AWS Security Sample Clauses

AWS Security. Without limiting Section 10 or your obligations under Section 4.2, we will implement reasonable and appropriate measures designed to help you secure Your Content against accidental or unlawful loss, access or disclosure.
AutoNDA by SimpleDocs
AWS Security. Without limiting Section 10.3 or Customer’s obligations under Section 4.2, AWS will implement reasonable and appropriate measures for the AWS Network (as determined by AWS) designed to help Customer secure Customer Content against accidental or unlawful loss, access or disclosure.
AWS Security. Section 3.1 (“AWS Security”) of the Agreement is amended to add the following at the end of the section: “Without limiting Section 10 or Customer’s obligations under Section 4, in accordance with the AWS Security Standards, for the AWS GovCloud(US) region AWS will implement reasonable and appropriate measures for the AWS Network designed to: (i) help Customer secure Customer Content against accidental or unlawful loss, access or disclosure; (ii) implement the in-scope Federal Risk and Authorization Management Program (“FedRAMP”) controls for the Services identified as FedRamp compliant; and (iii) maintain physical and logical access controls to limit access to the AWS Network by AWS personnel, including employees and contractors, to U.S. persons, as defined by 22 CFR part 120.15 (“U.S. Persons”) ((i), (ii) and (iii) collectively the “Security Objectives”).”
AWS Security. Without limiting Section 10 or your obligations under Section 4.34.2, you shall keep your Member Account credentials strictly confidential and shall not allow discloser or access to such information to any third parties or any unauthorized End User. AWS has agreed to, without limiting Section 10 or your obligations under Section 4.2, to implement reasonable and appropriate measures designed to help you secure Your Content against accidental or unlawful loss, access or disclosure. We shall not be liable for any failure by AWS to implements such appropriate measures or for any loss, access or disclosure of Your Content, unless caused as a result of our willful act or omission.
AWS Security. Without limiting Section 8 or your obligations under Section 2.2, we will implement reasonable and appropriate measures designed to help you secure Your Content against accidental or unlawful loss, access or disclosure. 1.4 Data Privacy. You may specify the AWS regions in which Your Content will be stored. You consent to the storage of Your Content in, and transfer of Your Content into, the AWS regions you select.
AWS Security. AWS will implement reasonable and appropriate measures for the AWS Network (as determined by AWS) designed to help Customer secure Customer Content against accidental or unlawful loss, access or disclosure (the “Security Objectives”) in accordance with the AWS Security Standards. AWS may modify the AWS Security Standards from time to time, but will continue to provide at least the same level of security as is described in the AWS Security Standards on the Effective Date.

Related to AWS Security

  • JOB SECURITY 23.01 Subject to the willingness and capacity of individual employees to accept relocation and retraining, the Employer will make every reasonable effort to ensure that any reduction in the work force will be accomplished through attrition.

  • Network Security 10.1 Protection of Service and Property. Each Party shall exercise the same degree of care to prevent harm or damage to the other Party and any third parties, its employees, agents or End User Customers, or their property as it employs to protect its own personnel, End User Customers and property, etc.

  • Data Security The Provider agrees to utilize administrative, physical, and technical safeguards designed to protect Student Data from unauthorized access, disclosure, acquisition, destruction, use, or modification. The Provider shall adhere to any applicable law relating to data security. The provider shall implement an adequate Cybersecurity Framework based on one of the nationally recognized standards set forth set forth in Exhibit “F”. Exclusions, variations, or exemptions to the identified Cybersecurity Framework must be detailed in an attachment to Exhibit “H”. Additionally, Provider may choose to further detail its security programs and measures that augment or are in addition to the Cybersecurity Framework in Exhibit “F”. Provider shall provide, in the Standard Schedule to the DPA, contact information of an employee who XXX may contact if there are any data security concerns or questions.

  • Bid Security 2.1 Bid security, as a guarantee of good faith, in the form of a certified check, cashier's check, or bidder's bond, may be required to be submitted with this bid document, as indicated on the bid.

  • Security Notwithstanding anything herein to the contrary, except for Section 27, to the extent requested by Indemnitee and approved by the Board, the Company may at any time and from time to time provide security to Indemnitee for the Company’s obligations hereunder through an irrevocable bank line of credit, funded trust or other collateral. Any such security, once provided to Indemnitee, may not be revoked or released without the prior written consent of Indemnitee.

  • UNION SECURITY 7.01 The Employer shall deduct monthly from the pay due to each employee who is covered by this Agreement a sum equal to the monthly Union dues of each such employee. Where an employee has no earnings during the first payroll period, the deduction shall be made in the next payroll period where the employee has earnings, within that month. The Union shall notify the employer in writing of the amount of such dues from time to time. The Employer will send to the Union its cheque for the dues so deducted in the month following the month in which the dues are deducted. When arrears or adjustments are submitted retroactively, the dues month and an explanation will accompany any such dues.

  • Operations Security Supplier must enable logging and monitoring on all operating systems, databases, applications, and security and network devices that are involved in providing Deliverables. Supplier will maintain anti-malware controls that are designed to protect systems from malicious software, including malicious software that originates from public networks. In addition, Supplier will use anti-malware software (of Industry Standard or better quality), maintain such software at the then current major release, purchase maintenance & support available from the vendor for such software, and promptly implement new releases and versions of such software.

Time is Money Join Law Insider Premium to draft better contracts faster.