Key Management Sample Clauses

Key Management. The Content Protection System must protect all CSPs. CSPs shall include, without limitation, all keys, passwords, and other information which are required to maintain the security and integrity of the Content Protection System. CSPs shall never be transmitted in the clear or transmitted to unauthenticated recipients (whether users or devices.
AutoNDA by SimpleDocs
Key Management. Encryption keys are used all around the hosted software application that are used to provide the Service. They are used for secure storage, secure transport, for token generation, and for authentication. The hosted software application used to provide the Service does not utilize a single centralized key-store, for both architecture and security reasons. Different keys are stored by different means in accordance with their availability and security requirements.
Key Management. The Contractor must have measures for managing keys and detecting any compromise/unauthorised access in its key system.
Key Management. Where encryption is utilized, Convercent will maintain a key management process that meets the following minimum requirements:
Key Management. Servicer shall document, implement, and maintain enterprise-class Industry Standard encryption key and seed management procedures to ensure the integrity, security, and retrieval of any applicable Cellco encryption keys or Cellco encrypted data. These procedures should include generating, distributing, storing, changing, recovering, archiving, and destroying encryption keys and the implementation of periodic key rotation, revocation (at least annually or in the event of compromise), and dual knowledge (such that one person does not have the full key for any data encrypted at rest).
Key Management. The death, disability, or failure of either Xxxxxx Xxxxxxxx or Xxxxx Xxxxxxxx at any time to exercise that authority and discharge those management responsibilities with respect to the Borrower as are exercised and discharged by such Persons at the execution of this Agreement, and the failure of the Borrower to appoint a successor reasonably acceptable to the Agent within one hundred twenty (120) days following such cessation.
Key Management. Supplier shall support the use of cryptographic techniques with the practice of key management. All cryptographic keys shall be protected against modification, loss, and destruction. Secret and private keys shall require protection against unauthorized disclosure, and all cryptographic keys shall be limited to the fewest number of custodians necessary. Equipment used to generate, store, and archive keys shall be physically protected, and encryption keys shall be stored separately from encrypted data.
AutoNDA by SimpleDocs
Key Management. The Borrower shall employ individuals in the key management positions of President and Chief Financial Officer (or equivalent officer), and shall use its best efforts to cause such key managers to continue to serve in its respective capacities. In the event of the voluntary or involuntary termination of any key manager for any reason, or the death or incapacity of any key manager, the Borrower shall, as soon as practicable, replace such individual with another qualified manager with comparable management skills and experience in the Borrower's industry.
Key Management. In the event the security of one or more CSS Keys is compromised, whether or not through the fault or negligence of Licensor, a CSS Licensee's sole remedy as against Licensor in this regard shall be to have Licensor issue new CSS Keys as appropriate.
Key Management. No later than 180 days after Xxxxx Xxxxxxx (or any successor approved by the Required Lenders as set forth below) ceases to be the chief executive officer of the Company, retain a new chief executive officer reasonably satisfactory to the Required Lenders. 10.25
Time is Money Join Law Insider Premium to draft better contracts faster.