Private Key Generation Sample Clauses

Private Key Generation. The Subscriber must keep all Private Keys confidential and use reasonable measures to protect the Private Key from disclosure. The Subscriber must request revocation of the Certificate within one working day of any suspected misuse or compromise of a Certificate or Private Key. The Subscriber must generate its key pair using one of the following methods: (i) inside a secure hardware token, (ii) using trustworthy cryptographic software on a local computer system where it is the sole user and administrator, (iii) on a computer system administered by its sponsor or a third party if (a) the key material is generated using trustworthy cryptographic software, (b) access is limited to designated individuals, who are subject to and aware of applicable privacy rules and a professional code of conduct, (c) the private key and pass phrase are not sent in clear text over a network, (d) the encrypted private key file is not sent over the network unprotected, (e) the system is located in a secure environment, where access is controlled and limited to only authorized personnel, and (f) a system does not persistently keep pass phrases or plain text private keys for longer than 24 hours.
Private Key Generation. For i = 1, 2, the legitimate re- ceiver, Y , upon observing the channel output yn, chooses tn(mt ) such that = nI(X1Q, X2Q, SQ; YQ, TQ|ZQ, Q) + 2ns i i = nI(X1Q, X2Q, SQ; YQ, TQ|ZQ) + 2ns (43)
Private Key Generation. The Subscriber must keep all Private Keys confidential and use reasonable measures to protect the Private Key from disclosure. The Subscriber must request revocation of the Certificate within one working day of any suspected misuse or compromise of a Certificate or Private Key. The Subscriber must generate its key pair using one of the following methods: (i) inside a secure hardware token, (ii) using trustworthy cryptographic software on a local computer system where it is the sole user and administrator, (iii) on a computer system administered by its sponsor or a third party if (a) the key material is generated using trustworthy cryptographic software, (b) access is limited to designated individuals, who are subject to and aware of applicable privacy rules and a professional code of conduct, (c) the private key and pass phrase are not sent in clear text over a network, (d) the encrypted private key file is not sent over the network unprotected,
Private Key Generation. You shall generate your Key Pair using one of the following methods: a. Inside a secure hardware token; b. Using trustworthy cryptographic software on a local computer system where You are the sole user and administrator; c. On a computer system administered by your sponsor or a third party if: i. The key material is generated using trustworthy cryptographic software, ii. Access is limited to designated individuals who are subject to and aware of applicable privacy rules and a professional code of conduct, iii. The private key and pass phrase are not sent in clear text over a network, iv. The encrypted private key file is not sent over the network unprotected, v. The system is located in a secure environment, where access is controlled and limited to only authorized personnel, and vi. A system does not persistently keep pass phrases or plain text private keys for longer than 24 hours; or

Related to Private Key Generation

  • Statewide HUB Program Statewide Procurement Division Note: In order for State agencies and institutions of higher education (universities) to be credited for utilizing this business as a HUB, they must award payment under the Certificate/VID Number identified above. Agencies, universities and prime contractors are encouraged to verify the company’s HUB certification prior to issuing a notice of award by accessing the Internet (▇▇▇▇▇://▇▇▇▇▇.▇▇▇.▇▇▇▇▇.▇▇.▇▇/tpasscmblsearch/index.jsp) or by contacting

  • Green Economy/Carbon Footprint a) The Supplier/Service Provider has in its bid provided Transnet with an understanding of the Supplier’s/Service Provider’s position with regard to issues such as waste disposal, recycling and energy conservation.

  • Voltage Regulators Whenever the Large Generating Facility is operated in parallel with the New York State Transmission System, the automatic voltage regulators shall be in automatic operation at all times. If the Large Generating Facility’s automatic voltage regulators are not capable of such automatic operation, the Developer shall immediately notify NYISO, or its designated representative, and ensure that such Large Generating Facility’s real and reactive power are within the design capability of the Large Generating Facility’s generating unit(s) and steady state stability limits and NYISO system operating (thermal, voltage and transient stability) limits. Developer shall not cause its Large Generating Facility to disconnect automatically or instantaneously from the New York State Transmission System or trip any generating unit comprising the Large Generating Facility for an under or over frequency condition unless the abnormal frequency condition persists for a time period beyond the limits set forth in ANSI/IEEE Standard C37.106, or such other standard as applied to other generators in the New York Control Area on a comparable basis.

  • Loop Provisioning Involving Integrated Digital Loop Carriers 2.6.1 Where Freedom has requested an Unbundled Loop and BellSouth uses IDLC systems to provide the local service to the End User and BellSouth has a suitable alternate facility available, BellSouth will make such alternative facilities available to Freedom. If a suitable alternative facility is not available, then to the extent it is technically feasible, BellSouth will implement one of the following alternative arrangements for Freedom (e.g. hairpinning): 1. Roll the circuit(s) from the IDLC to any spare copper that exists to the customer premises. 2. Roll the circuit(s) from the IDLC to an existing DLC that is not integrated. 3. If capacity exists, provide "side-door" porting through the switch. 4. If capacity exists, provide "Digital Access Cross Connect System (DACS)- door" porting (if the IDLC routes through a DACS prior to integration into the switch). 2.6.2 Arrangements 3 and 4 above require the use of a designed circuit. Therefore, non- designed Loops such as the SL1 voice grade and UCL-ND may not be ordered in these cases. 2.6.3 If no alternate facility is available, and upon request from Freedom, and if agreed to by both Parties, BellSouth may utilize its Special Construction (SC) process to determine the additional costs required to provision facilities. Freedom will then have the option of paying the one-time SC rates to place the Loop.

  • Electrical appliance safety The Hirer shall ensure that any electrical appliances brought by them to the premises and used there shall be safe, in good working order, and used in a safe manner in accordance with the Electricity at Work Regulations 1989. Where a residual circuit breaker is provided the hirer must make use of it in the interests of public safety.