Reasonable Security Measures Sample Clauses

Reasonable Security Measures. You shall take or cause Vendor to take reasonable technical security measures to protect the IDX Data against unauthorized use, copying or distribution including, without limitation, taking reasonable measures to prevent the IDX Data from being mechanically harvested, “scraped” or otherwise copied. Such measures shall be at least equivalent to then-current industry standards. If You are responsible for the Terms of Use of any website that displays IDX Data, you shall cause such Terms of Use to include the following language: “By submitting a query or otherwise reviewing the information on this website concerning real property listings (the “Data”) you agree to the following: (i) you will not access the Data through automated or high-volume means; and (ii) you will not “scrape,” 819226.1 harvest or otherwise copy the Data except pursuant to your personal non-commercial use of the Data solely to identify real property listings that you may be interested in investigating further.”
AutoNDA by SimpleDocs
Reasonable Security Measures. MFB has taken and will continue to take reasonable security measures to preserve and protect the secrecy of the Protected Information and Nonni's agrees to take all measures reasonably necessary to protect the secrecy of such information in order to prevent it from falling into the public domain or into the possession of persons not bound to maintain the secrecy of such information.
Reasonable Security Measures. Each Party has taken and will continue to take reasonable security measures to preserve and protect the secrecy of the Protected Information, and each Receiving Party agrees to take all measures reasonably necessary to protect the secrecy of a Disclosing Party’s Protected Information in order to prevent it from falling into the public domain or into the possession of persons not bound to maintain the secrecy of such information.
Reasonable Security Measures. In order to protect Partner’s Confidential Information, Liongard will (i) implement and maintain all reasonable security measures appropriate to the nature of the Confidential Information including without limitation, technical, physical, administrative and organizational controls, and will maintain the confidentiality, security and integrity of such Confidential Information; (ii) implement and maintain industry standard systems and procedures for detecting, preventing and responding to attacks, intrusions, or other systems failures, and regularly test or otherwise monitor the effectiveness of the system’s key controls and procedures; (iii) designate an employee or employees to coordinate implementation and maintenance of its Reasonable Security Measures; and (iv) identify reasonably foreseeable internal and external risks to the security, confidentiality and integrity of Partner Confidential Information that could result in the unauthorized disclosure, misuse, alteration, destruction or other compromise of such information, and assess the sufficiency of any systems in place to control these risks (collectively, Reasonable Security Measures).
Reasonable Security Measures. The Accessing Party will implement and maintain reasonable security measures appropriate to the nature of the Confidential Information.
Reasonable Security Measures. The Court may add reasonable security measures including, but not limited to, a time-out feature, to Court Data Services Programs.
Reasonable Security Measures. MFF has taken and will continue to take reasonable security measures to preserve and protect the secrecy of the Protected Information and Shadewell agrees to take all measures reasonably necessary to protect the secrecy of such information in order to prevent it from falling into the public domain or into the possession of persons not bound to maintain the secrecy of such information.
AutoNDA by SimpleDocs
Reasonable Security Measures. The Licensee shall take such precautions and observe such procedures to protect the security of the Licensor Database and the data in such Database including, without limitation, by limiting physical and electronic access thereto (except as part of Service transactions as herein contemplated) to employees and consultants on an "as needed" basis and requiring that such persons execute appropriate confidentiality agreements, in all cases at least to the extent that the Licensee protects its own highly confidential and important proprietary information. The Licensee shall be responsible for any breaches of such confidentiality procedures and precautions of its employees or other persons who gain access to the Licensor Database through the Licensee (except in connection with Service transactions). In addition, the Licensee shall also take such precautions, meeting the same standards as are set forth in the first sentence of this section 5.2, and as are appropriate to protect the Licensor Database against unauthorized access by persons who are not authorized to access such information including, without limitation, taking precautions against unauthorized access over phone lines, data networks or other communications means.
Reasonable Security Measures. Mrs. Fields has taken and will xxxxxxxx xx take reasonable security measures to preserve and protect the secrecy of the Protected Information and Plunkett agrees to take all meaxxxxx xxasonably necessary to protect the secrecy of such information in order to prevent it from falling into the public domain or into the possession of persons not bound to maintain the secrecy of such information.

Related to Reasonable Security Measures

  • Security Measures Lessee hereby acknowledges that the rental payable to Lessor hereunder does not include the cost of guard service or other security measures, and that Lessor shall have no obligation whatsoever to provide same. Lessee assumes all responsibility for the protection of the Premises, Lessee, its agents and invitees and their property from the acts of third parties.

  • Protective Measures We have implemented and will maintain appropriate technical and organisational measures in relation to the Services taking into account the state of the art, the costs of implementation, and the nature, scope, context and purposes of Processing, as well as the likelihood and severity of risk to the rights and freedoms of data subjects. This includes measures relating to the physical security of Our facilities used to deliver them, measures to control access rights to Our assets and relevant networks, and processes for testing these measures. In accordance with Our obligations under applicable law, We may undertake digital forensic investigations in relation to the use of the Services and Subscriptions. You are responsible for using, and ensuring that your Users use, the controls and advice provided by the Services correctly and consistently.

  • Interim Measures 6.1 The Parties acknowledge that the British Columbia Claims Task Force made the following recommendation concerning interim measures:

  • Safeguards Business Associate, its Agent(s) and Subcontractor(s) shall implement and use appropriate safeguards to prevent the use or disclosure of PHI other than as provided for by this Agreement. With respect to any PHI that is maintained in or transmitted by electronic media, Business Associate or its Subcontractor(s) shall comply with 45 CFR sections 164.308 (administrative safeguards), 164.310 (physical safeguards), 164.312 (technical safeguards) and 164.316 (policies and procedures and documentation requirements). Business Associate or its Agent(s) and Subcontractor(s) shall identify in writing upon request from Covered Entity all of the safeguards that it uses to prevent impermissible uses or disclosures of PHI.

  • Appropriate Safeguards BA shall implement appropriate safeguards to prevent the use or disclosure of Protected Information other than as permitted by the Contract or Addendum, including, but not limited to, administrative, physical and technical safeguards in accordance with the Security Rule, including, but not limited to, 45 C.F.R. Sections 164.308, 164.310, and 164.312. [45 C.F.R. Section 164.504(e)(2)(ii)(B); 45 C.F.R. Section 164.308(b)]. BA shall comply with the policies and procedures and documentation requirements of the Security rule, including, but not limited to, 45 C.F.R. Section 164.316 [42 U.S.C. Section 17931].

Time is Money Join Law Insider Premium to draft better contracts faster.