Development Security Technical Sample Clauses

Development Security Technical. Implementation Guide (STIG), Version 3 Release 4. 2.3.9 OPNAVINST 5100.27.
AutoNDA by SimpleDocs

Related to Development Security Technical

  • Security Technology When the service is accessed using a supported web browser, Secure Socket Layer (“SSL”), or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall include server authentication and data encryption. Provider shall host data pursuant to the DPA in an environment using a firewall that is periodically updated according to industry standards.

  • Licensed Technology The term “Licensed Technology” shall mean the Licensed Patent Rights, Licensed Know-How and Licensed Biological Materials.

  • Product Technical Support & Maintenance Licensee shall have the option of electing the Product technical support and maintenance (“maintenance”) set forth in the Contract by giving written notice to Contractor any time during the Centralized Contract term. Maintenance term(s) and any renewal(s) thereof are independent of the expiration of the Centralized Contract term and will not automatically renew. Maintenance shall include, at a minimum, (i) the provision of error corrections, updates, revisions, fixes, upgrade and new releases to Licensee, and (ii) Help Desk assistance with locally accessible “800” or toll free, local telephone service, or alternatively on-line Help Desk accessibility. Contractor shall maintain the Products so as to provide Licensee with the ability to utilize the Products in accordance with the Product documentation without significant functional downtime to its ongoing business operations during the maintenance term. Authorized User shall not be required to purchase maintenance for use of Product, and may discontinue maintenance at the end of any current maintenance term upon notice to Contractor. In the event that Authorized User does not initially acquire or discontinues maintenance of licensed Product, it may, at any time thereafter, reinstate maintenance for Product without any additional penalties or other charges, by paying Contractor the amount which would have been due under the Contract for the period of time that such maintenance had lapsed, at then current NYS net maintenance rates.

  • Technical Information The Employer agrees to provide to the Union such information that is available relating to employees in the bargaining unit, as may be required by the Union for collective bargaining purposes.

  • Third Party Technology Customer is hereby notified that third parties have licensed certain technology to Company, which is contained in the Software. Notwithstanding anything herein to the contrary, Customer hereby consents to the disclosure of Customer’s identity, and such other terms of this Agreement as necessary, to such third party licensors for the purpose of enabling Company to comply with the terms and conditions of such third party licenses. Any such Customer information will be provided pursuant to an obligation of confidentiality and nondisclosure at least as stringent as that imposed by this Agreement.

  • Covenants Regarding Patent, Trademark and Copyright Collateral (a) Each Grantor agrees that it will not, nor will it permit any of its licensees to, do any act, or omit to do any act, whereby any Patent which is material to the conduct of such Grantor's business may become invalidated or dedicated to the public, and agrees that it shall continue to xxxx any products covered by a Patent with the relevant patent number as necessary and sufficient to establish and preserve its maximum rights under applicable patent laws.

  • Background Technology List here prior contracts to assign Inventions that are now in existence between any other person or entity and you. [ ] List here previous Inventions which you desire to have specifically excluded from the operation of this Agreement. Continue on reverse side if necessary.

  • Patent Rights The State and the U. S. Department of Transportation shall have the royalty free, nonexclusive and irrevocable right to use and to authorize others to use any patents developed by the Engineer under this contract.

  • Research Use The Requester agrees that if access is approved, (1) the PI named in the DAR and (2) those named in the “Senior/Key Person Profile” section of the DAR, including the Information Technology Director and any trainee, employee, or contractor1 working on the proposed research project under the direct oversight of these individuals, shall become Approved Users of the requested dataset(s). Research use will occur solely in connection with the approved research project described in the DAR, which includes a 1-2 paragraph description of the proposed research (i.e., a Research Use Statement). Investigators interested in using Cloud Computing for data storage and analysis must request permission to use Cloud Computing in the DAR and identify the Cloud Service Provider (CSP) or providers and/or Private Cloud System (PCS) that they propose to use. They must also submit a Cloud Computing Use Statement as part of the DAR that describes the type of service and how it will be used to carry out the proposed research as described in the Research Use Statement. If the Approved Users plan to collaborate with investigators outside the Requester, the investigators at each external site must submit an independent DAR using the same project title and Research Use Statement, and if using the cloud, Cloud Computing Use Statement. New uses of these data outside those described in the DAR will require submission of a new DAR; modifications to the research project will require submission of an amendment to this application (e.g., adding or deleting Requester Collaborators from the Requester, adding datasets to an approved project). Access to the requested dataset(s) is granted for a period of one (1) year, with the option to renew access or close-out a project at the end of that year. Submitting Investigator(s), or their collaborators, who provided the data or samples used to generate controlled-access datasets subject to the NIH GDS Policy and who have Institutional Review Board (IRB) approval and who meet any other study specific terms of access, are exempt from the limitation on the scope of the research use as defined in the DAR.

  • Intellectual Property; Software (a) Schedule 4.12 contains a list and description (showing in each case any product, device, process, service, business or publication covered thereby, the registered or other owner, expiration date and number, if any) of all Copyrights, Patent Rights and Trademarks owned by, licensed to or used by the Company.

Time is Money Join Law Insider Premium to draft better contracts faster.