Security Components Sample Clauses

Security Components. You understand that the Service and software embodied therein may include security components that permit digital materials to be protected, and that use of these materials is subject to usage rules set by Senses and/or content providers who provide content to Senses. You may not attempt to override, disable, circumvent or otherwise interfere with any such security components and usage rules embedded into the Service.
AutoNDA by SimpleDocs
Security Components. You understand that the Service and software embodied therein may include security components that permit digital materials to be protected, and that use of these materials is subject to usage rules set by GlowBe and/or content providers who provide content to GlowBe. You may not attempt to override, disable, circumvent or otherwise interfere with any such security components and usage rules embedded into the Service.
Security Components. You understand that the Service and software embodied therein may include security components that permit digital materials to be protected, and that use of these materials is subject to usage rules set by Yogiville and/or content providers who provide content to Yogiville. You may not attempt to override, disable, circumvent or otherwise interfere with any such security components and usage rules embedded into the Service.
Security Components. HP-OMS acknowledges that the Customer has in place, immediately prior to the Commencement Date, security standards that allow for or have: PORTIONS OF THIS AGREEMENT HAVE BEEN OMITTED PURSUANT TO A REQUEST FOR CONFIDENTIAL TREATMENT FROM THE SEC Transition and Stabilization o [**] o [**] o [**] o [**] o [**] o [**] o [**] o [**] o [**] o [**] o [**] o [**] o [**] o [**] o [**] For the first [**] months of the Transition and Stabilization phases, HP-OMS will maintain at least the same level of security as detailed above and will implement or suggest security improvements that will be defined no later then [**] months after commencement date. The time frame for security components versions upgrade (e.g. Fire wall, Antivirus definition files) will be mutually defined per version release. [**].
Security Components. You understand that the Website and software embodied within the Website may include security components that permit digital materials to be protected, and that use of these materials is subject to usage rules set by ROMWOD and/or content providers who provide content to ROMWOD. You may not attempt to override, disable, circumvent or otherwise interfere with any such security components and usage rules embedded into the Website.
Security Components. Audit Hanover’s IT staff performs internal audits on a periodic basis and external network vulnerability scans once per month. Any identified issues are tracked according to severity and appropriate fixes are implemented as necessary. Customers may request additional external penetration tests and are responsible for the coordination of such testing and any associated costs. Personnel Security All employees, contractors, temporary workers and interns are required to adhere to Hanover’s Information Security Program and all applicable company policies and procedures. ▪ Hanover Research conducts a mandatory company wide information and data security training once per year, and all new employees will receive information and data security training within their first month of employment. ▪ Where appropriate, Hanover performs relevant background checks on employees and interns. ▪ Procedures are in place to ensure that upon termination of any employee, contractor, temporary worker or intern, all equipment is returned and all access rights are revoked immediately. ▪ The IT Department will enable access to only those information resources necessary for each individual to perform their assigned job functions. Physical Security of Data Processing Centers Hanover maintains one primary data processing center located in Arlington VA (headquarters) and one colocation data center in Reston, VA. Physical access to facilities, data centers, systems, networks and data at Hanover will be limited to those authorized personnel who require access to perform assigned duties. In addition to access controls, physical safeguards will be deployed to protect sensitive systems and data from fire, theft orother hazard. ▪ All entrances to Hanover offices and data processing areas are secured and accessible by Hanover employees only. ▪ Access is restricted to authorized personnel and access privileges are granted and removed by the Chief Information Officer or his/her appointee. ▪ Access cards are required to access appropriate floors within headquarters. ▪ Access cards are required at headquarters to gain entry to the buildings outside of regular business hours, and the satellite offices are secured by double locked doors outside of regular business hours (8 am to 6 pm Monday through Friday). ▪ Physical access is monitored at headquarters with alarms, access logs, video monitoring, and an electronic key card system. ▪ Access to Hanover’s IT and server rooms is restricted to IT staff and a...
Security Components. Audit Hanover’s IT staff performs internal audits on a periodic basis and external network vulnerability scans once per month. Any identified issues are tracked according to severity and appropriate fixes are implemented as necessary. Customers may request additional external penetration tests and are responsible for the coordination of such testing and any associated costs. Personnel Security All employees, contractors, temporary workers and interns are required to adhere to Hanover’s Information Security Program and all applicable company policies and procedures. ▪ Hanover Research conducts a mandatory company wide information and data security training once per year, and all new employees will receive information and data security training within their first month of employment. ▪ Where appropriate, Xxxxxxx performs relevant background checks on employees and interns. ▪ Procedures are in place to ensure that upon termination of any employee, contractor, temporary worker or intern, all equipment is returned and all access rights are revoked immediately. ▪ The IT Department will enable access to only those information resources necessary for each individual to perform their assigned job functions.
AutoNDA by SimpleDocs
Security Components. You understand that the Website and software embodied within the Website may include security components that permit digital materials to be protected, and that use of these materials is subject to usage rules set by YOGA30 and/or content providers who provide content to YOGA30. You may not attempt to override, disable, circumvent or otherwise interfere with any such security components and usage rules embedded into the Website.

Related to Security Components

  • Components Patheon will purchase and test all Components (with the exception of Client-Supplied Components) at Patheon’s expense and as required by the Specifications.

  • Engines POSITION SERIAL NO. TOTAL HOURS TOTAL CYCLES HRS/CYCLES SINCE LAST SHOP VISIT Time Remaining to Next LIFE LIMITED PART REMOVAL PART NAME HOURS CYCLES MSN MSN

  • Third Party Components The Products and Services may contain third party components (including open source software) subject to separate license agreements. To the limited extent a third party license expressly supersedes this XXXX, such third party license governs Customer’s use of that third party component.

  • Electrical Equipment Residents must use only CSA, UL-approved or Canadian-certified electrical equipment; the rated wattage of light fixtures must never be exceeded; and only replacement bulbs supplied by Waterloo maintenance staff may be used. Do not leave any unattended electrical equipment turned on (i.e. hair straighteners, lights etc.)

  • Open Source Components The DS Offerings may include open source components. Whenever notices (such as acknowledgment, copies of licenses or attribution notice) are required by the original licensor, such notices are included in the Documentation of the DS Offerings. Moreover, some open source components may not be distributed and licensed under the terms of the Agreement but under the terms of their original licenses as set forth in the Documentation of the DS Offerings themselves. Source code for open source software components licensed under terms and conditions that mandate availability of such source code is available upon request. Except for components mentioned in the section EXCLUSIONS below, the warranty and indemnification provided by DS under the Agreement apply to all open source software components and shall be provided by DS and not by the original licensor, but only for the use of the DS Offerings that is in compliance with the terms of the Agreement, and in conjunction with the DS Offerings. The original licensors of said open source software components provide them on an “as is” basis and without any liability whatsoever to Customer.

  • Tooling Unless otherwise specified in this Agreement, all tooling and/or all other articles required for the performance hereof shall be furnished by Seller, maintained in good condition and replaced when necessary at Seller's expense. If NETAPP agrees to pay Seller for special tooling or other items either separately or as a stated part of the unit price of Goods purchased herein, title to same shall be and remain in NETAPP upon payment therefore.

  • Equipment The Fund shall obtain and maintain at its own cost and expense all equipment and services, including but not limited to communications services, necessary for it to utilize the Software and obtain access to the System, and Custodian shall not be responsible for the reliability or availability of any such equipment or services.

  • Metering Equipment 13.01. Utility will furnish, install, own and maintain metering equipment capable of measuring the flow of kilowatt-hours (kWh) of energy. The Customer's service associated with the CRG will be metered at a single metering point. The metering equipment will measure energy delivered by Utility to Customer and also measure energy delivered by Customer to Utility. Customer agrees to provide safe and reasonable access to the premises for installation of this equipment and its future maintenance or removal.

  • Preservative-treated Wood Containing Arsenic Contractor may not purchase preservative-treated wood products containing arsenic in the performance of this Agreement unless an exemption from the requirements of Chapter 13 of the San Francisco Environment Code is obtained from the Department of the Environment under Section 1304 of the Code. The term “preservative-treated wood containing arsenic” shall mean wood treated with a preservative that contains arsenic, elemental arsenic, or an arsenic copper combination, including, but not limited to, chromated copper arsenate preservative, ammoniacal copper zinc arsenate preservative, or ammoniacal copper arsenate preservative. Contractor may purchase preservative-treated wood products on the list of environmentally preferable alternatives prepared and adopted by the Department of the Environment. This provision does not preclude Contractor from purchasing preservative-treated wood containing arsenic for saltwater immersion. The term “saltwater immersion” shall mean a pressure-treated wood that is used for construction purposes or facilities that are partially or totally immersed in saltwater.

  • MEASURING EQUIPMENT 1. Seller will maintain and operate, at its own, expense and at the point of delivery of gas hereunder, a meter or meters and other necessary equipment by which the volume of gas delivered hereunder shall be measured. Such meters and equipment shall remain the property of the Seller.

Time is Money Join Law Insider Premium to draft better contracts faster.