{"component": "clause", "props": {"groups": [{"snippet": "The Agency agrees to make reasonable efforts to provide security for the protection of employees and their personal property in the work areas. Once the Agency deems it necessary to evacuate from any work location, the Agency must determine the location is safe before instructing the employees to return to work in that area. Employees shall not be asked or required to enter an evacuated area prior to the time the location has been determined to be safe, unless the employee's work duties require work in such circumstances.", "snippet_links": [{"key": "the-agency-agrees-to", "type": "clause", "offset": [0, 20]}, {"key": "reasonable-efforts", "type": "definition", "offset": [26, 44]}, {"key": "provide-security", "type": "clause", "offset": [48, 64]}, {"key": "protection-of-employees", "type": "clause", "offset": [73, 96]}, {"key": "personal-property", "type": "clause", "offset": [107, 124]}, {"key": "work-areas", "type": "definition", "offset": [132, 142]}, {"key": "work-location", "type": "definition", "offset": [200, 213]}, {"key": "the-location", "type": "clause", "offset": [241, 253]}, {"key": "the-employees", "type": "clause", "offset": [281, 294]}, {"key": "to-return-to-work", "type": "clause", "offset": [295, 312]}, {"key": "employees-shall", "type": "clause", "offset": [327, 342]}, {"key": "to-enter", "type": "definition", "offset": [368, 376]}, {"key": "prior-to-the", "type": "clause", "offset": [395, 407]}, {"key": "be-safe", "type": "definition", "offset": [449, 456]}, {"key": "work-duties", "type": "clause", "offset": [480, 491]}], "samples": [{"hash": "5EFVkJodkxH", "uri": "/contracts/5EFVkJodkxH#security-consideration", "label": "Collective Bargaining Agreement", "score": 23.1190965092, "published": true}, {"hash": "poAIK7L7S8", "uri": "/contracts/poAIK7L7S8#security-consideration", "label": "Collective Bargaining Agreement", "score": 23.1054072553, "published": true}, {"hash": "dQw28i6MJDD", "uri": "/contracts/dQw28i6MJDD#security-consideration", "label": "Collective Bargaining Agreement", "score": 23.090349076, "published": true}], "size": 9, "hash": "fd6d8fa26f32b4a797a23307b5a8596d", "id": 1}, {"snippet": "As mentioned in Introduction, we compare those admired security criteria with the previous schemes [24, 25] and show the result in Table 1.", "snippet_links": [{"key": "security-criteria", "type": "definition", "offset": [55, 72]}, {"key": "table-1", "type": "clause", "offset": [131, 138]}], "samples": [{"hash": "dWXBlVLiKl9", "uri": "/contracts/dWXBlVLiKl9#security-consideration", "label": "Authenticated Key Agreement Scheme", "score": 26.1348391513, "published": true}, {"hash": "lx1Rih9NjW2", "uri": "/contracts/lx1Rih9NjW2#security-consideration", "label": "Authenticated Key Agreement Scheme", "score": 20.5284668108, "published": true}], "size": 2, "hash": "08aa07ecf4af9b69deb999d06132ad03", "id": 2}, {"snippet": "1.10.1 Individuals/Groups/Organisations are permitted to use as customer encryption up to 40 bit key length in the RSA algorithms or its equivalent in other algorithms without having to obtain permission. However, if encryption equipments higher than this limit are to be deployed, individuals/groups/organisations shall do so with the permission of the Telecom Authority and deposit the decryption key, split into two parts, with the Telecom Authority.\n1.10.2 The LICENSEE shall provide to the LICENSOR, location details of the equipment provided by ISP. Implementation of any installation of the concerned equipment and execution of the concerned project shall be taken up only after the approval by the LICENSOR and locations of these centres shall not be changed without prior approval of the LICENSOR. This requirement shall be applicable only to such areas as are sensitive from security point of view, as may be notified from time to time by the LICENSOR. In the interest of national security, the ISPs shall block Internet sites and/or individual subscribers, as identified and directed by the Telecom Authority from time to time.\n1.10.3 Each ISP must maintain a log of all users connected and the service they are using (mail, telnet, http etc.", "snippet_links": [{"key": "permitted-to-use", "type": "clause", "offset": [44, 60]}, {"key": "obtain-permission", "type": "clause", "offset": [186, 203]}, {"key": "authority-and", "type": "clause", "offset": [362, 375]}, {"key": "decryption-key", "type": "definition", "offset": [388, 402]}, {"key": "the-licensee-shall", "type": "clause", "offset": [461, 479]}, {"key": "equipment-provided", "type": "clause", "offset": [529, 547]}, {"key": "installation-of-the", "type": "clause", "offset": [578, 597]}, {"key": "by-the-licensor", "type": "clause", "offset": [699, 714]}, {"key": "approval-of", "type": "clause", "offset": [781, 792]}, {"key": "from-time-to-time", "type": "clause", "offset": [928, 945]}, {"key": "the-interest", "type": "definition", "offset": [966, 978]}, {"key": "national-security", "type": "clause", "offset": [982, 999]}, {"key": "internet-sites", "type": "definition", "offset": [1022, 1036]}, {"key": "individual-subscribers", "type": "clause", "offset": [1044, 1066]}, {"key": "all-users", "type": "clause", "offset": [1178, 1187]}, {"key": "the-service", "type": "clause", "offset": [1202, 1213]}], "samples": [{"hash": "jnNwFRuWlea", "uri": "/contracts/jnNwFRuWlea#security-consideration", "label": "Licence Agreement for Provision of Internet Service (Satyam Infoway LTD)", "score": 18.0, "published": true}], "size": 2, "hash": "2218df5b602a6658b5c4c9fa0500c8d0", "id": 3}, {"snippet": "1.10.1 Individuals or groups of organisations both in private and Government sectors are permitted to deploy, indigenous or imported, encryption equipments for providing secrecy in transmission up to a level of encryption to be specified by Telecom Authority. However, if encryption equipments of levels higher than specified are to be deployed, individuals/groups/organisations shall obtain clearance from the Government of India and shall deposit one set of keys with the Telecom Authority.\n1.10.2 The LICENSEE shall provide to the LICENSOR, location details of the equipment provided by ISP. Implementation of any installation of the concerned equipment and execution of the concerned project shall be taken up only after the approval by the LICENSOR and locations of these centres shall not be changed without prior approval of the LICENSOR. This requirement shall be applicable only to such areas as are sensitive from security point of view, as may be notified from time to time by the LICENSOR.\n1.10.3 Each ISP must maintain a log of all users connected and the service they are using (mail, telnet, http etc.", "snippet_links": [{"key": "in-private", "type": "definition", "offset": [51, 61]}, {"key": "telecom-authority", "type": "definition", "offset": [241, 258]}, {"key": "government-of-india", "type": "definition", "offset": [411, 430]}, {"key": "the-licensee-shall", "type": "clause", "offset": [500, 518]}, {"key": "equipment-provided", "type": "clause", "offset": [568, 586]}, {"key": "installation-of-the", "type": "clause", "offset": [617, 636]}, {"key": "by-the-licensor", "type": "clause", "offset": [738, 753]}, {"key": "approval-of", "type": "clause", "offset": [820, 831]}, {"key": "from-time-to-time", "type": "clause", "offset": [967, 984]}, {"key": "all-users", "type": "clause", "offset": [1041, 1050]}, {"key": "the-service", "type": "clause", "offset": [1065, 1076]}], "samples": [{"hash": "1QWpjq5OX1W", "uri": "/contracts/1QWpjq5OX1W#security-consideration", "label": "Licence Agreement (Satyam Infoway LTD)", "score": 18.0, "published": true}], "size": 1, "hash": "4f50757d4a2e1778f15f9f748244e618", "id": 4}, {"snippet": "Exhibit B lists the Company Common Stock, Company Series A Preferred Stock, Company Warrants, Company Options and the PHL Note (collectively, the \u201cCompany Securities\u201d) outstanding or issuable on the date of this Agreement, the Securityholders who own or have a right to receive the Company Securities and the percentage of the Merger Consideration to be received by each Securityholder. The aggregate consideration to be received by the Securityholders in connection with the Merger shall be the following, subject to reduction in accordance with Sections 2.6(b) and 2.8 (collectively, the \u201cMerger Consideration\u201d):\n(i) Preferred Stock Consideration. 4,125.79 shares of Series G Convertible Preferred Stock, no par value per share (\u201cParent Preferred Stock\u201d) of Parent (the \u201cPreferred Stock Consideration\u201d).", "snippet_links": [{"key": "exhibit-b", "type": "definition", "offset": [0, 9]}, {"key": "the-company-common-stock", "type": "clause", "offset": [16, 40]}, {"key": "company-series-a-preferred-stock", "type": "definition", "offset": [42, 74]}, {"key": "company-warrants", "type": "clause", "offset": [76, 92]}, {"key": "company-options", "type": "definition", "offset": [94, 109]}, {"key": "company-securities", "type": "definition", "offset": [147, 165]}, {"key": "date-of-this-agreement", "type": "definition", "offset": [199, 221]}, {"key": "right-to-receive", "type": "clause", "offset": [261, 277]}, {"key": "the-percentage", "type": "definition", "offset": [305, 319]}, {"key": "received-by", "type": "definition", "offset": [354, 365]}, {"key": "aggregate-consideration", "type": "definition", "offset": [391, 414]}, {"key": "in-connection-with", "type": "clause", "offset": [453, 471]}, {"key": "subject-to", "type": "definition", "offset": [507, 517]}, {"key": "in-accordance-with", "type": "definition", "offset": [528, 546]}, {"key": "preferred-stock-consideration", "type": "definition", "offset": [619, 648]}, {"key": "series-g-convertible-preferred-stock", "type": "definition", "offset": [669, 705]}, {"key": "par-value-per-share", "type": "clause", "offset": [710, 729]}, {"key": "parent-preferred-stock", "type": "definition", "offset": [732, 754]}], "samples": [{"hash": "keuI7CR7A3n", "uri": "/contracts/keuI7CR7A3n#security-consideration", "label": "Merger Agreement (Geos Communications, Inc.)", "score": 21.1341546886, "published": true}], "size": 1, "hash": "6b1bab9701aeea2c6e8c0a03eff6bbca", "id": 5}, {"snippet": "2-01 SCREENING All personnel employed by Contractor to perform Services hereunder shall be screened as to their background and previous work records to insure that only persons of integrity will be employed by Contractor. At the sole discretion of Manager, such screening may include fingerprinting for an FBI file check to assure that the employee has not been convicted of any criminal offense involving dishonesty or breach of trust. Contractor shall, upon request, promptly furnish Manager with copies of personnel records of any employee, servant or agent of Contractor who is employed by Contractor pursuant to this agreement.\n2-02 BONDING All employees of Contractor that are assigned to the premises shall be bonded by an insurance company rated A+ AAA in \u201cBest\u2019s Insurance Guide\u201d. Contractor shall furnish to Manager, as part of this agreement, a certificate of a Commercial Blanket Bond or equivalent for $500,000 per event. Such bond shall cover losses suffered by Manager, Owner and Tenants as well as losses of money or personal property taken or damaged by Contractor personnel from or on the premises.\n2-03 IDENTIFICATION All Contractor personnel shall at all times be properly uniformed, as satisfactory to Manager, and display identification of the individual and either Contractor, Manager, Project or Building, as determined by Manager. Contractor shall furnish uniforms in sufficient quantity for personnel to maintain a neat, orderly and professional appearance while on the premises. At Manager\u2019s discretion, all Contractor personnel shall be photographed and provided with an identification badge which shall be worn with photograph visible at all times while on the premises. Identification badges shall remain Manager\u2019s property and shall be surrendered to Manager immediately upon discharge or transfer of personnel from the premises or termination of this agreement.\n2-04 LOITERING/SOLICITATION Contractor personnel shall not loiter on or about the premises during unscheduled hours and shall not solicit \u201codd jobs\u201d, extra work or, in any manner, harass or annoy tenants of the premises.", "snippet_links": [{"key": "employed-by", "type": "definition", "offset": [29, 40]}, {"key": "contractor-to", "type": "clause", "offset": [41, 54]}, {"key": "perform-services", "type": "clause", "offset": [55, 71]}, {"key": "work-records", "type": "clause", "offset": [136, 148]}, {"key": "to-insure", "type": "clause", "offset": [149, 158]}, {"key": "only-persons", "type": "clause", "offset": [164, 176]}, {"key": "discretion-of-manager", "type": "clause", "offset": [234, 255]}, {"key": "employee-has", "type": "clause", "offset": [340, 352]}, {"key": "convicted-of", "type": "definition", "offset": [362, 374]}, {"key": "criminal-offense", "type": "definition", "offset": [379, 395]}, {"key": "breach-of-trust", "type": "clause", "offset": [420, 435]}, {"key": "contractor-shall", "type": "clause", "offset": [437, 453]}, {"key": "upon-request", "type": "definition", "offset": [455, 467]}, {"key": "copies-of-personnel-records", "type": "clause", "offset": [499, 526]}, {"key": "any-employee", "type": "clause", "offset": [530, 542]}, {"key": "pursuant-to-this-agreement", "type": "clause", "offset": [605, 631]}, {"key": "employees-of-contractor", "type": "clause", "offset": [650, 673]}, {"key": "insurance-company", "type": "definition", "offset": [730, 747]}, {"key": "to-manager", "type": "definition", "offset": [815, 825]}, {"key": "certificate-of", "type": "clause", "offset": [856, 870]}, {"key": "commercial-blanket-bond", "type": "clause", "offset": [873, 896]}, {"key": "or-equivalent", "type": "definition", "offset": [897, 910]}, {"key": "by-manager", "type": "clause", "offset": [973, 983]}, {"key": "property-taken", "type": "definition", "offset": [1042, 1056]}, {"key": "contractor-personnel", "type": "definition", "offset": [1071, 1091]}, {"key": "on-the-premises", "type": "definition", "offset": [1100, 1115]}, {"key": "at-all-times", "type": "definition", "offset": [1168, 1180]}, {"key": "the-individual", "type": "clause", "offset": [1262, 1276]}, {"key": "to-maintain", "type": "clause", "offset": [1427, 1438]}, {"key": "professional-appearance", "type": "clause", "offset": [1459, 1482]}, {"key": "identification-badges", "type": "clause", "offset": [1700, 1721]}, {"key": "immediately-upon", "type": "clause", "offset": [1790, 1806]}, {"key": "discharge-or", "type": "clause", "offset": [1807, 1819]}, {"key": "transfer-of-personnel", "type": "clause", "offset": [1820, 1841]}, {"key": "termination-of-this-agreement", "type": "clause", "offset": [1863, 1892]}, {"key": "unscheduled-hours", "type": "clause", "offset": [1992, 2009]}, {"key": "extra-work", "type": "clause", "offset": [2044, 2054]}], "samples": [{"hash": "ksoORUcJ2HY", "uri": "/contracts/ksoORUcJ2HY#security-consideration", "label": "Lease Agreement (American River Bankshares)", "score": 22.1314168378, "published": true}], "size": 1, "hash": "d1d3ebb790b9f4117729c11d537f2a68", "id": 6}, {"snippet": "As mentioned in Introduction, we compare those admired security criteria with the previous schemes [24, 25] and show the result in Table 1. Table 1: Comparisons of satisfaction of the security cri- teria hard for A to derive the point QIDA from RA2 without", "snippet_links": [{"key": "security-criteria", "type": "definition", "offset": [55, 72]}, {"key": "table-1", "type": "clause", "offset": [131, 138]}, {"key": "satisfaction-of", "type": "clause", "offset": [164, 179]}, {"key": "the-security", "type": "clause", "offset": [180, 192]}], "samples": [{"hash": "fSyc8GUWJGb", "uri": "/contracts/fSyc8GUWJGb#security-consideration", "label": "Authenticated Key Agreement Scheme", "score": 18.3593429158, "published": true}], "size": 1, "hash": "08c8939d9cfb2e18bdee382a15a7df48", "id": 7}, {"snippet": "1.10.1 Individuals / Groups/ Organisations are permitted to use as customer encryption upto 40 bit key length in the RSA algorithms or its equivalent in other algorithms without having to obtain permission. However, if encryption equipments higher than this limit are to be deployed, individuals/groups/organisations shall do so with the permission of the Telecom Authority and deposit the decryption key, split into two parts, with the Telecom Authority..\n1.10.2 The LICENSEE shall provide to the LICENSOR, location details of the equipment provided by ISP. Implementation of any installation of the concerned equipment and execution of the concerned project shall be taken up only after the approval by the LICENSOR and locations of these centres shall not be changed without prior approval of the LICENSOR. This requirement shall be applicable only to such areas as are sensitive from security point of view, as may be notified from time to time by the LICENSOR. In the interest of national security, the ISPs shall block Internet sites and / or individual subscribers, as identified and directed by the Telecom Authority from time to time.\n1.10.3 Each ISP must maintain a log of all users connected and the service they are using (mail, telnet, http etc.). The ISPs must also log every outward login or telnet through their computers. These logs, as well as copies of all the packets originating from the Customer Premises Equipment (CPE) of the ISP, must be available in REAL TIME to Telecom Authority. Type of logins, where the identity of the logged-in user is not known, should not be permitted.\n1.10.4 The LICENSEE shall provide necessary facilities to the Government to counteract espionage, subversive act, sabotage or any other unlawful activity. The said facilities to be provided by the LICENSEE will depend upon the specific situation at the relevant time. Type and extent of facility(ies) required shall be at the sole discretion of the Government of India.\n1.10.5 The LICENSEE shall not use any hardware/software which are identified as unlawful and/or render network security vulnerable. The LICENSEE shall make available , on demand, to the agencies authorised by the Government of India, full access to the equipment provided by the ISP for technical scrutiny and detailed inspection.\n1.10.6 All foreign personnel likely to be deployed by the LICENSEE for installation, operation and maintenance of the LICENSEE\u2019s network shall be required to obtain security clearance by the Government of India prior to their deployment. The security clearance will be obtained from the Ministry of Home Affairs, Government of India.\n1.10.7 Software used by each ISP shall conform to a set of latest operational requirements which will be periodically published by the Telecom Authority.\n1.10.8 LICENSOR shall have the right to take over the SERVICE, equipment and networks of the LICENSEE either in part or in whole of the Service Area as per directions if any, issued in the public interest or national security by the Government in case of emergency or war or low intensity conflict or any other eventuality. Provided any specific orders or direction from the Government issued under such conditions shall be applicable to the LICENSEE and shall be strictly complied with.\n1.10.9 LICENSOR reserves the right to modify these conditions or incorporate new conditions considered necessary in the interest of national security.\n1.10.10 On Security related issues, an Inter-Ministerial Committee shall be set up consisting of the representatives of DOT, Cabinet Secretariat, MHA, MOD, DOE and NIC and representatives from NASSCOM to look into the technical aspects of monitoring of communications in this sector (including Internet) to enable the setting up of the monitoring infrastructure (which, in many cases, would have to be funded by the ISPs). Any condition imposed by this Inter-Ministerial Committee during the validity of the licence shall be binding on the licensee.", "snippet_links": [{"key": "permitted-to-use", "type": "clause", "offset": [47, 63]}, {"key": "obtain-permission", "type": "clause", "offset": [188, 205]}, {"key": "authority-and", "type": "clause", "offset": [364, 377]}, {"key": "decryption-key", "type": "definition", "offset": [390, 404]}, {"key": "the-licensee-shall", "type": "clause", "offset": [464, 482]}, {"key": "details-of-the", "type": "clause", "offset": [517, 531]}, {"key": "equipment-provided", "type": "clause", "offset": [532, 550]}, {"key": "installation-of-the", "type": "clause", "offset": [581, 600]}, {"key": "by-the-licensor", "type": "clause", "offset": [702, 717]}, {"key": "approval-of", "type": "clause", "offset": [784, 795]}, {"key": "from-time-to-time", "type": "clause", "offset": [931, 948]}, {"key": "the-interest", "type": "definition", "offset": [969, 981]}, {"key": "national-security", "type": "clause", "offset": [985, 1002]}, {"key": "internet-sites", "type": "definition", "offset": [1025, 1039]}, {"key": "individual-subscribers", "type": "clause", "offset": [1049, 1071]}, {"key": "all-users", "type": "clause", "offset": [1183, 1192]}, {"key": "copies-of-all", "type": "clause", "offset": [1362, 1375]}, {"key": "customer-premises-equipment", "type": "clause", "offset": [1409, 1436]}, {"key": "type-of", "type": "definition", "offset": [1508, 1515]}, {"key": "unlawful-activity", "type": "clause", "offset": [1740, 1757]}, {"key": "the-licensee-will", "type": "clause", "offset": [1797, 1814]}, {"key": "relevant-time", "type": "definition", "offset": [1857, 1870]}, {"key": "sole-discretion", "type": "clause", "offset": [1930, 1945]}, {"key": "government-of-india", "type": "definition", "offset": [1953, 1972]}, {"key": "network-security", "type": "definition", "offset": [2077, 2093]}, {"key": "make-available", "type": "definition", "offset": [2125, 2139]}, {"key": "on-demand", "type": "clause", "offset": [2142, 2151]}, {"key": "the-agencies", "type": "definition", "offset": [2156, 2168]}, {"key": "by-the-government", "type": "clause", "offset": [2180, 2197]}, {"key": "access-to-the-equipment", "type": "clause", "offset": [2213, 2236]}, {"key": "detailed-inspection", "type": "definition", "offset": [2284, 2303]}, {"key": "foreign-personnel", "type": "definition", "offset": [2316, 2333]}, {"key": "maintenance-of-the", "type": "clause", "offset": [2404, 2422]}, {"key": "security-clearance", "type": "definition", "offset": [2470, 2488]}, {"key": "prior-to", "type": "definition", "offset": [2516, 2524]}, {"key": "the-security", "type": "clause", "offset": [2543, 2555]}, {"key": "ministry-of-home-affairs", "type": "definition", "offset": [2592, 2616]}, {"key": "operational-requirements", "type": "definition", "offset": [2705, 2729]}, {"key": "the-right", "type": "clause", "offset": [2820, 2829]}, {"key": "the-service-area", "type": "clause", "offset": [2925, 2941]}, {"key": "in-the-public-interest", "type": "definition", "offset": [2975, 2997]}, {"key": "in-case-of-emergency", "type": "clause", "offset": [3037, 3057]}, {"key": "specific-orders", "type": "clause", "offset": [3130, 3145]}, {"key": "applicable-to", "type": "clause", "offset": [3217, 3230]}, {"key": "licensor-reserves", "type": "clause", "offset": [3288, 3305]}, {"key": "right-to-modify", "type": "clause", "offset": [3310, 3325]}, {"key": "these-conditions", "type": "clause", "offset": [3326, 3342]}, {"key": "new-conditions", "type": "definition", "offset": [3358, 3372]}, {"key": "on-security", "type": "clause", "offset": [3440, 3451]}, {"key": "related-issues", "type": "clause", "offset": [3452, 3466]}, {"key": "an-inter", "type": "clause", "offset": [3468, 3476]}, {"key": "committee-shall", "type": "definition", "offset": [3489, 3504]}, {"key": "representatives-of", "type": "clause", "offset": [3533, 3551]}, {"key": "cabinet-secretariat", "type": "definition", "offset": [3557, 3576]}, {"key": "and-representatives", "type": "clause", "offset": [3600, 3619]}, {"key": "technical-aspects", "type": "clause", "offset": [3650, 3667]}, {"key": "monitoring-of-communications", "type": "clause", "offset": [3671, 3699]}, {"key": "setting-up", "type": "clause", "offset": [3750, 3760]}, {"key": "the-licence", "type": "clause", "offset": [3936, 3947]}], "samples": [{"hash": "7aw1Q0MooeN", "uri": "/contracts/7aw1Q0MooeN#security-consideration", "label": "Licence Agreement for Provision of Internet Service", "score": 26.28678987, "published": true}], "size": 1, "hash": "656c3f60ea75446901a7018be9d73277", "id": 8}, {"snippet": "Screening: All personnel employed by Contractor to perform services hereunder shall be pre-screened as to their background and previous work records to ensure that only persons of integrity will be employed by Contractor. The awarded Contractor will incur the cost of the background checks for the contractors and their employees. In addition, Contractor shall be responsible for reviewing with all contractors\u2019 employees as specified in the \u201cInstructions to All Contractors and Contractors Employees\u201d, Exhibit 2: Orangewood Children and Family Center Security Clearance.", "snippet_links": [{"key": "contractor-to", "type": "clause", "offset": [37, 50]}, {"key": "perform-services", "type": "clause", "offset": [51, 67]}, {"key": "work-records", "type": "clause", "offset": [136, 148]}, {"key": "to-ensure", "type": "clause", "offset": [149, 158]}, {"key": "only-persons", "type": "clause", "offset": [164, 176]}, {"key": "contractor-will", "type": "clause", "offset": [234, 249]}, {"key": "cost-of", "type": "definition", "offset": [260, 267]}, {"key": "background-checks", "type": "definition", "offset": [272, 289]}, {"key": "contractors-and-their-employees", "type": "clause", "offset": [298, 329]}, {"key": "in-addition", "type": "clause", "offset": [331, 342]}, {"key": "contractor-shall", "type": "clause", "offset": [344, 360]}, {"key": "responsible-for", "type": "clause", "offset": [364, 379]}, {"key": "as-specified", "type": "clause", "offset": [422, 434]}, {"key": "to-all-contractors", "type": "clause", "offset": [456, 474]}, {"key": "exhibit-2", "type": "definition", "offset": [503, 512]}, {"key": "security-clearance", "type": "definition", "offset": [552, 570]}], "samples": [{"hash": "bcC8ya1cFVg", "uri": "/contracts/bcC8ya1cFVg#security-consideration", "label": "Subordinate Contract", "score": 32.7980542704, "published": true}], "size": 1, "hash": "780be7e03ef6b1ab88111d3dbbf5d472", "id": 9}, {"snippet": "Here we show that our protocol fulfils the recurred security aspects keeping the fact in mind that above discussed problems are secure.", "snippet_links": [{"key": "the-fact", "type": "clause", "offset": [77, 85]}], "samples": [{"hash": "hM2mBAF1y8q", "uri": "/contracts/hM2mBAF1y8q#security-consideration", "label": "Key Agreement Protocol", "score": 26.9219417769, "published": true}], "size": 1, "hash": "ed3e94f82ae9d7336a42b83451c34107", "id": 10}], "next_curs": "Cl8SWWoVc35sYXdpbnNpZGVyY29udHJhY3RzcjsLEhZDbGF1c2VTbmlwcGV0R3JvdXBfdjU2Ih9zZWN1cml0eS1jb25zaWRlcmF0aW9uIzAwMDAwMDBhDKIBAmVuGAAgAA==", "clause": {"children": [["damage", "Damage"], ["health", "Health"], ["telephones", "Telephones"], ["loitering-solicitation", "Loitering/Solicitation"], ["conduct", "Conduct"]], "size": 26, "title": "Security Consideration", "parents": [["hardship-leave", "Hardship Leave"], ["term-of-agreement", "TERM OF AGREEMENT"], ["notices", "Notices"], ["management-rights", "MANAGEMENT RIGHTS"], ["clean-upholstered-furniture", "Clean Upholstered Furniture"]], "id": "security-consideration", "related": [["priority-consideration", "Priority consideration", "Priority consideration"], ["equity-consideration", "Equity Consideration", "Equity Consideration"], ["special-considerations", "Special Considerations", "Special Considerations"], ["stock-consideration", "Stock Consideration", "Stock Consideration"], ["closing-consideration", "Closing Consideration", "Closing Consideration"]], "related_snippets": [], "updated": "2025-07-07T16:38:44+00:00"}, "json": true, "cursor": ""}}