WS Risks. Although the use of https has increased dramatically a significant number of websites still use the unencrypted http protocol. Information sent in requests to and from those sites is therefore unencrypted in clear text and may be intercepted. WS is focused on protecting users from harmful, unlawful, offensive or inappropriate content. Harmful content includes web-borne malware a well as phishing sites designed to capture credentials or other confidential information. Viewing all of an individual user’s web activity over time may enable the viewer to make assumptions or gain insight into the particular interests of that user, or draw conclusions in respect of the user’s political or religious beliefs.
Appears in 2 contracts
Samples: Master Services Agreement, Master Services Agreement
WS Risks. Although the use of https has increased dramatically a significant number of websites still use the unencrypted http protocol. Information sent in requests to and from those sites is therefore unencrypted in clear text and may be intercepted. • WS is focused on protecting users from harmful, unlawful, offensive or inappropriate content. Harmful content includes web-borne malware a as well as phishing sites designed to capture credentials or other confidential information. • Viewing all of an individual user’s web activity over time may enable the viewer to make assumptions or gain insight into the particular interests of that user, or draw conclusions in respect of the user’s political or religious beliefs.
Appears in 1 contract
Samples: Master Services Agreement
WS Risks. Although the use of https has increased dramatically a significant number of websites still use the unencrypted http protocol. Information sent in requests to and from those sites is therefore unencrypted in clear text and may be intercepted. WS is focused on protecting users from harmful, unlawful, offensive or inappropriate content. Harmful content includes web-borne malware a as well as phishing sites designed to capture credentials or other confidential information. Viewing all of an individual user’s web activity over time may enable the viewer to make assumptions or gain insight into the particular interests of that user, or draw conclusions in respect of the user’s political or religious beliefs.
Appears in 1 contract
Samples: Master Services Agreement