Login Data and Passwords Sample Clauses

The "Login Data and Passwords" clause establishes the rules and responsibilities regarding the use and protection of login credentials within an agreement. It typically requires parties to keep usernames and passwords confidential, restricts sharing of access information with unauthorized individuals, and may outline procedures for reporting compromised credentials. This clause is essential for safeguarding sensitive information and preventing unauthorized access, thereby reducing the risk of data breaches and ensuring the security of digital systems.
Login Data and Passwords. 2.2.1 Access to the Additional Applications requires account registration on the “NEXT Farming” web portal. The use of the full functionality of the Additional Applications requires payment of the corresponding fees. 2.2.2 To protect your account, you are obligated to keep your password and login details confidential. You will further immediately notify FarmFacts if you become aware of any loss or theft of your password or any other unauthorized use of your username and password (or related account). FarmFacts does not and will not inquire as to your password; the password is therefore also to be kept confidential from FarmFacts. You are liable for damages caused by third party use, unless such occurs without negligence on your part. 2.2.3 Should you provide your password or login details to any third party or; should FarmFacts have reason to suspect third party use or misuse of your login details on the “NEXT Farming” web portal or; should FarmFacts have reason to suspect a contractual breach or unlawful conduct by you, FarmFacts reserves the right to deny you further access as set forth in clause 8, either temporarily or permanently, and is entitled to extraordinarily terminate the license agreement and delete your registration as an authorized user. FarmFacts is entitled to restrict your further usage of the Additional Application. Access to the “NEXT Farming” web portal and to the Additional Application will be restored as soon as the suspected illicit use or misuse has been ruled out and/or respective additional security measures (for eg. amendments to login data) have been carried out.
Login Data and Passwords. 2.3.1 To protect your account, you are obligated to keep your password and login details confidential. You will further immediately notify FarmFacts if you become aware of any loss or theft of your password or any other unauthorized use of your username and password (or related account). FarmFacts does not and will not require your password; the password is therefore also to be kept confidential from FarmFacts. 2.3.2 Should you provide your password or login details to any third party or; should FarmFacts have reason to suspect third party use or misuse of your login details on the NEXT Farming Wayline Converter powered by Fuse® platform or; should FarmFacts have reason to suspect a contractual breach or unlawful conduct by you, FarmFacts reserves the right to deny you further access as set forth in clause 8, either temporarily or permanently, and is entitled to extraordinarily terminate the license agreement and delete your registration as an authorized user. FarmFacts is entitled to restrict your further usage of the Software. Access to the NEXT Farming Wayline Converter powered by Fuse® platform will be restored as soon as the suspected illicit use or misuse has been ruled out and/or respective additional security measures (for eg. amendments to login data) have been carried out.
Login Data and Passwords. 2.2.1 Access to the NMM requires account registration on the “NEXT Farming” web portal. In order to register an account, you will be asked to provide certain contact information. By registering you warrant that the information you have provided is accurate. If your contact information or other information related to your account changes, you must notify us promptly and provide current information. 2.2.2 To protect your account, you are obligated to keep your password and login details confidential. You will further immediately notify FarmFacts if you become aware of any loss or theft of your password or any other unauthorized use of your username and password (or related account). FarmFacts does not and will not inquire as to your password; the password is therefore also to be kept confidential from FarmFacts. You are liable for damages caused by third party use, unless such occurs without negligence on your part.
Login Data and Passwords. 2.2.1 The download of the NEXT Farming app is free of charge and provides access to other fee-based FarmFacts services. Access to these fee-based services is subject to a separate ▇▇▇▇ and requires account registration on the “NEXT Farming” web portal as well as a corresponding activation. 2.2.2 To protect your account, you are obligated to keep your password and login details confidential. You will further immediately notify FarmFacts if you become aware of any loss or theft of your password or any other unauthorized use of your username and password (or related account). FarmFacts does not and will not inquire as to your password; the password is therefore also to be kept confidential from FarmFacts. 2.2.3 Should you provide your password or login details to any third party or; should FarmFacts have reason to suspect third party use or misuse of your login details on the NEXT Farming web portal or; should FarmFacts have reason to suspect a

Related to Login Data and Passwords

  • Passwords Passwords are an important aspect of computer security. A poorly chosen password may result in unauthorized access and/or exploitation of Placer County’s resources. All users, including contractors and vendors with access to the County’s systems, are responsible for the creation and protection of passwords and additionally any updates to County Password policies must be followed. Users must not use the same password for Placer County accounts and personal accounts. The reliability of passwords for maintaining confidentiality cannot be guaranteed. Always assume that someone, in addition to the intended or designated recipient, may read any and all messages and files. Any user suspecting that his/her password may have been compromised must, without delay, report the incident to Placer County IT. 10.2.4.1 Passwords must never be shared or disclosed. If a password is accidentally exposed or suspected of exposure, the password should be changed immediately. 10.2.4.2 All passwords must be changed on a specified, periodic basis. 10.2.4.3 Default passwords provided by the vendor for access to applications/systems on the network must be changed to unique and secret passwords. 10.2.4.4 Immediately inform the Information Technology Service Desk when user accounts are no longer required or will not be used for a period of 30 days or more. 10.2.4.5 All accounts not used for 90 days will be automatically disabled.

  • Usernames and Passwords 1. Staff will not share usernames and passwords with anyone, including supervisors and technical support staff. 2. In the event that staff suspect their password is compromised or known to others, staff will change their password and notify their supervisor immediately.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store County PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Security Office.