Aegis Sample Clauses

The 'Aegis' clause serves as a protective provision within a contract, designed to shield one or more parties from specific risks or liabilities. In practice, this clause may outline the circumstances under which a party is indemnified or held harmless, such as in cases of third-party claims or unforeseen damages. By clearly defining the scope and limitations of protection, the Aegis clause helps allocate risk and provides assurance to the protected party, thereby reducing potential disputes and fostering confidence in the contractual relationship.
Aegis. A new Section 2.2(l) of the Loan Agreement is hereby added as follows:
Aegis. AEGIS [28] is a cryptographic technique belong- ing to the category of authenticated encryption with associated data (AEAD). Its design is tailored to suit resource-limited devices as well as high-performance computing applications. Its unique features include its lightweight, robustness, inverse- free and online nature. The encryption process of AEGIS can be symbolically expressed as follows: {CTi, MACi} = EK(IV, AD, PTi), where CTi stands for the resulting ciphertext, MACi is the authentication tag, IV represents the initialization vector, AD refers to the associated data, K denotes the shared key, and TABLE I: Notations and descriptions Notation Description TA trusted registration authority Ui ith user device U Di, M CNj, SDk ith user device, jth MCN, kth smart sensing IDi, P Wi Identity and password of user Ui SIDe, SPe ▇▇▇▇▇▇▇▇▇▇▇▇ identity and secret parameter of the communication entity e ▇▇▇▇, ▇▇▇▇ Current and previous pseudonymous identities ri ith random number utilized in AKA phase Xj The jth intermediate result computed during AKA phase Na, Nb Two parts obtained by equally dividing notation The ith initialization vector, associated data and PTi represents the plaintext to be encrypted. Additionally, the decryption process of AEGIS is described as follows: ▇▇▇, ADi, P Ti plaintext used in the AKA phase The ith ciphertext and its corresponding authen- {PT , ⊥} = D (IV, AD, CT , MAC ) i i tication Tag in AKA phase i K i i ith timestamps utilized in AKA phase Specifically, in the decryption process, AEGIS takes as input the (CTi, MACi) pair generated during encryption, along with (IV, AD, K), and computes a new authentication tag Ti∗ (Ce, Re) ith timestamps upon message receipt Challenge-response pair of the communication entity e MAC′ based on the received (IV, AD, K, CTi) through the decryption function. It then verifies whether MAC′ = MAC . If the verification of MACi fails, an error is triggered; Otherwise, the plaintext PTi is retrieved. These features make AEGIS an ideal primitive for our scheme, as it simplifies the authentication scheme, reduces complexity and enhances the overall security of the system.‌
Aegis. 9.1.1 Aegis will comply, and will contractually require any and all Contract Manufacturers to comply, with all present and future Laws applicable to the manufacture and supply of Materials, including, without limitation, applicable GMP or other regulations promulgated from time to time by the FDA, defect notifications, and any other registration requirements that may be imposed on the manufacture of Materials. Aegis represents and warrants to Opiant that all Materials supplied hereunder shall: (a) be manufactured, tested, labeled, packaged, stored, handled, and shipped in conformance with GMP and all applicable Laws; (b) be manufactured, tested, labeled, packaged, stored, handled, and shipped in conformance with the applicable Specifications; (c) be free and clear of all liens, security interests and other encumbrances; and (d) have a shelf life of not less than three (3) years at the time delivered to Opiant or its designee. Confidential Treatment has been requested for portions of this exhibit. The copy filed herewith omits the information subject to the confidentiality request. Omissions are designated as “****”. A complete version of this exhibit has been filed separately with the Securities and Exchange Commission. 9.1.2 Aegis represents, warrants, and covenants to Opiant that: (a) Aegis holds and will hold, and is operating and will operate in compliance with, any and all exceptions, permits, licenses, franchises, authorizations and clearances of the FDA and/or any other governmental authority required in connection with the development to date of the Excipient(s), (b) Aegis is not debarred or suspended under 21 U.S.C. §335(a) or (b) or comparable Laws in any other jurisdiction; (c) there are no actual or, to Aegis’ knowledge, threatened enforcement actions by the FDA or any other federal, state, or foreign Regulatory Authority which has jurisdiction over Aegis’ operations or products, including, without limitation, any fines, injunctions civil or criminal penalties, investigations, debarments, or suspensions; (d) Aegis has not received any warning letters or written correspondence from the FDA and/or any other governmental authority requiring the termination, suspension or modification of any clinical or pre-clinical studies or tests with respect to the Excipient(s); and (e) as of the Effective Date, there are no actual or, to the knowledge of Aegis, threatened enforcement actions relating to any Excipient by the FDA or any other governmental author...

Related to Aegis

  • Cornerstone shall use its best efforts to register or qualify such shares under such other securities or "blue sky" laws of such jurisdictions as the LLC reasonably requests and do any and all other acts and things which may be reasonably necessary or advisable to enable the LLC to consummate the disposition in such jurisdictions of the Registered Shares (provided that Cornerstone shall not be required to (i) qualify generally to do business in any jurisdiction in which it would not otherwise be required to qualify but for this Section 6.9, (ii) subject itself to taxation in any such jurisdiction, or (iii) consent to general service of process in any such jurisdiction).

  • Asset Management Supplier will: i) maintain an asset inventory of all media and equipment where Accenture Data is stored. Access to such media and equipment will be restricted to authorized Personnel; ii) classify Accenture Data so that it is properly identified and access to it is appropriately restricted; iii) maintain an acceptable use policy with restrictions on printing Accenture Data and procedures for appropriately disposing of printed materials that contain Accenture Data when such data is no longer needed under the Agreement; iv) maintain an appropriate approval process whereby Supplier’s approval is required prior to its Personnel storing Accenture Data on portable devices, remotely accessing Accenture Data, or processing such data outside of Supplier facilities. If remote access is approved, Personnel will use multi-factor authentication, which may include the use of smart cards with certificates, One Time Password (OTP) tokens, and biometrics.

  • Prudential Bache Securities Inc. ("Prudential-Bache"), a registered broker-dealer, (ii) The Prudential Insurance Company of America ("Prudential"), (iii) Pruco Securities Corporation, a registered broker-dealer, (iv) any Prudential-Bache or Prudential subsidiary or affiliate duly registered as a broker-dealer and/or a transfer agent pursuant to the 1934 Act or (vi) any other Prudential-Bache or Prudential affiliate or subsidiary; provided, however, that PMFS shall be as fully responsible to the Fund for the acts and omissions of any agent or subcontractor as it is for its own acts and omissions.

  • Investment Management If and to the extent requested by the Advisor, the Sub-Advisor shall, subject to the supervision of the Advisor, manage all or a portion of the investments of the Portfolio in accordance with the investment objective, policies and limitations provided in the Portfolio's Prospectus or other governing instruments, as amended from time to time, the Investment Company Act of 1940 (the "1940 Act") and rules thereunder, as amended from time to time, and such other limitations as the Trust or Advisor may impose with respect to the Portfolio by notice to the Sub-Advisor. With respect to the portion of the investments of the Portfolio under its management, the Sub-Advisor is authorized to make investment decisions on behalf of the Portfolio with regard to any stock, bond, other security or investment instrument, and to place orders for the purchase and sale of such securities through such broker-dealers as the Sub-Advisor may select. The Sub-Advisor may also be authorized, but only to the extent such duties are delegated in writing by the Advisor, to provide additional investment management services to the Portfolio, including but not limited to services such as managing foreign currency investments, purchasing and selling or writing futures and options contracts, borrowing money or lending securities on behalf of the Portfolio. All investment management and any other activities of the Sub-Advisor shall at all times be subject to the control and direction of the Advisor and the Trust's Board of Trustees.

  • Management Company The UCITS and its Sub-Funds are managed by the Management Company, in accordance with this Unit Trust Agreement for the account, and in the sole interest, of the Unitholders. In accordance with the applicable laws and regulations and this Unit Trust Agreement, the Management Company is entitled to dispose of the assets of the UCITS / Sub-Funds and to exercise any and all rights thereunder.