Xxxxxxx Security Sample Clauses

Xxxxxxx Security. 17.1. The Customer represents, warrants, and undertakes to ensure that the software, data, information, and/or content stored on or held in the Customer Premise Equipment or used in conjunction with its use of the Services:- 17.1.1. Does not infringe any Third-Party Intellectual Property rights; 17.1.2. Is not defamatory, libellous, threatening, obscene, pornographic, indecent or otherwise illegal under any applicable law; and 17.1.3. Does not contain any undesirable content and shall promptly take steps to remove any such content from the Customer Premise Equipment upon becoming aware of the same or being notified of the same by XXXXX. 17.2. The Customer acknowledges and agrees that it will be solely responsible for the software, data, information, and content stored on or held in the Customer Premise Equipment or used in conjunction with its use of the Services and will be solely responsible for instituting and maintaining security procedures and back-up procedures to ensure the integrity and security of the software, data, information, and/or content stored on or held in the Customer Premise Equipment, or used in conjunction with its use of the Services. SIMBA shall not be liable for unauthorised access to the Customer’s network or other breaches of the Customer’s network security.
AutoNDA by SimpleDocs
Xxxxxxx Security. A Xxxxxxx will not be excluded from overtime work on his crew provided he is able to do the work required. The Chief Xxxxxxx, if one is appointed, or a Xxxxxxx where no Chief Xxxxxxx is appointed, shall be laid off last provided he is competent to perform the available work remaining.
Xxxxxxx Security. Seven Seventeen will disclose information to third parties about your account or transfers you make under the following circumstances: 1. When it is necessary for the provision of Online Banking and for completing transactions; 2. In order to verify the existence and condition of your account for a third party, such as a credit bureau or merchant; 3. In order to comply with government or court orders, or other reporting requirements; 4. If it is necessary to assist us in the collection of information for internal use; 5. If it is necessary for the security purposes of our service providers, our servicing agents, contractors providing our Online Banking and electronic funds transfer Service; and/or 6. If you give us your permission. Please view our Privacy Policy for more information. You are responsible for keeping your username and password confidential. Please view our Best Practices to help you prevent fraud.
Xxxxxxx Security. The Parties will cooperate on all issues related to fraud, misuse or damage of data and the network. The Parties will inform each other on the occurrence of such event in due course, exchange all necessary and relevant data, including but not limited to CUSTOMER or Aria Telekom information, and will jointly discuss and work out measures either to prevent or eliminate such fraud, misuse or damage. Each Party’s obligation hereunder to transfer information to the other Party shall not apply to the extent that a Party is prohibited from doing so by relevant security laws. Each Party will strictly comply with the laws and regulations regarding telecommunications Services and data privacy applicable in its respective countries, and will inform the other Party, if and what special treatment of data generated in connection with telecommunications services delivered under this Agreement may be required under such laws and regulations by the other Party.
Xxxxxxx Security. Supplier shall at all times maintain network security that includes, at a minimum: network firewall provisioning, intrusion detection, and regular third-Party penetration testing of the network and all relevant computer/data storage devices. Upon WMU’s request, Supplier agrees to provide WMU access to its penetration test results and documentation of its network standards. If Supplier will process or hold payment card information, Supplier shall maintain network security that conforms to the latest PCI/DSS standards.
Xxxxxxx Security. Seller of the Xxxxxxx Property has delivered the security set out in Schedule 8.4(a) to one or more governmental authorities and/or utilities (the “Xxxxxxx Security”). Purchaser covenants and agrees to undertake commercially reasonably efforts, on or prior to the Closing Date, at its sole cost, to lodge replacement security with the relevant governmental authority in replacement of the Xxxxxxx Security (the Xxxxxxx Replacement Security) such that the Xxxxxxx Security is released to such Seller, or as it may direct, on or before Closing, failing which, such Seller covenants and agrees that its interest in such Xxxxxxx Security shall be assigned to Purchaser on or before Closing, which assignment shall include, inter alia, an irrevocable direction to such relevant governmental authority directing the release of such Xxxxxxx Security to Purchaser upon the satisfaction of all release conditions applicable thereto, in exchange for which such Seller shall receive a credit in the amount of such Xxxxxxx Security, on the Statement of Adjustments.
Xxxxxxx Security. Synacor will at all times during the Term maintain network firewalls, load balancers and intrusion detection devices to prevent, among other problems, unauthorized access to the network infrastructure and systems. Network attacks such as denial-of-service attacks are logged. Synacor will notify Client when such attacks are detected and collaborate with Client to assess the validity of such attacks. Synacor shall at all times during the Term encrypt data during the Client authentication process and Synacor shall update Client should changes occur to such process.
AutoNDA by SimpleDocs

Related to Xxxxxxx Security

  • E7 Security The Authority shall be responsible for maintaining the security of the Authority premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority premises, and shall ensure that all Staff comply with such requirements.

  • JOB SECURITY 23.01 Subject to the willingness and capacity of individual employees to accept relocation and retraining, the Employer will make every reasonable effort to ensure that any reduction in the work force will be accomplished through attrition.

  • Network Security The AWS Network will be electronically accessible to employees, contractors and any other person as necessary to provide the Services. AWS will maintain access controls and policies to manage what access is allowed to the AWS Network from each network connection and user, including the use of firewalls or functionally equivalent technology and authentication controls. AWS will maintain corrective action and incident response plans to respond to potential security threats.

  • User Security You agree to take every precaution to ensure the safety, security and integrity of your account and transactions when using Mobile Banking. You agree not to leave your Device unattended while logged into Mobile Banking and to log off immediately at the completion of each access by you. You agree not to provide your username, password or other access information to any unauthorized person. If you permit other persons to use your Device, login information, or other means to access Mobile Banking, you are responsible for any transactions they authorize and we will not be liable for any damages resulting to you. You agree not to use any personally identifiable information when creating shortcuts to your Account. We make no representation that any content or use of Mobile Banking is available for use in locations outside of the United States. Accessing Mobile Banking from locations outside of the United States is at your own risk.

  • Cyber Security Insurance for loss to the Owner due to data security and privacy breach, including costs of investigating a potential or actual breach of confidential or private information. (Indicate applicable limits of coverage or other conditions in the fill point below.) « »

  • Internet Security The Service utilizes a comprehensive security strategy to protect your accounts and transactions conducted over the Internet. Prior to activating your access to the Service, our Internet Banking Department will verify your identity and authorization against information associated with the Eligible Account (s) that you request to be linked to the Service. Access IDs and Passcodes - One of the main security features protecting the Service is the unique combination of your Access Identification Code (Access ID) and Passcode. During the enrollment process, you will be asked to select a unique Access ID, and then choose a Passcode that will be used to gain access to the Service. You determine your own Passcode, which is encrypted in our database. Neither this Institution nor its Service Providers have access to this information. The Service will automatically deactivate your account after three unsuccessful login attempts within a 24-hour time frame. You may reset your passcode online or you may contact this Institution for assistance. Because your Passcode is used to access your accounts, you should treat it as you would any other sensitive personal data. • You should carefully select a Passcode that is hard to guess. • You should not use words based on your name, address or other personal information. • Special characters may be used to increase security. • Do NOT use dictionary words. The “Help” link within the Service will offer tips on choosing a secure Passcode that you can remember. • Keep your Passcode safe. • Memorize your Passcode and do NOT write it down. • You should also change your Passcode occasionally, such as every 90 days. • A Passcode should be changed immediately if you suspect that your Passcode has been compromised. This can be done at any time from the “User Services” menu after you log on to the Service. NEITHER THIS INSTITUTION NOR ITS SERVICE PROVIDERS WILL CONTACT YOU VIA TELEPHONE OR EMAIL REQUESTING PERSONAL INFORMATION, YOUR ACCESS ID, OR YOUR PASSCODE. IF YOU ARE CONTACTED BY ANYONE REQUESTING THIS INFORMATION, PLEASE CONTACT US IMMEDIATELY.

  • Data Security The Provider agrees to utilize administrative, physical, and technical safeguards designed to protect Student Data from unauthorized access, disclosure, acquisition, destruction, use, or modification. The Provider shall adhere to any applicable law relating to data security. The provider shall implement an adequate Cybersecurity Framework based on one of the nationally recognized standards set forth set forth in Exhibit “F”. Exclusions, variations, or exemptions to the identified Cybersecurity Framework must be detailed in an attachment to Exhibit “H”. Additionally, Provider may choose to further detail its security programs and measures that augment or are in addition to the Cybersecurity Framework in Exhibit “F”. Provider shall provide, in the Standard Schedule to the DPA, contact information of an employee who XXX may contact if there are any data security concerns or questions.

  • Password Security You are responsible for maintaining adequate security and control of any and all User IDs, Passwords, hints, personal identification numbers (PINs), or any other codes that you use to access the Account. Do not discuss, compare, or share information about your account number or password unless you are willing to give them full use of your money. Any loss or compromise of the foregoing information and/or your personal information may result in unauthorized access to your Account by third-parties and the loss or theft of any funds held in your Account and any associated accounts, including your Account. Checks and electronic withdrawals are processed by automated methods, and anyone who obtains your account number or access device could use it to withdraw money from your account, with or without your permission. You are responsible for keeping your email address and telephone number up to date in order to receive any notices or alerts that we may send you. We assume no responsibility for any loss that you may sustain due to compromise of your account login credentials due to no fault of ours and/or your failure to follow or act on any notices or alerts that we may send to you. If you believe your Account information has been compromised, or that someone has transferred or may transfer money from your account without your permission, contact us immediately, through Synapse, at xxxx@xxxxxxxxx.xxx or call at +0(000) 000-0000. You agree to promptly review all Account and transaction records and other Communications that we make available to you and to promptly report any discrepancy to us.

  • Data Privacy and Security Bank will implement and maintain a written information security program, in compliance with all federal, state and local laws and regulations (including any similar international laws) applicable to Bank, that contains reasonable and appropriate security measures designed to safeguard the personal information of the Funds' shareholders, employees, trustees and/or officers that Bank or any Subcustodian receives, stores, maintains, processes, transmits or otherwise accesses in connection with the provision of services hereunder. In this regard, Bank will establish and maintain policies, procedures, and technical, physical, and administrative safeguards, designed to (i) ensure the security and confidentiality of all personal information and any other confidential information that Bank receives, stores, maintains, processes or otherwise accesses in connection with the provision of services hereunder, (ii) protect against any reasonably foreseeable threats or hazards to the security or integrity of personal information or other confidential information, (iii) protect against unauthorized access to or use of personal information or other confidential information, (iv) maintain reasonable procedures to detect and respond to any internal or external security breaches, and (v) ensure appropriate disposal of personal information or other confidential information. Bank will monitor and review its information security program and revise it, as necessary and in its sole discretion, to ensure it appropriately addresses any applicable legal and regulatory requirements. Bank shall periodically test and review its information security program. Bank shall respond to Customer's reasonable requests for information concerning Bank's information security program and, upon request, Bank will provide a copy of its applicable policies and procedures, or in Bank's discretion, summaries thereof, to Customer, to the extent Bank is able to do so without divulging information Bank reasonably believes to be proprietary or Bank confidential information. Upon reasonable request, Bank shall discuss with Customer the information security program of Bank. Bank also agrees, upon reasonable request, to complete any security questionnaire provided by Customer to the extent Bank is able to do so without divulging sensitive, proprietary, or Bank confidential information and return it in a commercially reasonable period of time (or provide an alternative response that reasonably addresses the points included in the questionnaire). Customer acknowledges that certain information provided by Bank, including internal policies and procedures, may be proprietary to Bank, and agrees to protect the confidentiality of all such materials it receives from Bank. Bank agrees to resolve promptly any applicable control deficiencies that come to its attention that do not meet the standards established by federal and state privacy and data security laws, rules, regulations, and/or generally accepted industry standards related to Bank's information security program. Bank shall: (i) promptly notify Customer of any confirmed unauthorized access to personal information or other confidential information of Customer ("Breach of Security"); (ii) promptly furnish to Customer appropriate details of such Breach of Security and assist Customer in assessing the Breach of Security to the extent it is not privileged information or part of an investigation; (iii) reasonably cooperate with Customer in any litigation and investigation of third parties reasonably deemed necessary by Customer to protect its proprietary and other rights; (iv) use reasonable precautions to prevent a recurrence of a Breach of Security; and (v) take all reasonable and appropriate action to mitigate any potential harm related to a Breach of Security, including any reasonable steps requested by Customer that are practicable for Bank to implement. Nothing in the immediately preceding sentence shall obligate Bank to provide Customer with information regarding any of Bank's other customers or clients that are affected by a Breach of Security, nor shall the immediately preceding sentence limit Bank's ability to take any actions that Bank believes are appropriate to remediate any Breach of Security unless such actions would prejudice or otherwise limit Customer's ability to bring its own claims or actions against third parties related to the Breach of Security. If Bank discovers or becomes aware of a suspected data or security breach that may involve an improper access, use, disclosure, or alteration of personal information or other confidential information of Customer, Bank shall, except to the extent prohibited by Applicable Law or directed otherwise by a governmental authority not to do so, promptly notify Customer that it is investigating a potential breach and keep Customer informed as reasonably practicable of material developments relating to the investigation until Bank either confirms that such a breach has occurred (in which case the first sentence of this paragraph will apply) or confirms that no data or security breach involving personal information or other confidential information of Customer has occurred. For these purposes, "personal information" shall mean (i) an individual's name (first initial and last name or first name and last name), address or telephone number plus (a) social security number, (b) driver's license number, (c) state identification card number, (d) debit or credit card number, (e) financial account 22 number, (f) passport number, or (g) personal identification number or password that would permit access to a person's account or (ii) any combination of the foregoing that would allow a person to log onto or access an individual's account. This provision will survive termination or expiration of the Agreement for so long as Bank or any Subcustodian continues to possess or have access to personal information related to Customer. Notwithstanding the foregoing "personal information" shall not include information that is lawfully obtained from publicly available information, or from federal, state or local government records lawfully made available to the general public.

  • Airport Security The Contractor shall be familiar with and conduct its operations in accordance with all regulations and directives of the Authority and the Transportation Security Administration, and any other federal, state or local government having jurisdiction over the airport, with respect to the maintenance of airport security.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!