Security Application definition

Security Application means the iOS and Android versions of any of our proprietary, standard mobile security software applications that users can download onto their smartphones, as may be modified by us from time to time. OUR SECURITY PRODUCTS ARE NOT DESIGNED TO AND WILL NOT BE USED TO MANAGE PHYSICAL OR LOGICAL ACCESS TO FACILITIES OR SYSTEMS WHERE DELAY IN OR FAILURE OF SUCH ACCESS COULD THREATEN HEALTH OR SAFETY, OR CAUSE PROPERTY, ENVIRONMENTAL OR SIMILAR DAMAGE OR LOSS, AND YOU AGREE NOT TO USE THEM TO MANAGE SUCH ACCESS UNLESS YOU PROVIDE A FAILSAFE MECHANISM FOR LOCAL BYPASS OF THE SECURITY PRODUCTS FOR USE IN AN EMERGENCY FOR WHICH YOU WILL BE FULLY RESPONSIBLE.
Security Application means a software program or service built exclusively to protect and defend the information and technology assets of an enterprise.
Security Application means the iOS and Android versions of any of MicroStrategy’s proprietary, standard mobile security software applications that users can download onto their smartphones, as may be modified by MicroStrategy from time to time. MICROSTRATEGY’S SECURITY PRODUCTS ARE NOT DESIGNED TO AND WILL NOT BE USED TO MANAGE PHYSICAL OR LOGICAL ACCESS TO FACILITIES OR SYSTEMS WHERE DELAY IN OR FAILURE OF SUCH ACCESS COULD THREATEN HEALTH OR SAFETY, OR CAUSE PROPERTY, ENVIRONMENTAL OR SIMILAR DAMAGE OR LOSS, AND LICENSEE AGREES NOT TO USE THEM TO MANAGE SUCH ACCESS UNLESS LICENSEE PROVIDES A FAILSAFE MECHANISM FOR LOCAL BYPASS OF THE SECURITY PRODUCTS FOR USE IN AN EMERGENCY FOR WHICH LICENSEE WILL BE FULLY RESPONSIBLE.

Examples of Security Application in a sentence

  • Irrespective of their characteristics, EUI requires the completion and submission of a Security Application Form in respect of certain processing instruments.

  • Time is given for Social Security Application and the issuance of a number.

  • The SUITE Framework is a comprehensive set of processes to ensure successful system engineering and project management on State of Michigan Information Technology Projects• This project will follow the Security Application Development Life Cycle (SADLC) Framework.

  • This is performed using a device called a MULTOS Injection Security Application (MISA).The MSM constructs data for each MISA, including a unique MISA identifier.The MISA then constructs the data to be injected into the MCD.

  • Sponsoring of IT Cadre officers to specialized institutions providing training in Data Base Management System, Network Security, Application Software Development Tools etc.

  • Table 1 Influential BT-AI Publications ReferenceTitleYearCSLCSDACY(Hassija et al., 2019)Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures2019211970(Warner & Wäger, 2019)Building dynamic capabilities for digital transformation: An ongoing process of strategic renewal2019140047(Allam & Dhunny, 2019)On big data, artificial intelligence and smart cities2019129543(Y.

  • Web Security is configured by Customer in the Portal where Customer may define Rules and create a Security Application Manager configuration that enforces these Rules.

  • A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures.

  • TITLE: A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures AUTHOR: VIKAS HASSIJA, VINAY CHAMOLA, VIKAS SAXENA, DIVYANSH JAIN, PRANAV GOYAL, AND BIPLAB SIKDAR.

  • Application Migration to Cloud, Auto-scaling and on-demand resource allocation schemes, Cloud Service Level Agreement (SLA), SLA monitoring, accounting and verification, data center automation and containers.Cloud Security: Cloud Security Challenges and Risks, Data Security, Application Security, Virtual Machine Security, Cross-VM attacks, Identity Management and Access Control, Establishing Trusted Cloud computing, Cloud Storage security, deduplication and Disaster Recovery in Clouds.Text/References:1.


More Definitions of Security Application

Security Application means the iOS and Android versions of any of our proprietary, standard mobile security software applications that users can download onto their smartphones, as may be modified by us from time to time. OUR SECURITY PRODUCTS ARE NOT DESIGNED TO AND WILL NOT BE USED TO MANAGE PHYSICAL OR LOGICAL ACCESS TO FACILITIES OR SYSTEMS WHERE DELAY IN OR FAILURE OF SUCH ACCESS COULD THREATEN HEALTH OR SAFETY, OR CAUSE PROPERTY, ENVIRONMENTAL OR SIMILAR DAMAGE OR LOSS, AND YOU AGREE NOT TO USE THEM TO MANAGE SUCH ACCESS UNLESS YOU PROVIDE A FAILSAFE MECHANISM FOR LOCAL BYPASS OF THE SECURITY PRODUCTS FOR USE IN AN EMERGENCY FOR WHICH YOU WILL BE FULLY RESPONSIBLE. 4. 安全产品。当贵方获得了与分析和移动产品一并交付的本公司的安全产品时,您仅可将这些安全产品用于验证是否有资格获取分析报告。贵方应负责 (a) 将安全产品配置于您的网络和安全应用程序中;并 (b) 将安全应用程序的使用条款和隐私政策提供给贵方的指定用户,该等使用条款和隐私政策与可获得安全应用程序的每个平台上该安全应用程序的使用条款和隐私政策一致(例如,针对 iOS 设备的苹果应用商店以及针对安卓设备的 Google Play 商店)。“安全应用程序”指本公司不时修订的,本公司的任何专有、标准移动端安全软件应用程序的 iOS 和安卓系统版本,用户可将该等软件下载至自己的智能手机中。本公司的安全产品并非也不会用于管理以物理或逻辑方式进入以下设施或系统,即, 延迟进入或未进入该等设施或系统可能威胁健康或安全,造成财产、环境或类似损害或损失,且贵方同意在管理进入上述设施或系统时不使用这些安全产品, 除非贵方能提供一种旨在在紧急情况下使用的,绕开安全产品的自动防故障机制,且贵方对此承担全部责任。
Security Application means the iOS and Android versions of any of our proprietary, standard mobile security software applications that users can download onto their smartphones, as may be modified by us from time to time. OUR SECURITY PRODUCTS ARE NOT DESIGNED TO AND WILL NOT BE USED TO MANAGE PHYSICAL OR LOGICAL ACCESS TO FACILITIES OR SYSTEMS WHERE DELAY IN OR FAILURE OF SUCH ACCESS COULD THREATEN HEALTH OR SAFETY, OR CAUSE PROPERTY, ENVIRONMENTAL OR SIMILAR DAMAGE OR LOSS, AND YOU AGREE NOT TO USE THEM TO MANAGE SUCH ACCESS UNLESS YOU PROVIDE A FAILSAFE MECHANISM FOR LOCAL BYPASS OF THE SECURITY PRODUCTS FOR USE IN AN EMERGENCY FOR WHICH YOU WILL BE FULLY RESPONSIBLE. 4. 보안제품. 당사의 분석 및 이동통신 제품이 인도되어 귀사가 당사의 보안제품에 대한 접근권한을 받을 경우, 귀사는 분석 보고서에 대한 접근을 인증 받기 위해서만 해당 보안제품을 사용할 수 있습니다. 귀사는 (a) 귀사의 네트워크와 통합될 수 있도록 보안제품을 설정하고, (b) 귀사의 지정사용자들에게 보안 애플리케이션이 제공되는 각 플랫폼(가령, iOS 기기를 위한 애플 앱스토어 및 안드로이드를 위한 구글 플레이 스토어)의 보안 애플리케이션에 당사가 포함시킨 사용조건과 개인정보보호정책에 일치하는 보안 애플리케이션에 대한 사용조건과 개인정보보호정책을 제공할 책임이 있습니다. “보안 애플리케이션”이라 함은 사용자들이 그들의 스마트폰으로 다운로드 할 수 있는 당사가 소유하는 표준 이동통신 보안 소프트웨어 애플리케이션의 iOS 및 안드로이드 버전을 의미하고, 보안 애플리케이션은 당사가 수시로 변경할 수 있습니다. 당사의 보안제품은 시설이나 시스템에 대한 물리적 또는 로지컬 액세스가 지연되거나 실패할 경우 건강 또는 안전을 위협하거나, 재산이나 환경에 대한 손해‧손실 또는 유사한 손해‧손실을 일으키는 물리적 또는 로지컬 액세스를 관리하기 위해 설계된 것이 아니며 그러한 물리적 또는 로지컬 액세스를 관리하기 위하여 사용되어서도 안 됩니다. 나아가 귀사는 응급 상황 시 사용 중인 보안제품을 무시하고 작동될 오작동 가능성이 배제된 안전한 메커니즘(failsafe mechanism)을 제공하지 않는 이상 그러한 액세스를 관리하는데 있어 당사의 보안제품을 사용하지 않기로 합의합니다.

Related to Security Application

  • Uniform application means the current version of the national association of insurance commissioners uniform application for resident and nonresident insurance producer licensing.

  • Third Party Applications means online, Web-based applications and offline software products that are provided by third parties and are identified as third-party applications, including but not limited to those listed on the AppExchange and the Reseller Application.

  • Creation Application means an application by a Participating Dealer for the creation and issue of Units in an Application Unit size (or whole multiples thereof) in accordance with the Operating Guidelines and the Trust Deed.

  • Planning Application means the application for [outline/full] planning permission dated [ ] bearing the Council’s reference number [ ];

  • Mobile Application means a specialized software program downloaded onto a wireless communication device.

  • Account Application or “Application” shall mean the application, as may be amended from time to time, by which this Agreement is established between the Depositor (or following the death of the Depositor, the Beneficiary) and the Custodian. The statements contained therein shall be incorporated into this Agreement.

  • Access Application means an application for Access Rights as described in section 3.7;

  • Fee Application means an application for allowance and payment of a Fee Claim (including Claims for “substantial contribution” pursuant to section 503(b) of the Bankruptcy Code).

  • Intellectual Property Security Agreement means a Copyright Security Agreement, a Patent Security Agreement or a Trademark Security Agreement.

  • Patent Application means an application for patent protection for a CRADA Subject Invention with the United States Patent and Trademark Office (“U.S.P.T.O.”) or the corresponding patent-issuing authority of another nation.

  • FCC Applications means those applications and requests for waivers required to be filed with the FCC to obtain the approvals and waivers of the FCC pursuant to the Communications Act and FCC Rules necessary to consummate the transactions contemplated by this Agreement.

  • SAP Application(s) means all Packages (i.e. all Software and Third Party Software) licensed under the Agreement and/or SAP cloud services for which Customer has a valid subscription, excluding User Interfaces for ERP, SAP Technology Solutions and all database Packages.

  • Request regarding a list of collateral means a record authenticated by a debtor requesting that the recipient approve or correct a list of what the debtor believes to be the collateral securing an obligation and reasonably identifying the transaction or relationship that is the subject of the request.

  • L/C Application means an application and agreement for the issuance or amendment of a Letter of Credit in the form from time to time in use by the L/C Issuer.

  • Intellectual Property Security Agreements has the meaning specified in the Security Agreement.

  • Patent Applications means all published and unpublished nonprovisional and provisional patent applications, reexamination proceedings, invention disclosures and records of invention, applications for certificates of invention and priority rights, in any country and regardless of formal name, including without limitation, substitutions, continuations, continuations-in-part, divisions, renewals, revivals, reissues, re-examinations and extensions thereof.

  • international application means an application filed under this Treaty;

  • Client Application means an application developed by Licensee that a) utilizes the Runtime Product, b) is installed fully on an end user’s machine, with all report processing local to that machine, and c) adds significant and primary functionality to the Runtime Product.

  • Application Process means the online application process under which the Applicant applies for Hospitality Packages on the Webshop.

  • Date of application means the ef- fective date of an Application for Com- pensation filed with A.I.D. pursuant to§ 204.21 of this part.

  • Intellectual Property Security Agreement Supplement means, collectively, any intellectual property security agreement supplement entered into in connection with, and pursuant to the terms of, any Intellectual Property Security Agreement.

  • Project Application means the federal Section 5311 operating assistance project application submitted by the Municipal Corporation to, and as approved by the Commissioner for the Project described in Appendix C of this Agreement, including all project supporting information submitted therewith;

  • Copyright Security Agreement means each Copyright Security Agreement executed and delivered by Grantors, or any of them, and Agent, in substantially the form of Exhibit A.

  • Patent Security Agreement means each Patent Security Agreement executed and delivered by Grantors, or any of them, and Agent, in substantially the form of Exhibit B.

  • Renewal Application means a document used to collect pertinent data for renewal of permits

  • Approval Application means a BLA, NDA or similar application or submission for a Product filed with a Regulatory Authority in a country or group of countries to obtain marketing approval for a biological or pharmaceutical product in that country or group of countries.