Security Protocols definition

Security Protocols means the Standard Security Protocol and the Enhanced Security Protocol;
Security Protocols means the security protocols for the Leased Premises and/or the Property set forth on Exhibit 6.2 hereto, as amended or modified by Lessor from time to time, subject to and in accordance with the terms of this Land Lease.
Security Protocols means security process and procedures for information and data contained in the Software and used to provide the Service;

Examples of Security Protocols in a sentence

  • The Client agrees to use software programs developed by third parties including but not limited to the generality of those mentioned above, browser software that supports Data Security Protocols compatible with protocols used by the Company.

  • You agree to use software programs developed by third parties including but not limited to the generality of those mentioned above, browser software that supports Data Security Protocols compatible with protocols used by the Company.

  • The client agrees to use software programs developed by third parties including but not limited to the generality of those mentioned above, browser software that supports Data Security Protocols compatible with protocols used by the Company.

  • All uses of the Services in accordance with the Security Protocols will be deemed to be authorized by and binding on Customer.

  • Bank and Customer shall agree to Security Protocols that must be used in connection with authorized Service(s).

  • Company agrees that it is Company’s and/or Owners responsibility to maintain the security and strict confidentiality of all information and data related to the Agreement, Security Protocols, Login Credentials, Tokens, fees, Bank guides and disclosures, including “Quick Start Guides” and User guides, software and any other piece of proprietary information provide to Company in connection with the Services (“Confidential Service Information”).

  • A major facet of our Information Security Protocols is Company policy and training.

  • Such BCP plan should include, among others, Work from Home arrangements when applicable, in which case Service Provider shall ensure its compliance with pertinent Information Security Protocols and Work from Home Guidelines under this Agreement or as may further advised by Accenture.

  • All Users of the Services in accordance with Security Protocols will be deemed to be authorized by and binding on Company.

  • The final facet of our Information Security Protocols is the Employee Exit process.


More Definitions of Security Protocols

Security Protocols means the security protocols described in Section
Security Protocols means security requirements at the Project site imposed by a Recipient and/or Recipients’ Affiliate’s to safeguard Recipients’ and/or Recipients’ Affiliate’s business operations at the Project site, including but not limited to (a) requiring WEDC and any other third-party entering the Project site to be accompanied at all times by an authorized employee of Recipients and/or Recipients’ Affiliate; (b) requiring visitors to sign a log, provide photo identification acceptable to Recipients and/or Recipients’ Affiliate, and obtain security clearances if required by Recipients and/or Recipients’ Affiliate or their customer(s); (c) restricting access to high-security areas of the Project Location (provided that WEDC shall have access to documentation necessary to validate Recipients’ and/or Recipients’ Affiliate’s compliance with this Agreement); and (d) requiring at least three (3) business dayswritten notice prior to any physical site visit or audit of the Project site or Project.
Security Protocols means the applicable security procedures made available by M&T: (a) for verifying that an Instruction is that of Client; (b) for encrypting or otherwise helping to restrict access to information, the Accounts, or Services, which may include user IDs, passwords, algorithms, or other codes, identifying words or numbers, check stock, tokens, challenge questions, and encryption; or (c) otherwise intended to mitigate fraud risk (e.g., dual authorization).