Security Solution Clause Samples

Security Solution. All Included Programs distributed by Licensee must be protected by the Security Solution.
Security Solution. All transmissions of the Licensed Programs shall be encrypted and protected with applicable Security Solution, and each Permitted Device shall employ the applicable Security Solution to protect the Licensed Programs from unauthorized access, use and distribution and to meet the requirements herein, including the Usage Rules. Each security upgrade for each Security Solution that is reasonably necessary to maintain security shall be implemented within a commercially reasonable period of time after such upgrade first becomes commercially available.
Security Solution. In accordance with the Netbank Agreement, the Customer is given a password that will give the Customer access to enter into this Agreement regarding Information Services via the Internet, etc, as soon as the Bank has made the service available to the Customer. The regulations regarding security solutions stipulated in the Netbank Agreement otherwise apply.
Security Solution. <Name of the solution>
Security Solution. Apple shall use the Security Solution on all eContent. [***]. At any time after either Party becomes aware of a Security Breach, Audible shall have the right to require Apple to immediately remove any or all eContent from distribution, including distribution via ITMS. If the Security Breach is not cured during the Cure Period, then, upon Audible’s request, Apple shall suspend distributing eContent until such time as the Security Breach is actually cured, [***].
Security Solution. (a) For the purpose of protecting the Licensed Programs from unauthorized access, use and distribution, all Licensed Programs must be encrypted and protected with a Security Solution prior to transmission to end users. Such encryption must be on a file level basis with AES 128 (or more robust) encryption and each instance of the Licensed Programs shall be encrypted with a unique encrypted cryptographic key. All Security Solution licenses, keys, certificates and similar security assets must be encrypted. Each instance of the Authorized App/Player shall contain a Security Solution client (or client- side Security Solution component). In each instance, the Security Solution shall be implemented in accordance with industry-standard security practices with the “View Only”, “Copy Never”, “Copy Count = 0”, “No Copies”, “No Transfer” and equivalent settings used for all Licensed Programs wherever the Security Solution supports these settings. Security Solution updates/upgrades that are reasonably necessary to maintain security shall be implemented promptly within a reasonable time after their release. Updates/upgrades to the Authorized App/Player shall be implemented promptly upon such updates/upgrades becoming available if they address a known security issue, and access to the Licensed Service(s) via Internet Streaming Delivery on the applicable Authorized Internet Devices shall be suspended until the user upgrades to the latest authorized version of the Authorized App/Player which addresses that known security issue. Notwithstanding the foregoing, in the case of Licensee’s transmission to HbbTV televisions where Licensee uses a version of HbbTV that does not support encryption (i.e., a version prior to HbbTV 2.0.1), such transmission is not required to comply with the encryption and output requirements herein.
Security Solution. The Customer will receive a password to be used when logging on to the Secured services. The password is personal and must under no circumstances be used by a third party. The Customer shall be aware that a third party who has knowledge of the Customer’s password may log on to and use the Secured services on which the Customer has entered into an agreement. If the Customer is a company or the like, the Customer is responsible for appointing a private individual/contact person in the company who will receive passwords, etc, at any time. The person stated as contact in the separate registration form, has been given sufficient authorisation to retrieve and receive the necessary documents, password etc. If the Customer is a private individual, the Customer will receive BankID and must enter into an agreement for PersonBankID. BankID together with a password and a security code are used to log on to the Netbank. The Bank sends the Customer a security card with security codes and a start code for the security card. The Customer may also use a BankID issued by another bank. The liability provisions of Nordea's terms of agreement for PersonBankID, if relevant, apply to the Customer and Nordea.
Security Solution. Nordea uses different security solutions or a combination of security solutions for the logging on to Secured services. For example, the security solution may be electronic certificates, security cards, applications on mobile units, units as such or only passwords, codes and biometric characteristics. The security solutions are personal and must not be transferred or given to or be used by other persons than the customer. For some security solutions passwords or codes are used. In such cases the Customer may create his own password or receive passwords and codes from the Bank. Passwords, personal codes and other security procedures must not be revealed to anyone, not even to the Police, the Bank nor members of the household. Passwords must not be written down as this may enable misuse by others.

Related to Security Solution

  • Security Systems The Service may not be compatible with security systems. You may be required to maintain a telephone connection through your local exchange carrier in order to use any alarm monitoring functions for any security system installed in your home or business. You are responsible for contacting the alarm monitoring company to test the compatibility of any alarm monitoring or security system with the Service.

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Security Services CONTRACTOR shall provide security services designed for preventing escapes, maintaining order, providing care, custody, control, supervision and management of the inmate population. A successful security program depends heavily on staff training, effective administration, and the establishment of inmate programs. The organization, staffing, and administration of the security program are vital to the Facility. The direction provided by a well-organized and clearly articulated operations manual, and emergency planning provides a solid base for successful administration. The final operations manual shall be submitted to the Bureau prior to the Service Commencement Date and shall be reviewed annually and updated as needed. Documentation of the review shall be provided annually to the On- Site Contract Monitor. Changes to the plan require written permission by the Contract Manager. The Department reserves the right to require changes to plans submitted to the Bureau.

  • Security Safeguards Contractor shall store and process District Data in accordance with commercial best practices, including implementing appropriate administrative, physical, and technical safeguards that are no less rigorous than those outlined in SANS Top 20 Security Controls, as amended, to secure such data from unauthorized access, disclosure, alteration, and use. Contractor shall ensure that all such safeguards, including the manner in which District Data is collected, accessed, used, stored, processed, disposed of and disclosed, comply with all applicable federal and state data protection and privacy laws, regulations and directives, including without limitation C.R.S. § ▇▇-▇▇-▇▇▇ et seq., as well as the terms and conditions of this Addendum. Without limiting the foregoing, and unless expressly agreed to the contrary in writing, Contractor warrants that all electronic District Data will be encrypted in transmission and at rest in accordance with NIST Special Publication 800-57, as amended.

  • Security Service Tenant acknowledges and agrees that, while Landlord may patrol the Project, Landlord is not providing any security services with respect to the Premises and that Landlord shall not be liable to Tenant for, and Tenant waives any claim against Landlord with respect to, any loss by theft or any other damage suffered or incurred by Tenant in connection with any unauthorized entry into the Premises or any other breach of security with respect to the Premises.