SECURITY FOR SOFT MEDIA Sample Clauses

SECURITY FOR SOFT MEDIA. To the extent the Source Code is stored electronically on an information processing system, such system shall meet the following requirements: o Such system will have password-controlled access. Each user will have a unique user id and associated password. The Source Code shall be stored in data sets which shall be separately password protected and each password will be unique. o Such system, and the Source Code in particular, shall not be accessible through dial-up facilities or other form of remote connection. o Only Authorized Persons and Legato employees (if required) shall be issued password access to data sets containing Source Code. Each such password will be randomly selected, non-obvious, and nontrivial. Logon passwords will be changed at least every thirty (30) days. Displaying and printing of passwords will be either inhibited or masked.
AutoNDA by SimpleDocs

Related to SECURITY FOR SOFT MEDIA

  • Incorporation of Software Code I agree that I will not incorporate into any Company software or otherwise deliver to Company any software code licensed under the GNU General Public License or Lesser General Public License or any other license that, by its terms, requires or conditions the use or distribution of such code on the disclosure, licensing, or distribution of any source code owned or licensed by Company except in strict compliance with Company’s policies regarding the use of such software.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Computer Software The Grantee certifies that it has appropriate systems and controls in place to ensure that state funds will not be used in the performance of this Grant Agreement for the acquisition, operation, or maintenance of computer software in violation of copyright laws.

  • Information Technology The following applies to all contracts for information technology commodities and contractual services. “Information technology” is defined in section 287.012(15), F.S., to have the same meaning as provided in section 282.0041, F.S.

  • USE OF NAMES AND TRADEMARKS 9.1 Nothing contained in this Agreement confers any right to use in advertising, publicity, or other promotional activities any name, trade name, trademark, or other designation of either party hereto (including contraction, abbreviation or simulation of any of the foregoing). Unless required by law, the use by LICENSEE of the name, “The Regents Of The University Of California” or the name of any campus of the University Of California is prohibited, without the express written consent of UNIVERSITY.

  • Recognition of Company’s Rights; Nondisclosure At all times during my employment and thereafter, I will hold in strictest confidence and will not disclose, use, lecture upon or publish any of the Company's Proprietary Information (defined below), except as such disclosure, use or publication may be required in connection with my work for the Company, or unless an officer of the Company expressly authorizes such in writing. I will obtain Company's written approval before publishing or submitting for publication any material (written, verbal, or otherwise) that relates to my work at Company and/or incorporates any Proprietary Information. I hereby assign to the Company any rights I may have or acquire in such Proprietary Information and recognize that all Proprietary Information shall be the sole property of the Company and its assigns.

  • Data Integrity Contractor shall implement policies and procedures reasonably intended to ensure that Protected Health Information and Personally Identifiable Information in its possession is complete, accurate, and current, to the extent necessary for the Contractor’s intended purposes, and has not been altered or destroyed in an unauthorized manner.

Time is Money Join Law Insider Premium to draft better contracts faster.