Security Information Sample Clauses

Security Information. The Client acknowledges that the Security Information is confidential and agrees that it is responsible for maintaining its confidentiality. The Client agrees that it must:
AutoNDA by SimpleDocs
Security Information. Siemens provides products and solutions with industrial security functions that support the secure operation of plants, systems, machines and networks. In order to protect plants, systems, machines and networks against cyber threats, it is necessary to implement – and continuously maintain – a holistic, state-of-the-art industrial security concept. Siemens’ products and solutions only form one element of such a concept. You are responsible to prevent unauthorized access to Your plants, systems, machines and networks. Such systems, machines and components should only be connected to the enterprise network or the internet if and to the extent such a connection is necessary and only when appropriate security measures (e.g. firewalls and/or network segmentation) are in place. Additionally, Siemens guidance on appropriate security measures should be taken into account. Please visit hereto xxxxx://xxx.xxxxxxx.xxx/industrialsecurity. Siemens’ products and solutions undergo continuous development to make them more secure. Siemens strongly recommends that updates are applied as soon as available and that the latest product versions are used. Use of product versions that are no longer supported, and failure to apply latest updates may increase customer’s exposure to cyber threats. To stay informed about the latest security threats, patches and other related measures, published, among, please subscribe to the Siemens Industrial Security RSS Feed under xxxxx://xxx.xxxxxxx.xxx/industrialsecurity and visit xxxx://xxx.xxxxxxx.xxx/cert/en/cert-security-advisories.htm.
Security Information. Siemens provides products and solutions with industrial security functions that support the secure operation of plants, systems, machines and networks. In order to protect plants, systems, machines and networks against cyber threats, it is necessary to implement – and continuously maintain – a holistic, state-of-the-art industrial security concept. Siemens’ products and solutions only form one element of such a concept. You are responsible to prevent unauthorized access to Your plants, systems, machines and networks. Systems, machines and components should only be connected to the enterprise network or the internet if and to the extent such a connection is necessary and with appropriate security measures (e.g. use of firewalls and network segmentation) in place. For additional information on industrial security measures that may be implemented, please visit xxxxx://xxx.xxxxxxx.xxx/industrialsecurity. Siemens’ products and solutions undergo continuous development to make the more secure. Siemens strongly recommends to apply product updates as soon as available and to always use the latest product versions. Use of product versions that are no longer supported, and failure to apply latest updates may increase customer’s exposure to cyber threats. To stay informed about product updates, subscribe to the Siemens Industrial Security RSS Feed under xxxxx://xxx.xxxxxxx.xxx/industrialsecurity.
Security Information. Agency shall comply with all privilege requirements and procedures set forth by the USDHS, USSS or other governmental entity. If Agency has custody of a record provided by City which contains details of security arrangements or investigations, Agency shall, as soon as practical and without delay, notify City of any request to disclose such record and shall follow the requirements of Section 13.5, below, prior to disclosure. For purposes of this Paragraph, the term “record” shall be broadly construed and shall include, but not be limited to, all documents, paper, electronic files, and other things containing information, irrespective of the form of that record or data, i.e. electronic, hard copy, voice recording, photograph, etc., unless such form is specified by law.
Security Information. Important Information When Traveling Outside The United States – If you plan to travel outside the U.S., please contact a bankcard representative at 0-000-000-0000. For security reasons, some foreign countries may be blocked or have certain restrictions. Your account is also protected by a fraud monitoring system that uses sophisticated technologies that seeks out and identifies suspicious card activity on your behalf. Fraud is serious business. Therefore, if high risk or suspicious activity occurs, you may receive calls from security analysts to confirm activity. In some cases your account may be temporarily blocked until validity of charges is confirmed.
Security Information. 3.6. Except where otherwise provided in this clause 3.6, you are responsible for paying any losses, fees or charges arising from Trades entered into or instructions given using your Account number and Security Information. You will not be responsible for any losses after we receive a request from you that we stop using any item of the Security Information. You will also not be responsible for any losses where we have been negligent in allowing a person you have not authorised to access your Account, or where it can be shown that a person has gained access to our Trading Platform by abuse of our systems except where such loss results from your failure to comply with clause 3.5 or 27.5. If you fail to comply with these clauses then you will be liable for the resulting loss. Please note that we do not restrict the domain from which any person can access the Trading Platform.
Security Information. 11.1.1 Your Transaction Platform Account is the record of your activities and transactions on the Transaction Platform. You can get details of your Transaction Platform Account through the Transaction Platform Call Centre or when you log-in to the Transaction Platform Website.
AutoNDA by SimpleDocs
Security Information. We are aware of the many instances of data security breaches and continue to work on new ways to protect your information. For our most sensitive databases, we use encrypted formats within controlled and secure environments that have restricted access. Although we work to ensure the integrity and security of our network and computer systems, we cannot guarantee that our security measures will prevent unauthorized access.
Security Information. As soon as possible following the date hereof, Sellers shall make available to Purchaser the appropriate personnel to discuss the Acquired Subsidiaries' information security policies, experiences complying with such policies and material breach of such policies.
Security Information. 72 Section 6.21 Asset Valuation.................................................... 72 Section 6.22
Time is Money Join Law Insider Premium to draft better contracts faster.