Key aspects of the Threat Intelligence Sharing Platform Sample Clauses

Key aspects of the Threat Intelligence Sharing Platform. 10.2.2.1 Updated database of known threats and mitigation One advantage of MISP is the possibility to import threats and alerts from remote sources in an easy way. MISP allows to connect with other MISP communities, such as the CIRCL community, that is very active on MISP. It also provides a Python library, PyMISP, that allows to import threats and alerts automatically from other sources that are not using MISP, such as the ICS-CERT, the United States CERT for Critical Infrastructures that uses STIX. This feature will allow to the CHIRP4RAIL to be aware of last threats and vulnerabilities in IT/OT reported by public and private organisations.
AutoNDA by SimpleDocs

Related to Key aspects of the Threat Intelligence Sharing Platform

  • Commingling of Resold Services with Unbundled Network Elements and Combinations of Unbundled Network Elements 6.7.1 To the extent it is Technically Feasible and pursuant to the terms of Section 9.1, CLEC may Commingle Telecommunications Services purchased on a resale basis with an Unbundled Network Element or combination of Unbundled Network Elements.

  • Joint Network Implementation and Grooming Process Upon request of either Party, the Parties shall jointly develop an implementation and grooming process (the “Joint Grooming Process” or “Joint Process”) which may define and detail, inter alia:

  • PRESERVATION OF CONTRACTING INFORMATION 2.27.1 The requirements of Subchapter J, Chapter 552, Texas Government Code, may apply to this Agreement and the Contractor agrees that this Agreement can be terminated if the Contractor knowingly or intentionally fails to comply with a requirement of that subchapter. If the requirements of Subchapter J, Chapter 552, Texas Government Code, apply to this Agreement, then for the duration of this Agreement (including the initial term, any renewal terms, and any extensions), Contractor shall preserve all Contracting Information, as defined by Section 552.003 of the Texas Government Code, related to this Agreement as provided by the records retention requirements applicable to the City pursuant to federal or state law or regulation, city ordinance or city policy, which record retention requirements include but are not limited to those set forth in Chapters 201 and 205 of the Texas Local Government Code and Texas Administrative Code Title 13, Chapter 7. Within five business days after receiving a request from the Director, Contractor shall provide any Contracting Information related to this Agreement that is in the custody or possession of Contractor. Upon the expiration or termination of this Agreement, Contractor shall, at the Director’s election, either (a) provide, at no cost to the City, all Contracting Information related to this Agreement that is in the custody or possession of Contractor, or (b) preserve the Contracting Information related to this Agreement as provided by the records retention requirements applicable to the City pursuant to federal or state law or regulation, city ordinance or City policy.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Accessibility of Web-Based Information and Applications For State Agency Authorized User Acquisitions: Any web-based information and applications development, or programming delivered pursuant to the contract or procurement, will comply with New York State Enterprise IT Policy NYS-P08-005, Accessibility of Web-Based Information and Applications as follows: Any web-based information and applications development, or programming delivered pursuant to the contract or procurement, will comply with New York State Enterprise IT Policy NYS-P08- 005, Accessibility of Web-Based Information and Applications as such policy may be amended, modified or superseded, which requires that state agency web-based information and applications are accessible to persons with disabilities. Web-based information and applications must conform to New York State Enterprise IT Policy NYS-P08-005 as determined by quality assurance testing. Such quality assurance testing will be conducted by the State Agency Authorized User and the results of such testing must be satisfactory to the Authorized User before web-based information and applications will be considered a qualified deliverable under the contract or procurement.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • Contractor Certification regarding Business with Certain Countries and Organizations Pursuant to Subchapter F, Chapter 2252, Texas Government Code], Contractor certifies Contractor is not engaged in business with Iran, Sudan, or a foreign terrorist organization. Contractor acknowledges this Agreement may be terminated and payment withheld if this certification is inaccurate.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Internet Access to Contract and Pricing Information Access by Authorized Users to Contract terms and pricing information shall be made available and publically posted on the OGS website. To that end, OGS shall publically post the Contract Pricelist, including all subsequent changes in the Contract offerings (adds, deletes, price revisions), Contractor contact information, and the Contract terms and conditions, throughout the Contract term.

  • The Contracts (Rights of Third Parties) Xxx 0000 A person who is not party to this Contract has no right under the Contracts (Rights of Third Parties) Xxx 0000 to enforce any term of this Contract but this does not affect any right or remedy of any person which exists or is available otherwise than pursuant to that Act.

Time is Money Join Law Insider Premium to draft better contracts faster.