Secure Data Sample Clauses

Secure Data. The Operator shall ensure the authentication, integrity, and reliability of the data in performing the IANA Numbering Services.
AutoNDA by SimpleDocs
Secure Data. The Contractor shall ensure the authentication, integrity, and reliability of the data in performing each of the IANA functions.
Secure Data. After an agreed upon time frame by the City of Bend, data must be securely erased using Department of Defense (DoD) standards.
Secure Data. Given the nature of the internet, we cannot guarantee that any data transmission is totally secure. Whilst we take precautions to protect information, we do not warrant and cannot ensure the security of any information you transmit to us. You therefore transmit to this Website at your own risk. However, once we receive your transmission, we will take reasonable steps to preserve its security.
Secure Data. The transmission of data over the internet cannot be guaranteed as totally secure. You acknowledge and agree that use of the Internet and access to the website is solely at Your own risk. While INSOURCES has endeavoured to create a secure and reliable website, INSOURCES does not warrant and cannot ensure the security of any information transmitted to us and any information You transmit to us. Accordingly, INSOURCES is not responsible for the security of any information transmitted to or from the website. You must take your own precautions to ensure that the process You use to access this website does not expose You to viruses or other form of interference which may access Your information and may damage Your computer system. Any information You transmit to us is at Your own risk. If You wish to communicate with INSOURCES through other means, please contact INSOURCES at xxxx@xxxxxxxxx.xxx.xx or +00 0000 000 000

Related to Secure Data

  • Contractor Information The Contractor will provide up to date information for each of the following in the form and manner specified by OGS:

  • Usage Data 7.1. The parties shall supply data on usage of the Licensed Work that is available to them during the term of this Licence. Notwithstanding the foregoing, the parties shall neither assemble nor provide data from which an individual user could be identified.

  • Client Data The Subrecipient shall maintain client data demonstrating client eligibility for services provided. Such data shall include, but not be limited to, client name, address, income level or other basis for determining eligibility, and description of service provided. Such information shall be made available to Grantee monitors or their designees for review upon request.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Duty to Provide Secure Data The Contractor will maintain the security of State of Florida data including, but not limited to, a secure area around any displayed visible data. The Contractor will also comply with all HIPAA requirements and any other state and federal rules and regulations regarding security of information.

  • Your Data Subject to the limited rights granted by You hereunder, We acquire no right, title or interest from You or Your licensors under this Agreement in or to Your Data, including any intellectual property rights therein.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Contractor Services Emerald has contracted, on an exclusive basis, with official contractors to provide certain services for the Event. Service companies other than the official contractors will not be allowed to perform any of these exclusive services. Non-exclusive services may be performed by exhibitor-appointed contractors (“EACs”) within certain guidelines. Please refer to the Exhibitor Service Manual for a listing of exclusive services and EAC guidelines.

  • Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.

  • Exception Where Databases Contain Sufficient Information A Reporting Financial Institution is not required to perform the paper record search described in subparagraph D.2. of this section if the Reporting Financial Institution’s electronically searchable information includes the following:

Time is Money Join Law Insider Premium to draft better contracts faster.