Security Profile definition
Examples of Security Profile in a sentence
Company acknowledges and agrees that as between the parties and except for the limited rights granted herein Customer owns all Security Profile Data.
You are responsible for understanding the Service’s features that are granted or disabled either globally or on a per Security Profile basis.
The Confidential Information of Company includes Cyber JumpStart Portal and Confidential Information of Customer includes Security Profile Data.
Customer understands and agrees that by inviting Users, Users will be permitted to (i) manage and review of Security Profile Data for which the User is authorized, (ii) collaborate on Cyber JumpStart Portal, or (iii) demonstrate Customer’s information security capabilities.
You are responsible for disabling or enabling Service features using the Service’s settings page that grants and/or removes features and functionality either globally, per Salesforce Security Profile or even per User.
The MCS should adhere to the Web Services Interoperability Organization Basic Profile version 1.1, and Basic Security Profile version 1.0. The MCS should support multiple languages and multiple currencies.
Bank shall be authorized to act on any and all Freeform or Freetype Payment Orders received through ▇▇▇▇▇▇ Cash, within the limits set forth in the Security Profile Form, that are authenticated in accordance with the Authentication Chart and contain the correct Client ID, Operator ID, and Password.
Company may remove any of Security Profile Data that Company determines to be in violation of the foregoing warranty.
This internal document is not publicly available and is restricted to ensure that the document is consistent with the information contained in the Security Profile, Operations Manual and the Code of Practice for Information Security Management (ISO/IEC 27002:2005) and the Guidelines for Information and Communications Technology Disaster Recovery Services (ISO/IEC 24762:2008).
Except as otherwise required by law, Company will remove, delete, or otherwise destroy all copies of Security Profile Data and Point of Contact Information in its possession as follows: (1) for Customers who have purchased IRJS Retainer, thirty (30) days following termination of this Agreement], and (2) for any Customer who has received a Subscription to any Module as a trial or at no cost, the earlier of thirty (30) days following termination or six (6) months of inactivity on Customer’s account.