Security Issues Clause Samples

The 'Security Issues' clause defines the responsibilities and requirements related to maintaining the safety and integrity of information, systems, or premises involved in the agreement. It typically outlines the standards or protocols that parties must follow to prevent unauthorized access, data breaches, or other security threats, and may specify actions to be taken in the event of a security incident. This clause serves to allocate responsibility for security measures, reduce the risk of harm from security failures, and ensure that all parties are clear on their obligations to protect sensitive assets.
POPULAR SAMPLE Copied 2 times
Security Issues. The Cooperator is encouraged to obtain the latest Department of State Travel Advisory Notices before traveling. These Notices are available to the general public and may be obtained directly from the State Department, or via Internet. Where security is a concern in a specific region, Cooperators may choose to notify the US Embassy of their presence when they have entered the country. This may be especially important for long-term posting. If security issues are affecting the Cooperator’s ability to meet time lines and/or to substantially accomplish the goals and objectives established under this Agreement, then the Cooperator must contact FAS immediately.
Security Issues. The Consultant shall comply with all policies of the Company, industry practice, and law and regulation to ensure that it affords security to information and assets of the Company and that the Consultant, or any persons with whom the Consultant works or with whom the Consultant deals, do not employ information of the Company in any manner contrary to law, good practice, good faith, confidentiality or fiduciary obligations.
Security Issues. We make every effort to protect the integrity of your information. Any personal information you enter into online forms or surveys may be encrypted to ensure it remains private. We limit the right of access to your information to employees that need to use the information to respond to or process your request or transaction. We also take industry standard (IPSEC) measures to protect our sites from malicious intrusions or hacking.
Security Issues. The security of the political leaders in Kinshasa shall be ensured as follows:
Security Issues. If a security breach occurs, unless our internal security is proved to have been breached, there will be a presumption that your security has been breached. If you request Services that allow for you to appoint an administrator(s) (collectively and individually, “Administrator”), that Administrator may have the ability to appoint additional Administrators and each Administrator will have the ability to determine which of your Authorized Users will have access to the Services, the type of access they will have (including access to information about your Accounts and the ability to initiate transactions therein), and the ability to add, delete, and modify Security Credentials. Your Administrators are solely responsible for determining, on your behalf, who should be trusted with your Security Credentials and for supervising their use thereof. You are responsible for all transactions initiated by your Authorized Users even though they engage in transactions that you have not authorized, regardless of the purpose and regardless of whether the Authorized User violates your rules. If an Authorized User loses or forgets their Security Credentials, they should contact your Administrator. If an Administrator loses or forgets their Security Credentials, they should contact us. You understand and agree that ANY ONE (1) AUTHORIZED USER may be able to initiate transactions (including transfers) from any of your Accounts using the Services, regardless of whether the Authorized User is authorized on those Accounts and regardless of whether any of those Accounts normally require two (2) or more signatures or has other restrictions.
Security Issues. The parties agree that they are responsible for disclosing to the mediator in advance of the first joint mediation session any concerns about safety or security. If there has been any physical aggression or threats of physical aggression, each party should disclose that information to the mediator prior to the first joint session in a telephone message or in writing, so that a decision can be made about the appropriateness of mediation and/or planning for the security of both parties during the sessions.
Security Issues. Nothing in this Agreement shall exclude the right of the Government of the Host Country to take all relevant measures of protection in the interest of public safety or to prevent the implementation of the laws of the Host Country, which are necessary for the maintenance of public health and order. If the Government of the Host Country considers that the application of the provisions referred to in paragraph 1 above is necessary, as soon as the circumstances permit, it shall contact the Secretariat so as to make a joint decision on measures that may be necessary to protect the interests of the Secretariat. The Secretariat shall be obliged to cooperate with the authorities of the Host Country so as to avoid any harm to public security resulting from any activity of the Secretariat.
Security Issues. Each participating organisation/department must take all reasonable care and employ appropriate physical, technical and organisational safeguards to the personal data under this data sharing arrangement. Participating organisations/departments must agree on the standards required for protecting the data, for example, the storage safeguards for information in hardcopy and electronic format, security of data in transmission, security standards for access to the data. Higher safeguards will be required where the personal data is of a sensitive nature. Staff should only have access to personal data in order to perform their duties in connection with one or more of the purposes defined in section 3 (Purpose for which information is to be shared). Technical and physical safeguards should be in place to restrict access to the information only to authorised staff for example, password control. These should be in line with agreed policies and procedures
Security Issues. The security of BDH is tied to the difficulty of inverting the key extractor EN,p. There are several reasons to believe that this is a one–way function.
Security Issues. Information submitted to the ActivityTracker web site is stored in SQL databases located on Computer Methods servers. This information is only accessible to active account holders with valid authentication. In the event that an account is closed or suspended, records in the database will be retained for no more than 12 months from the date of account termination.