Security of the session key Sample Clauses

Security of the session key. There are two important security properties about the session key, including perfect forward secrecy and leakage of session temporary secrets resistance.
AutoNDA by SimpleDocs

Related to Security of the session key

  • Security of Premises 6A.5 The Customer shall be responsible for maintaining the security of the Premises in accordance with its standard security requirements. The Supplier shall comply with all reasonable security requirements of the Customer while on the Premises and shall ensure that the Supplier’s Staff comply with such requirements.

  • Procurement of the Site 10.3.1 Pursuant to the notice specified in Clause 4.1.2, the Authority Representative and the Concessionaire shall, on a mutually agreed date and time, inspect the Site and prepare a memorandum containing an inventory of the Site including the vacant and unencumbered land, buildings, structures, road works, trees and any other immovable property on or attached to the Site. Such memorandum shall have appended thereto an appendix (the “Appendix”) specifying in reasonable detail those parts of the Site to which vacant access and Right of Way has not been granted to the Concessionaire. Signing of the memorandum, in two counterparts (each of which shall constitute an original), by the authorised representatives of the Parties shall, subject to the provisions of Clause 10.2.2, be deemed to constitute a valid licence and Right of Way to the Concessionaire for free and unrestricted use and development of the vacant and unencumbered Site during the Concession Period under and in accordance with the provisions of this Agreement and for no other purpose whatsoever. For the avoidance of doubt, it is agreed that valid licence and Right of Way with respect to the parts of the Site as set forth in the Appendix shall be deemed to have been granted to the Concessionaire upon vacant access thereto being provided by the Authority to the Concessionaire.

  • Security of processing (a) The data importer and, during transmission, also the data exporter shall implement appropriate technical and organisational measures to ensure the security of the data, including protection against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to that data (hereinafter ‘personal data breach’). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purpose(s) of processing and the risks involved in the processing for the data subjects. The Parties shall in particular consider having recourse to encryption or pseudonymisation, including during transmission, where the purpose of processing can be fulfilled in that manner. In case of pseudonymisation, the additional information for attributing the personal data to a specific data subject shall, where possible, remain under the exclusive control of the data exporter. In complying with its obligations under this paragraph, the data importer shall at least implement the technical and organisational measures specified in Annex II. The data importer shall carry out regular checks to ensure that these measures continue to provide an appropriate level of security.

  • Priority of agreements and errors discrepancies

  • Security of Data a. Each of the parties shall:

  • PRIORITY OF USE Any schedule or milestone in this Agreement is estimated based upon the Parties' current understanding of the projected availability of NASA goods, services, facilities, or equipment. In the event that NASA's projected availability changes, Partner shall be given reasonable notice of that change, so that the schedule and milestones may be adjusted accordingly. The Parties agree that NASA's use of the goods, services, facilities, or equipment shall have priority over the use planned in this Agreement. Should a conflict arise, NASA in its sole discretion shall determine whether to exercise that priority. Likewise, should a conflict arise as between two or more non-NASA Partners, NASA, in its sole discretion, shall determine the priority as between those Partners. This Agreement does not obligate NASA to seek alternative government property or services under the jurisdiction of NASA at other locations.

  • Description of the service 9.1.1 Internet banking service implies an ability for the client to manage and receive remotely the following services from the bank by means of using the special Internet-site of the bank xxxxx://xxx.xxxxxxxxxxxxxxx.xx:

  • Priority of Provisions If there is a conflict or inconsistency between any term, statement, requirement, or provision of any exhibit attached hereto, any document or events referred to herein, or any document incorporated into this Agreement by reference and a term, statement, requirement, or provision of Articles 1 through 8 of this Agreement, the term, statement, requirement, or provision contained in Articles 1 through 8 shall prevail and be given effect.

  • Security of State Information To the extent Contractor shall have access to, processes, handles, collects, transmits, stores or otherwise deals with State Data, the Contractor represents and warrants that it has implemented and it shall maintain during the term of this Master Agreement the highest industry standard administrative, technical, and physical safeguards and controls consistent with NIST Special Publication 800-53 (version 4 or higher) and Federal Information Processing Standards Publication 200 and designed to (i) ensure the security and confidentiality of State Data; (ii) protect against any anticipated security threats or hazards to the security or integrity of the State Data; and (iii) protect against unauthorized access to or use of State Data. Such measures shall include at a minimum: (1) access controls on information systems, including controls to authenticate and permit access to State Data only to authorized individuals and controls to prevent the Contractor employees from providing State Data to unauthorized individuals who may seek to obtain this information (whether through fraudulent means or otherwise); (2) industry-standard firewall protection; (3) encryption of electronic State Data while in transit from the Contractor networks to external networks; (4) measures to store in a secure fashion all State Data which shall include multiple levels of authentication; (5) dual control procedures, segregation of duties, and pre-employment criminal background checks for employees with responsibilities for or access to State Data; (6) measures to ensure that the State Data shall not be altered or corrupted without the prior written consent of the State; (7) measures to protect against destruction, loss or damage of State Data due to potential environmental hazards, such as fire and water damage; (8) staff training to implement the information security measures; and (9) monitoring of the security of any portions of the Contractor systems that are used in the provision of the services against intrusion on a twenty-four (24) hour a day basis.

  • Description of the Services 1.1 The scope of the service to be rendered is described more fully in the Annexures and Schedules referred to below: ❑ Annexure A – Scope / Specification ❑ Annexure C – Pricing Schedule 2 DELIVERABLES AND COMPLETION DATE The Deliverables, due for completion by and governed by this Schedule 1. In the event that the Service Provider fails to meet the delivery dates as agreed, the following penalties will be imposed:

Time is Money Join Law Insider Premium to draft better contracts faster.