Security of Distributed System Sample Clauses

Security of Distributed System 
AutoNDA by SimpleDocs

Related to Security of Distributed System

  • PRIORITY OF USE Any schedule or milestone in this Agreement is estimated based upon the Parties' current understanding of the projected availability of NASA goods, services, facilities, or equipment. In the event that NASA's projected availability changes, Partner shall be given reasonable notice of that change, so that the schedule and milestones may be adjusted accordingly. The Parties agree that NASA's use of the goods, services, facilities, or equipment shall have priority over the use planned in this Agreement. Should a conflict arise, NASA in its sole discretion shall determine whether to exercise that priority. Likewise, should a conflict arise as between two or more non-NASA Partners, NASA, in its sole discretion, shall determine the priority as between those Partners. This Agreement does not obligate NASA to seek alternative government property or services under the jurisdiction of NASA at other locations.

  • Security of State Information To the extent Contractor shall have access to, processes, handles, collects, transmits, stores or otherwise deals with State Data, the Contractor represents and warrants that it has implemented and it shall maintain during the term of this Master Agreement the highest industry standard administrative, technical, and physical safeguards and controls consistent with NIST Special Publication 800-53 (version 4 or higher) and Federal Information Processing Standards Publication 200 and designed to (i) ensure the security and confidentiality of State Data; (ii) protect against any anticipated security threats or hazards to the security or integrity of the State Data; and (iii) protect against unauthorized access to or use of State Data. Such measures shall include at a minimum: (1) access controls on information systems, including controls to authenticate and permit access to State Data only to authorized individuals and controls to prevent the Contractor employees from providing State Data to unauthorized individuals who may seek to obtain this information (whether through fraudulent means or otherwise); (2) industry-standard firewall protection; (3) encryption of electronic State Data while in transit from the Contractor networks to external networks; (4) measures to store in a secure fashion all State Data which shall include multiple levels of authentication; (5) dual control procedures, segregation of duties, and pre-employment criminal background checks for employees with responsibilities for or access to State Data; (6) measures to ensure that the State Data shall not be altered or corrupted without the prior written consent of the State; (7) measures to protect against destruction, loss or damage of State Data due to potential environmental hazards, such as fire and water damage; (8) staff training to implement the information security measures; and (9) monitoring of the security of any portions of the Contractor systems that are used in the provision of the services against intrusion on a twenty-four (24) hour a day basis.

  • Security of Vendor Facilities All Vendor and Vendor Staff facilities in which Citizens Confidential Information is located or housed shall be maintained in a reasonably secure manner. Within such facilities, all printed materials containing Citizens Confidential Information should be kept locked in a secure office, file cabinet, or desk (except when materials are being used).

  • Security of Access Code You may use one (1) or more access codes with your electronic fund transfers. The access codes issued to you are for your security purposes. Any access codes issued to you are confidential and should not be disclosed to third parties or recorded on or with the card. You are responsible for safekeeping your access codes. You agree not to disclose or otherwise make your access codes available to anyone not authorized to sign on your accounts. If you authorize anyone to use your access codes, that authority shall continue until you specifically revoke such authority by notifying the Credit Union. You understand that any joint owner you authorize to use an access code may withdraw or transfer funds from any of your accounts. If you fail to maintain the security of these access codes and the Credit Union suffers a loss, we may terminate your EFT services immediately.

  • Security of processing (a) The data importer and, during transmission, also the data exporter shall implement appropriate technical and organisational measures to ensure the security of the data, including protection against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to that data (hereinafter ‘personal data breach’). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purpose(s) of processing and the risks involved in the processing for the data subjects. The Parties shall in particular consider having recourse to encryption or pseudonymisation, including during transmission, where the purpose of processing can be fulfilled in that manner. In case of pseudonymisation, the additional information for attributing the personal data to a specific data subject shall, where possible, remain under the exclusive control of the data exporter. In complying with its obligations under this paragraph, the data importer shall at least implement the technical and organisational measures specified in Annex II. The data importer shall carry out regular checks to ensure that these measures continue to provide an appropriate level of security.

  • ECR Number Environmental Commitment Record Requirements Description of ADOT Responsibilities TMP-3 The following measures will be implemented for the Selected Alternative: • All equipment exhaust systems will be in good working order. Properly designed engine enclosures and intake silencers will be used. • Equipment will be maintained on a regular basis. New equipment will be subject to new product emission standards. • Stationary equipment will be located as far away from sensitive receivers as possible. • Construction-related noise generators will be shielded from noise receivers (e.g., use temporary enclosures to shield generators or crushers, take advantage of site conditions to provide topographic separation). • Construction alerts will be distributed to keep the public informed of construction activities, and a toll-free number for construction-related complaints will be provided. • During the design phase, hours of operation will be evaluated to minimize disruptions during construction. ADOT to oversee for compliance TMP-4 Congestion from construction-related traffic will create temporary impacts in the project vicinity. The magnitude of these impacts will vary depending on the location of the sources of the fill material and of the disposition sites for surplus material, the land uses along the routes, the duration of hauling operations, staging locations, and the construction phasing. To identify acceptable routes and times of operation, ADOT, or its representative, will prepare an agreement with local agencies regarding hauling of construction materials on public streets. ADOT to oversee for compliance TP Attachment 000-0 Xxxxx Xxxxxxxx Xxxxxxx Project Record of Decision (ROD) Developer’s Environmental Commitment Requirements The following table includes the Project-specific environmental commitments as written in the ROD, with minor modifications for clarification purposes. As it relates to these Technical Provisions, references to freeway, project, South Mountain Freeway, proposed action, proposed freeway, and Selected Alternative mean the Project, and references to contractor mean Developer. Developer shall comply with and perform all of the contractor and ADOT requirements, including the ADOT obligations, commitments, and responsibilities, identified in the following table, except to the extent of those requirements that are specifically identified in the third column, entitled “Description of ADOT Responsibilities,” which are not delegated to Developer.

  • Pricing for Registry Services (a) With respect to initial domain name registrations, Registry Operator shall provide ICANN and each ICANN accredited registrar that has executed the registry-­‐registrar agreement for the TLD advance written notice of any price increase (including as a result of the elimination of any refunds, rebates, discounts, product tying or other programs which had the effect of reducing the price charged to registrars, unless such refunds, rebates, discounts, product tying or other programs are of a limited duration that is clearly and conspicuously disclosed to the registrar when offered) of no less than thirty (30) calendar days. Registry Operator shall offer registrars the option to obtain initial domain name registrations for periods of one (1) to ten (10) years at the discretion of the registrar, but no greater than ten (10) years.

  • Security of Data a. Each of the parties shall:

  • ACCESS TO SECURITY LOGS AND REPORTS Upon request, the Contractor shall provide access to security logs and reports to the State or Authorized User in a format as specified in the Authorized User Agreement.

  • Building and Construction Industry Security of Payment Act 1999 (NSW);

Time is Money Join Law Insider Premium to draft better contracts faster.