risks in accessing the Services with wireless devices. Subject to applicable law, you expressly agree to assume all such risks. Wireless communications may not be confidential or secure. Accordingly, you agree to exercise precautions to safeguard your wireless devices, your identity, your Accounts, and your Account information. You agree never to provide your personal information or Account information to any person or through any wireless network you do not know or whose identity you cannot verify. If you do, you assume all risks, subject to applicable law. You agree to remain vigilant for phishing and other fraudulent scams and notify us promptly if you become aware of or suspect fraudulent activity involving your identity, your Accounts, or the Credit Union. You agree to notify us immediately if your wireless device is lost, stolen, or destroyed or if you change your telephone number, email address, or other contact information. If you fail to exercise reasonable care to protect your identity and safeguard your wireless devices and your Accounts, we will not be liable, subject to applicable law.
AutoNDA by SimpleDocs
Wireless Security. If Convercent deploys a wireless network, Convercent will maintain written policies governing the use, configuration and management of wireless networks:
Wireless Security. The solution must protect against eavesdropping and unauthorized access. The solution may include encryption or other techniques to provide this assurance which the local school may turn on or off as local policy indicates. The Bidder must describe how its proposed solution will provide such protections.
Wireless Security. While we employ industry-leading security measures to protect your Accounts, you understand that wireless communications may not always be secure and that there are risks in accessing the EFT Services with your mobile device. Subject to applicable law, you expressly agree to assume all such risks. You agree to exercise precautions to safeguard your wireless device, your identity, your Accounts, and your Account information. You agree never to provide your personal information or Account information to any person or through any wireless network you do not know or whose identity you cannot verify. If you do, you assume all risks, subject to applicable law. We will never contact you by telephone, text messaging, email, or otherwise and ask you to provide us your personal or Account information, including your Social Security number, user name, PIN, and Account numbers. You agree not to disclose your personal information and Account information to unknown persons through those channels for any reason. You agree to remain vigilant for phishing and other fraudulent scams and notify us promptly if you become aware of or suspect fraudulent activity involving your identity, your Accounts, or the Credit Union. If you receive a text or email that appears to have been sent by the Credit Union and asks for personal or Account information or asks you to click on a link, do not respond to the text or email and notify us immediately at the telephone number appearing in this Agreement. You agree to notify us immediately if you change your email address or other contact information. If you fail to exercise reasonable care to protect your identity and safeguard your mobile device and Accounts, we will not accept liability, subject to applicable law.
Wireless Security. If Market Logic deploys a wireless network, Market Logic will configure and maintain the use, configuration and management of wireless networks to meet the following:
Wireless Security. If you deploy a wireless network, you will configure and maintain the use, configuration and management of wireless networks to meet the following:
Wireless Security. When configuring Wireless Access Points (WAP) and devices, the organization shall change the following: [Core-15(b)] o Equipment administrator default password. o Vendor default encryption keys. o Encryption keys anytime anyone with knowledge of the keys leaves TSM or changes positions. o Default SNMP community strings on wireless devices. o Default passwords/passphrases on access points. o Other security-related wireless vendor defaults, if applicable. TSM shall monitor all authorized and unauthorized Wireless Access Points (WAP) to TSM information systems and networks. The installation of Wireless Access Points (WAP) is prohibited, unless explicitly authorized, in writing, by the Infrastructure Manager and the Information & Cyber Security Director. [Core-15(b) & Core-15(c)] Approved Wireless Access Points (WAP) and devices shall have appropriate encryption enabled for authentication and transmission and shall be placed in secure areas. [Core- 15(b)]
AutoNDA by SimpleDocs
Wireless Security. Avaya will utilize strong encryption, such as WPA2, on its wireless network(s).
Wireless Security. We employ industry-leading security measures to protect your Accounts. The method you use to access mobile communications may not always be secure and there are risks in accessing EFT Services with your mobile device or computer on an open WIFI network. Subject to applicable law, you expressly agree to assume all such risks. You agree to:

Related to Wireless Security

  • Data Security The Provider agrees to utilize administrative, physical, and technical safeguards designed to protect Student Data from unauthorized access, disclosure, acquisition, destruction, use, or modification. The Provider shall adhere to any applicable law relating to data security. The provider shall implement an adequate Cybersecurity Framework based on one of the nationally recognized standards set forth set forth in Exhibit “F”. Exclusions, variations, or exemptions to the identified Cybersecurity Framework must be detailed in an attachment to Exhibit “H”. Additionally, Provider may choose to further detail its security programs and measures that augment or are in addition to the Cybersecurity Framework in Exhibit “F”. Provider shall provide, in the Standard Schedule to the DPA, contact information of an employee who XXX may contact if there are any data security concerns or questions.

  • Not a Security None of the Notes shall be deemed to be a security within the meaning of the Securities Act of 1933 or the Securities Exchange Act of 1934.

  • Security Notwithstanding anything herein to the contrary, except for Section 27, to the extent requested by Indemnitee and approved by the Board, the Company may at any time and from time to time provide security to Indemnitee for the Company’s obligations hereunder through an irrevocable bank line of credit, funded trust or other collateral. Any such security, once provided to Indemnitee, may not be revoked or released without the prior written consent of Indemnitee.

  • Cybersecurity (i)(x) There has been no security breach or other compromise of or relating to any of the Company’s or any Subsidiary’s information technology and computer systems, networks, hardware, software, data (including the data of its respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of it), equipment or technology (collectively, “IT Systems and Data”) and (y) the Company and the Subsidiaries have not been notified of, and has no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to its IT Systems and Data; (ii) the Company and the Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification, except as would not, individually or in the aggregate, have a Material Adverse Effect; (iii) the Company and the Subsidiaries have implemented and maintained commercially reasonable safeguards to maintain and protect its material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and Data; and (iv) the Company and the Subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practices.

  • Access and Security Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.

  • Cyber Security Insurance for loss to the Owner due to data security and privacy breach, including costs of investigating a potential or actual breach of confidential or private information. (Indicate applicable limits of coverage or other conditions in the fill point below.) « »

  • Privacy and Data Security (a) The parties will keep confidential any information regarding the Company, Nationwide, the Variable Accounts, and Contract Owners received in connection with providing services and meeting their respective obligations hereunder, except: (a) as necessary to provide the services or otherwise meet their respective obligations under this Agreement; (b) as necessary to comply with applicable law; and (c) information regarding the Variable Accounts which is otherwise publicly available. The parties will maintain internal safekeeping procedures to safeguard and protect the confidentiality of the data transmitted to another party or its designees or agents in accordance with Section 248.11 of Regulation S-P (17 CFR 248.1–248.30) (“Reg S-P”) and any other applicable federal or state privacy laws and regulations, including without limitation 201 CFR 17.00 et seq. and applicable security breach notification regulations (collectively “Privacy Laws”). Each party shall use such data solely to effect the services contemplated herein, and none of the parties will directly, or indirectly through an affiliate, disclose any non-public personal information protected under Privacy Laws (“Non-public Personal Information”) received from another party to any person that is not an affiliate, designee, service provider, or agent of the receiving party and provided that any such information disclosed to an affiliate, designee, service provider, or agent will be under the same or substantially similar contractual limitations on use and non-disclosure and will comply with all legal requirements. The Company will not use information, including Non-public Personal Information, directly or indirectly provided to it by Nationwide or its designees or agents pursuant to this Agreement for the purpose of marketing to Contract Owners or any other similar purpose, except as may be agreed by the parties hereto. Except for confidential information consisting of Non-public Personal Information, which will be governed in all respects in accordance with the immediately preceding sentence, confidential information does not include information which (i) was publicly known and/or was in the possession of the party receiving confidential information (“Receiving Party”) from other sources prior to the Receiving Party’s receipt of confidential information from the party disclosing confidential information (“Disclosing Party”), or (ii) is or becomes publicly available other than as a result of a disclosure by the Receiving Party or its representatives, or (iii) is or becomes available to the Receiving Party on a non-confidential basis from a source (other than the Disclosing Party) which, to the best of the Receiving Party’s knowledge, is not prohibited from disclosing such information to the Receiving Party by a legal, contractual, or fiduciary obligation to the Disclosing Party, or (iv) describes the fees payable to Nationwide under this Agreement.

  • Collateral and Security Section 10.01

Time is Money Join Law Insider Premium to draft better contracts faster.