Information and Communication Technology Products that Use Cryptography Sample Clauses

Information and Communication Technology Products that Use Cryptography. The Parties affirm their level of commitments relating to Information and Communication Technology products that use cryptography, in particular, but not exclusively:
AutoNDA by SimpleDocs
Information and Communication Technology Products that Use Cryptography. 1. For the purposes of this Article:
Information and Communication Technology Products that Use Cryptography. 1. For the purposes of this Article: cryptographic algorithm or cipher means a mathematical procedure or formula for combining a key with plaintext to create a ciphertext; cryptography means the principles, means or methods for the transformation of data in order to hide its information content, prevent its undetected modification or prevent its unauthorised use; and is limited to the transformation of information using one or more secret parameters, for example, crypto variables, or associated key management; encryption means the conversion of data (“plaintext”) into a form that cannot be easily understood without subsequent re-conversion (“ciphertext”) through the use of a cryptographic algorithm; and
Information and Communication Technology Products that Use Cryptography. 1. For the purposes of this Article: cryptographic algorithm or cipher means a mathematical procedure or formula for combining a key with plaintext to create a ciphertext; cryptography means the principles, means or methods for the transformation of data in order to hide its information content, prevent its undetected modification or prevent its unauthorised use; and is limited to the transformation of information using one or more secret parameters, for example, crypto variables, or associated key management; encryption means the conversion of data (“plaintext”) into a form that cannot be easily understood without subsequent re-conversion (“ciphertext”) through the use of a cryptographic algorithm; and key means a parameter used in conjunction with a cryptographic algorithm that determines its operation in such a way that an entity with knowledge of the key can reproduce or reverse the operation, while an entity without knowledge of the key cannot.

Related to Information and Communication Technology Products that Use Cryptography

  • Information Technology The following applies to all contracts for information technology commodities and contractual services. “Information technology” is defined in section 287.012(15), F.S., to have the same meaning as provided in section 282.0041, F.S.

  • Information and communication The Parties shall support the development of modern methods of information handling, including the media, and stimulate the effective mutual exchange of information. Priority shall be given to programmes aimed at providing the general public with basic information about the Community and the Republic of Azerbaijan, including, where possible, access to databases, in full respect of intellectual property rights.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Sales Material, Information and Trademarks 6.1 For purposes of this Section 6, "Sales literature or other Promotional material" includes, but is not limited to, portions of the following that use any logo or other trademark related to the Trust, or Underwriter or its affiliates, or refer to the Trust: advertisements (such as material published or designed for use in a newspaper, magazine or other periodical, radio, television, telephone or tape recording, videotape display, signs or billboards, motion pictures, electronic communication or other public media), sales literature (i.e., any written communication distributed or made generally available to customers or the public, including brochures, circulars, research reports, market letters, form letters, seminar texts, reprints or excerpts or any other advertisement, sales literature or published article or electronic communication), educational or training materials or other communications distributed or made generally available to some or all agents or employees in any media, and disclosure documents, shareholder reports and proxy materials.

  • INFORMATION AND DATA 21.1 At all times during the subsistence of this Agreement the duly authorized representatives of each Participant shall, at its and their sole risk and expense and at reasonable intervals and times, have access to the Property and to all technical records and other factual engineering data and information relating to the Property which is in the possession of the Operator.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • PROHIBITION ON CERTAIN TELECOMMUNICATIONS AND VIDEO SURVEILLANCE SERVICES OR EQUIPMENT To the extent applicable, Supplier certifies that during the term of this Contract it will comply with applicable requirements of 2 C.F.R. § 200.216.

  • Vendor Logo (Supplemental Vendor Information Only) No response Optional. If Vendor desires that their logo be displayed on their public TIPS profile for TIPS and TIPS Member viewing, Vendor may upload that logo at this location. These supplemental documents shall not be considered part of the TIPS Contract. Rather, they are Vendor Supplemental Information for marketing and informational purposes only. Bid Attributes Disadvantaged/Minority/Women Business & Federal HUBZone Some participating public entities are required to seek Disadvantaged/Minority/Women Business & Federal HUBZone ("D/M/WBE/Federal HUBZone") vendors. Does Vendor certify that their entity is a D/M/WBE/Federal HUBZone vendor? If you respond "Yes," you must upload current certification proof in the appropriate "Response Attachments" location. NO Historically Underutilized Business (HUB) Some participating public entities are required to seek Historically Underutilized Business (HUB) vendors as defined by the Texas Comptroller of Public Accounts Statewide HUB Program. Does Vendor certify that their entity is a HUB vendor? If you respond "Yes," you must upload current certification proof in the appropriate "Response Attachments" location. No National Coverage Can the Vendor provide its proposed goods and services to all 50 US States? Yes

  • Product Information Contractor shall provide the following information for all goods provided pursuant to this Agreement: manufacturer’s name, product code number, and pack size.

  • CONFIDENTIAL, PROPRIETARY, AND TRADE SECRET INFORMATION AND MATERIALS a. Buyer and Seller shall each keep confidential and protect from unauthorized use and disclosure all (i) confidential, proprietary and/or trade secret information of a Party or third party disclosed by a Party; (ii) software provided under this Contract in source code form or identified as subject to this Article; and (iii) tooling identified as subject to this Article: in each case that is obtained, directly or indirectly, from the other in connection with this Contract or Buyer’s contract with its customer, if any, (collectively referred to as "Proprietary Information and Materials"). Proprietary Information and Materials excludes information that is, as evidenced by competent records provided by the receiving Party, known to the receiving party or lawfully in the public domain, in the same form as disclosed hereunder, disclosed to the receiving Party without restriction by a third party having the right to disclose it, or developed by the receiving Party independently without use of or reference to the disclosing Party’s Proprietary Information and Materials.

Time is Money Join Law Insider Premium to draft better contracts faster.