Cyber Intelligence Sample Clauses

Cyber Intelligence. Even less likely than cyber warfare to become a subject of international agreement is the use of cyber capacities by states for intelligence collection. Intelligence activities have long been and will continue 45Convention on International Civil Aviation, December 7, 1944. 194 PROCEEDINGS OF A WORKSHOP ON DETERRING CYBERATTACKS to be conducted or sponsored by states subject only to national constraints. Informal understandings designed to avoid damaging cyber (or other) infrastructure may be possible between intelligence agen- cies of states, especially allies. But such understandings—or other agreements addressed to intelligence collection—are unlikely subjects of multilateral negotiations. A different problem is posed by efforts of non-state actors to intrude upon and collect intelligence from government or private sources. Such intrusions seem an appropriate subject for international discussions. States may be able to fashion common norms and rules to restrict such conduct, at least in specified situations. Most if not all states have laws that prohibit private individuals from attacking other states without government approval. Such conduct appears in fact from the literature on cyber security to be common and troublesome. Efforts to penetrate private companies for commercial purposes may also be a subject that most if not all states will be willing to address, though where such efforts are officially sanctioned they are likely to be off the negotiating agenda.
AutoNDA by SimpleDocs
Cyber Intelligence. Its specialized systems, software and analytics address sophisticated cyber space threats by creating a unique blend of proprietary intelligence techniques and advanced computer network solutions. It is developing a suite of high capacity network monitoring products to provide deep packet inspection to protect against the threat of cyber attacks. These complex systems identify and localize illicit activity on communication networks and provide the analysis and visualization tools necessary to produce meaningful results in time to make a difference. • Tactical COMINT. Its tactical COMINT solutions include deployment of ground-based and airborne payloads for the detection, identification, location, and tracking of mobile communications and weapons systems. The AST product portfolio includes man-portable, airborne, remote/unattended, and system-level solutions for both strategic and tactical missions. Its systems are wideband digital systems that utilize signal processing technology to deliver superior performance against conventional and modern signals, even in the most challenging signal environments.

Related to Cyber Intelligence

  • Data Integrity Contractor shall implement policies and procedures reasonably intended to ensure that Protected Health Information and Personally Identifiable Information in its possession is complete, accurate, and current, to the extent necessary for the Contractor’s intended purposes, and has not been altered or destroyed in an unauthorized manner.

  • Data Access Services State Street agrees to make available to the Fund the Data Access Services subject to the terms and conditions of this Addendum and such data access operating standards and procedures as may be issued by State Street from time to time. The Fund shall be able to access the System to (i) originate electronic instructions to State Street in order to (a) effect the transfer or movement of cash or securities held under custody by State Street or (b) transmit accounting or other information (the transactions described in (i)(a) and (i)(b) above are referred to herein as “Client Originated Electronic Financial Instructions”), and (ii) access data for the purpose of reporting and analysis, which shall all be deemed to be Data Access Services for purposes of this Addendum.

  • Shareholder Internet Services The Transfer Agent shall provide internet access to the Fund’s shareholders through a designated web site (“Shareholder Internet Services”), which will be accessed by the Fund’s shareholders via a link on the Fund’s web site. The Shareholder Internet Services will be provided pursuant to established procedures and will allow shareholders to view their account information and perform certain on-line transaction request capabilities. The Shareholder Internet Services shall be provided at no additional charge, other than the transaction fees currently being charged for the different transactions as described on the Fee Schedule. The Transfer Agent reserves the right to charge a fee for this service in the future.

  • Data Acquisition The acquisition of data to realistically simulate the electrical behavior of system components is a fundamental requirement for the development of a reliable interconnected transmission system. Therefore, the TSP and the Generator shall be required to submit specific information regarding the electrical characteristics of their respective facilities to each other as described below in accordance with ERCOT Requirements.

  • Call Center Services Answer telephone inquiries during mutually agreed upon hours each day on which the Fund is open for trading. In the event that the Fund plans to be open on a business day when the New York Stock Exchange is to be closed, the Fund shall provide the Transfer Agent with reasonable advance notice and the parties shall discuss the call center resources available for such day. The Transfer Agent shall answer and respond to inquiries from existing Shareholders, prospective Shareholders of the Fund and broker-dealers on behalf of such Shareholders in accordance with the instructions provided by the Fund to the Transfer Agent for purpose of fulfilling its duties under this Agreement, including, accepting transaction requests on behalf of the Fund.

  • Technology Access Fee After the Effective Date, within [***] days after receipt of the corresponding invoice from Mersana, Merck will pay to Mersana, a one-time, non-refundable, non-creditable, upfront fee of Twelve Million Dollars ($12,000,000.00) (the [***] Portions of this exhibit have been redacted pursuant to a confidential treatment request. An unredacted version of this exhibit has been filed separately with the Commission. “Technology Access Fee”). Payment of the Technology Access Fee shall be subject to any withholding Tax obligations set forth in Section 6.9.1.

  • Acquisition Services (i) Serve as the Company’s investment and financial advisor and provide relevant market research and economic and statistical data in connection with the Company’s assets and investment objectives and policies;

Time is Money Join Law Insider Premium to draft better contracts faster.