Malicious Use of Orphan Glue Records Sample Clauses

Malicious Use of Orphan Glue Records. Registry Operator shall take action to remove orphan glue records (as defined at xxxx://xxx.xxxxx.xxx/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct.
AutoNDA by SimpleDocs
Malicious Use of Orphan Glue Records. Registry Operator shall take action to remove orphan glue records (as defined at xxxx://xxx.xxxxx.xxx/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct. Supported Initial and Renewal Registration Periods 5.2. Initial Registration Periods. Initial registrations of registered names may be made in the registry in one (1) year increments for up to a maximum of ten (10) years. For the avoidance of doubt, initial registrations of registered names may not exceed ten (10) years.
Malicious Use of Orphan Glue Records. XxXXX shall take action to remove orphan glue records when provided with evidence in written form that such records are present in connection with malicious conduct.
Malicious Use of Orphan Glue Records. Registry Operator shall take action to remove orphan glue records (as defined at xxxx://xxx.xxxxx.xxx/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct. Registry Operator will include a provision in its Registry-Registrar Agreement that requires Registrars to include in their Registration Agreements a provision prohibiting Registered Name Holders from distributing malware, abusively operating botnets, phishing, piracy, trademark or copyright infringement, fraudulent or deceptive practices, counterfeiting or otherwise engaging in activity contrary to applicable law, and providing (consistent with applicable law and any related procedures) consequences for such activities including suspension of the domain name. This provision is a Public Interest Commitment (“PIC”). Public Interest Commitments (“PICs”) are part of the contract between ICANN and the Registry Operator and are subject to enforcement by ICANN’s contractual compliance department in the ordinary course of its enforcement activities. The Public Interest Commitments Dispute Resolution Procedure (“PICDRP”) xxxx://xxxxxxxx.xxxxx.xxx/en/applicants/agb/picdrp-19dec13-en.pdf provides a potential alternative or parallel mechanism for a harmed party to pursue remedies, but it does not preclude or limit ICANN from enforcing the PICs through its normal contractual compliance process and timetable. Nothing in the PICDRP limits harmed parties, regulatory authorities or law enforcement from pursuing other available remedies against the party causing harm (whether a Registry Operator, Registrar or registrant), including, for example, pursuing remedies through administrative, regulatory or judicial bodies to seek fines, damages, injunctive relief or other remedies available at law. Registry Operator will periodically conduct a technical analysis to assess whether domains in the TLD are being used to perpetrate security threats, such as pharming, phishing, malware, and botnets. Registry Operator will maintain statistical reports on the number of security threats identified and the actions taken as a result of the periodic security checks. Registry Operator will maintain these reports for the term of the Agreement unless a shorter period is required by law or approved by ICANN, and will provide them to ICANN upon request.

Related to Malicious Use of Orphan Glue Records

  • Use of Data by User Registry Operator will permit user to use the zone file for lawful purposes; provided that (a) user takes all reasonable steps to protect against unauthorized access to and use and disclosure of the data and (b) under no circumstances will Registry Operator be required or permitted to allow user to use the data to, (i) allow, enable, or otherwise support the transmission by email, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than user’s own existing customers, or (ii) enable high volume, automated, electronic processes that send queries or data to the systems of Registry Operator or any ICANN-­‐accredited registrar.

  • Malicious Software 12.1 The Supplier shall, as an enduring obligation throughout the Term, use the latest versions of anti-virus definitions available [from an industry accepted anti-virus software vendor] to check for and delete Malicious Software from the ICT Environment.

  • Cybersecurity; Data Protection The Company’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company has implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect its material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with its business, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same. The Company is presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except where the failure to be in compliance would not, individually or in the aggregate, have a Material Adverse Effect.

  • Description of Vendor Entity and Vendor's Goods & Services If awarded, this description of Vendor and Vendor's goods and services will appear on the TIPS website for customer/public viewing. Full service mechanical and electrical contractors offering professional solutions and services in HVAC, Refrigeration, Piping, Plumbing, Electrical, Controls and Engineering. Primary Contact Name Please identify the individual who will be primarily responsible for all TIPS matters and inquiries for the duration of the contract. Xxxx Xxxxx Primary Contact Title Primary Contact Title Project Manager Primary Contact Email Please enter a valid email address that will definitely reach the Primary Contact. xxxxxx@xxxxxxxxxxxxxx.xxx Primary Contact Phone Numbers only, no symbols or spaces (Ex. 8668398477). The system will auto-populate your entry with commas once submitted which is appropriate and expected (Ex. 8,668,398,477). Please provide the accurate and current phone number where the individual who will be primarily responsible for all TIPS matters and inquiries for the duration of the contract can be reached directly. 0000000000 Primary Contact Fax Numbers only, no symbols or spaces (Ex. 8668398477). The system will auto-populate your entry with commas once submitted which is appropriate and expected (Ex. 8,668,398,477). 1 0 0000000000 Primary Contact Mobile Numbers only, no symbols or spaces (Ex. 8668398477). The system will auto-populate your entry with commas once submitted which is appropriate and expected (Ex. 8,668,398,477). 1 0000000000 Secondary Contact Name Please identify the individual who will be secondarily responsible for all TIPS matters and inquiries for the duration of the contract. Xxxx Xxxxx Secondary Contact Title Secondary Contact Title

  • OWNERSHIP AND USE OF DOCUMENTS 1.3.1 All drawings, specifications, estimates, and all other documents, including shop drawings and calculations, prepared at any time in connection with the Project, shall, upon payment for services in connection therewith, become the sole property of the State.

Time is Money Join Law Insider Premium to draft better contracts faster.