Server/Database security Sample Clauses

Server/Database security i. Database and applications servers only process the personal data that are actually needed to be processed in order to achieve its processing purposes.
AutoNDA by SimpleDocs

Related to Server/Database security

  • Web site Information on registration for and use of the E-Verify program can be obtained via the Internet at the Department of Homeland Security Web site: xxxx://xxx.xxx.xxx/E-Verify.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • Server Software Subject to the terms and conditions of this XXXX, Vocera grants you the non-exclusive right to (i) install and run (“Use”) the Server Software on computer systems (each, a “Server Computer”) located at End User’s Facilities in the geographic territory designated above (“Territory”); (ii) to Use the Client Software in conjunction with Authorized Client Devices and such Server Computers; and (iii) for pilot licenses for certain Software provided on a trial basis, use such Software for the limited term specified by Vocera in writing. You may Use the standard Server Software on one primary Server Computer (or a primary cluster of computers suitably configured for productive use of the Server Software). You may install backup copies of the Server Software on backup Server Computers to provide redundancy in the event of failure of the primary Server Computer(s) but, unless you have acquired additional licenses or a failover license from Vocera, you may not run such backup or additional copies concurrently with the primary copies. Vocera grants you the right to use the applicable License Key issued by Vocera only to enable Use of the Server Software in conjunction with the licensed Server Computers. Server Software may be licensed for a Subscription Term as specified in the Quote.

  • Line Information Database 9.1 LIDB is a transaction-oriented database accessible through Common Channel Signaling (CCS) networks. For access to LIDB, e-Tel must purchase appropriate signaling links pursuant to Section 10 of this Attachment. LIDB contains records associated with End User Line Numbers and Special Billing Numbers. LIDB accepts queries from other Network Elements and provides appropriate responses. The query originator need not be the owner of LIDB data. LIDB queries include functions such as screening billed numbers that provides the ability to accept Collect or Third Number Billing calls and validation of Telephone Line Number based non-proprietary calling cards. The interface for the LIDB functionality is the interface between BellSouth’s CCS network and other CCS networks. LIDB also interfaces to administrative systems.

  • The Web Services E-Verify Employer Agent agrees to, consistent with applicable laws, regulations, and policies, commit sufficient personnel and resources to meet the requirements of this MOU.

  • Line Information Database (LIDB 9.1 BellSouth will store in its Line Information Database (LIDB) records relating to service only in the BellSouth region. The LIDB Storage Agreement is included in this Attachment as Exhibit B.

  • Web Portal If you elect to link to and use the web interface provided by us (the “Web Portal”), you agree that the Web Portal is for the sole purpose of enabling Recipients to update and add their contact information. If you elect to use the Web Portal, we grant for the period of the Term (as defined below) to you a limited non-exclusive, worldwide, royalty-free license to place a digital image of the applicable sign-up Logo, which will be presented to you (the “Image”), on an appropriate page of your Internet site, with a hyperlink to our Web Portal site (the “Link”) currently at xxxxx://xxxxxx.xxxxxxxxxxxxxxxxxxx.xxx/. You may not use any other trademark or service xxxx in connection with the Image without our prior written approval. The Link may not be used in any manner to provide an Authorized User with access to the Web Portal via any framing, layering or other techniques now known or hereafter developed that permit display of the Web Portal with any materials posted by you or anyone other than us. You may not allow the Image to be linked to any other web site. You may not use the Image in any manner not permitted hereunder, modify the Image, or copy, or create a derivative work from, the “look and feel” of the Image. We will have the right to review all uses of the Image for quality control purposes and proper compliance. We reserve the right to modify permission to use the Image and/or the Link at any time.

  • Database The LERG is available through Telcordia. ICONN is available through the Qwest web site.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

Time is Money Join Law Insider Premium to draft better contracts faster.