Encryption Technology Clause Samples

POPULAR SAMPLE Copied 1 times
Encryption Technology. The Company's Business as currently conducted complies with all U.S. applicable Laws, rules and regulations regarding encryption technology, including, without limitation, the import and export thereof. All CCAT's received by the Company are listed on Section 5.13(m) of the Company Disclosure Schedule.
Encryption Technology. At least 128-bit encryption technology or its equivalent. - Individual User IDs and Passwords. Each person accessing the Business Online Service must have a User ID and individual Password. - Tokens. When our ACH Origination Service, Wire Transfer Service and/or Bill Payment Service are approved for use by you, an additional required security procedure incorporates use of a separate security device or token (“Token”) which generates a One-Time-Password for log-in functionality. A Token provides an additional layer of security and will be issued to authorized user(s) for use in gaining access to the above-described features and/or modules associated with the Services. Tokens may also be made available to you for use with other features of the Services upon request.
Encryption Technology. Institution and Investigator undertake to protect Sponsor Confidential Information (including but not limited to patent- relevant, scientific or technical information) against unauthorized access by third parties. If Sponsor Confidential Information is communicated via Internet Mail, use of Internet Mail Encryption Technology is compulsory (for direct communication between the Parties, Sponsor provides for a suitable technology at ▇▇▇▇://▇▇▇▇▇▇.▇▇▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇▇.▇▇▇ free of charge). 5.6
Encryption Technology. The Receiving Party undertakes to protect Confidential Information (including but not limited to patent-relevant, scientific or technical information) against unauthorized access by third parties. If Confidential Information is communicated via Internet Mail, use of Internet Mail Encryption Technology is compulsory (for direct communication between the Parties, BOEHRINGER provides for a suitable technology at ▇▇▇▇://▇▇▇▇▇▇.▇▇▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇▇.▇▇▇ free of charge).
Encryption Technology. The Company Business as currently conducted and as currently proposed to be conducted complies with all Applicable Laws, rules and regulations, whether domestic or foreign, regarding encryption technology, including, without limitation, the import and export thereof.
Encryption Technology. The Bank uses encryption technology to secure your connection. When you go to the Bank's website, you will see a secure padlock icon displayed if you have established a secure connection with the Bank. When the secure padlock icon properly displays, the information passed between your computer and the online banking server is encrypted in an effort to protect your private information. If you do not see a secure padlock icon, the website you have found may be a copycat website that was created by a fraudster to obtain your personal information. Do not input your username, password, answers to security questions or any other personal information. Close the Internet browser and immediately contact the Bank by telephone.
Encryption Technology. The Company and its Subsidiaries do not use or develop or engage in encryption technology or other technology whose development, commercialization or export is restricted under applicable Laws in Israel, and are not required to obtain a marketing, registration, export license or other relevant license from any of the Israeli Ministry of Economy, the Israeli Ministry of Defense, or any authorized body pursuant to Section 2(a) of the Israeli Control of Products and Services Declaration (Engagement in Encryption), 1974, as amended.
Encryption Technology. The Company does not currently develop, and has not to date developed, encryption technology or products with encryption technology, technology with military applications, or other encryption technology, the development, commercialization or export of which is restricted under any applicable Legal Requirement or which would require the Company to obtain a Permit from the Israeli Ministry of Defense or any other authorized body thereof pursuant to Section 2(a) of the Control of Products and Services Declaration (Engagement in Encryption) 1974, as amended, or the Control of Products and Services Order (Export of Warfare Equipment and Defense Information) 1991, as amended.
Encryption Technology. Institution and Investigator undertake to protect Sponsor Confidential Information (including but not limited to patent- 5.6
Encryption Technology. 31 2.38 Hart-▇▇▇▇▇-▇▇▇▇▇▇ ▇▇▇pliance...................................................................31 2.39 Grants.........................................................................................31