Security and integrity Sample Clauses

Security and integrity. Staff members shall not knowingly take any action that would compromise the security of any computer, network, or messaging system. This would include the unauthorized release or sharing of passwords and the intentional disabling of any security features of the system. Staff members shall not knowingly take any actions that may adversely affect the integrity, functionality, or reliability of any computer; they may not install, delete, or remove any hardware or software to individual computers, or to the computer network without consent of the Technology Coordinator. Staff members shall report to the Network Administrators or a School District administrator any actions by students that would violate the security or integrity of any computer or network whenever they know of such actions in the normal course of their work duties. This shall not be construed as creating any liability for staff members for the computer-related misconduct of students. APPENDIX F p. 3 of 4 Other examples of inappropriate technology and network behavior will be considered on a case- by-case basis.
AutoNDA by SimpleDocs
Security and integrity. While We endeavour to adhere to best practice policies and procedures to prevent data loss, We do not guarantee that there will be no loss of data and We expressly exclude liability for any loss of data no matter how caused. You must not violate the security of Shake Off in any way. We, or the Administrator, may suspend or cancel Your account or Your access to Shake Off if We suspect any security violation. We may also inform any law enforcement body of any suspected unauthorised or criminal activity. Examples of security violations include:
Security and integrity. You must not violate the security of P2PAgri in any way. We may suspend or cancel Your registration or Your access to P2PAgri if We suspect any security violation. We may also inform any law enforcement body of any suspected unauthorised or criminal activity. Examples of security violations include:
Security and integrity. While We endeavour to adhere to best practice policies and procedures to prevent data loss, We do not guarantee that there will be no loss of data and We expressly exclude liability for any loss of data no matter how caused. You must not violate the security of the Website in any way. We may suspend or cancel Your account or Your access to the Website if We suspect any security violation. We may also inform any law enforcement body of any suspected unauthorised or criminal activity. Examples of security violations include:
Security and integrity. The Group Companies have taken all reasonable precautions to preserve the security and integrity of the Systems and the data and information stored on them and as far as the Sellers are aware there has been no unauthorised access to the Systems or any of the data or information stored on them.
Security and integrity. Pivotal represents and warrants to VMware that any improvements to the Products and Documentation made by Pivotal or on its behalf after the 3rd Restatement Date shall be: (i) of Pivotal’s own creation or within the scope of a license granted to Pivotal, directly or indirectly, by the owner or copyright holder; and (ii) unaltered or tampered with by any third party prior to delivery.
Security and integrity a. All facilities used to store and process Customer’s Data will implement and maintain administrative, physical, technical, and procedural safeguards and industry best practices at a level designed to secure such Data from unauthorized access, destruction, use, modification, or disclosure. Such measures will be no less protective than those used to secure Contractor’s own Data of a similar type, and in no event less than reasonable in view of the type and nature of the Data involved.
AutoNDA by SimpleDocs
Security and integrity. You must not violate the security of Microba in any way. We may suspend or cancel Your account and Your access to Microba, or otherwise terminate Your participation in any Research Project, if We suspect any security violation. We may also inform any law enforcement body of any suspected unauthorised or criminal activity. Examples of security violations include: • attempting to gain unauthorised access to any part of Our servers or system infrastructure You were not intended to have access to; • use Microba in a way that was not intended by Us; • attempting to reverse engineer Microba or any system or offering provided through it; • interfering with or disrupting (or attempting to interfere or disrupt) any servers or networks connected to Microba; • sending or storing any harmful code (including, for example, any computer virus, trojan, worm or other code that is harmful or disabling or which assists in or enables unauthorised access to or corruption of data); or • using any feature of Microba or any other means to send unsolicited commercial correspondence to other Users. Disclaimer of warranties By participating in any Research Project, accessing our Website or otherwise using Microba, to the extent permitted by law You assume all risks associated with such participation, access and use. The Microbiome Services are subject to continuing research, clinical experience, reasonable differences in opinions among authorities, unique aspects of individual situations and the possibility of human error. We cannot promise or guarantee any specific outcomes from Your use of Microba or Your participation in any Research Project. To the extent permitted by law, no representation or warranty (express or implied) is made: • as to the outcomes, currency, completeness, accuracy, reliability, suitability, and/or availability of Microba, any Research Project, the Microbiome Services or Your Microbiome Report (if any); and • that Microba, the Microbiome Services or Your Microbiome Report (if any) will meet your health or medical requirements. Limitation of liability To the maximum extent permitted by law (including the Australian Consumer Law), We (and our directors, employees and agents) do not accept any liability for, and You agree to release us from any claim in relation to any loss, howsoever caused, suffered or incurred by you arising from Your use of Microba or Your participation in any Research Project (including without limitation any Consequential Loss or damage a...
Security and integrity not attempt to undermine the security or integrity of our computing systems or networks (including the Noted System) or, where the Service is hosted by a third party, that third party's computing systems and networks;

Related to Security and integrity

  • Cybersecurity and Data Protection The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate in all material respects for, and operate and perform as required in connection with, the operation of the business of the Company and its Subsidiaries as currently conducted and, to the Company’s knowledge, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with the business of the Company and its Subsidiaries as currently conducted, and, to the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect.

  • Security and Collateral To secure the payment when due of the Notes and all other obligations of the Company under this Agreement or any Rate Hedging Agreement to the Lenders and the Agent, the Company shall execute and deliver, or cause to be executed and delivered, to the Lenders and the Agent Security Documents granting the following:

  • Security and Safeguarding Information (a) Confidential Information that contains Non-Public Personal Information about customers is subject to the protections created by the Xxxxx-Xxxxx-Xxxxxx Act of 1999 (the “Act”) and under the standards for safeguarding Confidential Information, 16 CFR Part 314 (2002) adopted by Federal Trade Commission (“FTC”) (the “Safeguards Rule”). Additionally, state specific laws may regulate how certain confidential or personal information is safeguarded. The parties agree with respect to the Non-Public Personal Information to take all appropriate measures in accordance with the Act, and any state specific laws, as are necessary to protect the security of the Non-Public Personal Information and to specifically assure there is no disclosure of the Non-Public Personal Information other than as authorized under the Act, and any state specific laws, and this Agreement. With respect to Confidential Information, including Non-Public Personal Information and Personally Identifiable Financial Information as applicable, each of the parties agrees that:

  • Preservation and Protection of Collateral (a) The Administrative Agent shall be under no duty or liability with respect to the collection, protection or preservation of the Collateral, or otherwise, beyond the use of reasonable care in the custody and preservation thereof while in its possession.

  • DESCRIPTION OF COLLATERAL AND GUARANTIES Repayment of the Indebtedness is secured by the Collateral as described in the Loan Agreement. Hereinafter, the above-described security documents and guaranties, together with all other documents securing repayment of the Indebtedness shall be referred to as the "Security Documents". Hereinafter, the Security Documents, together with all other documents evidencing or securing the Indebtedness shall be referred to as the "Existing Loan Documents".

  • Perfection and Protection of Security Interest Borrower shall, at its expense, take all actions requested by FINOVA at any time to perfect, maintain, protect and enforce FINOVA's first priority security interest and other rights in the Collateral and the priority thereof from time to time, including, without limitation, (i) executing and filing financing or continuation statements and amendments thereof and executing and delivering such documents and titles in connection with motor vehicles as FINOVA shall require, all in form and substance satisfactory to FINOVA, (ii) maintaining a perpetual inventory and complete and accurate stock records, (iii) delivering to FINOVA warehouse receipts covering any portion of the Collateral located in warehouses and for which warehouse receipts are issued, and transferring Inventory to warehouses designated by FINOVA, (iv) placing notations on Borrower's books of account to disclose FINOVA's security interest therein and (v) delivering to FINOVA all letters of credit on which Borrower is named beneficiary. FINOVA may file, without Borrower's signature, one or more financing statements disclosing FINOVA's security interest under this Agreement. Borrower agrees that a carbon, photographic, photostatic or other reproduction of this Agreement or of a financing statement is sufficient as a financing statement. If any Collateral is at any time in the possession or control of any warehouseman, bailee or any of Borrower's agents or processors, Borrower shall notify such Person of FINOVA's security interest in such Collateral and, upon FINOVA's request, instruct them to hold all such Collateral for FINOVA's account subject to FINOVA's instructions. From time to time, Borrower shall, upon FINOVA's request, execute and deliver confirmatory written instruments pledging the Collateral to FINOVA, but Borrower's failure to do so shall not affect or limit FINOVA's security interest or other rights in and to the Collateral. Until the Obligations have been fully satisfied and FINOVA's obligation to make further advances hereunder has terminated, FINOVA's security interest in the Collateral shall continue in full force and effect.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Authority and Validity He has the capacity and authority to execute, deliver and perform this Agreement and all other agreements and documents he is executing or will execute in connection herewith or therewith.

Time is Money Join Law Insider Premium to draft better contracts faster.