White Paper Sample Clauses

White Paper. Company has prepared the White Paper, which is available at xxxxx://xxxxxx.xxx/EOSIO/Documentation/blob/master/TechnicalWhitePaper.md, describing matters relating to the XXX.XX Software. The White Paper, as it may be amended from time to time, is hereby incorporated by reference. Buyer has read and understands the White Paper and its contents.
AutoNDA by SimpleDocs
White Paper. The Company has prepared a draft white paper, together with any updates, modifications or revisions thereto (collectively, the “White Paper”), which the Company intends to make available at: xxxxx://xxxxxxxxxx.xxx/whitepaper.pdf. Purchaser acknowledges receipt of the White Paper.
White Paper. Information Security Practices Introduction Information Security (IS) is a priority at EBSCO Information Services (EBSCO). Our mission is to incorporate security and risk management practices into our policies, procedures, and day-to-day operations within the organization. This approach enables appropriate diligence to ensure adequate protection of information assets and systems. EBSCO’s IS practices and strategies provide controls at multiple levels of the data lifecycle, from receipt to access, transfer, and destruction. EBSCO is an international corporation producing products and services for customers across multiple markets. Our approach and tools will accommodate variances in requirements based on market or locale. We are committed to the confidentiality, integrity and availability of our information assets. Information Security Policies & Management EBSCO’s Information Security Policy stands as the core of our IS program. Policies address security-related topics across the information asset lifecycle: from general policy roles – outsourcing security controls, change management, data classification, data retention and disposal, paper and electronic media, and system configuration requirements – to more specialized policies addressing anti-virus, encryption, backup, logging, and physical security controls. Our policies are developed in conjunction with the EBSCO Chief Information Officer (CIO) as well as the Legal, EBSCO Information Security and Business Continuity Management teams. The EBSCO IS office is responsible for maintaining all of EBSCO’s information security policies, facilitating the development of processes for secure application development and security assessments, and auditing current practices to ensure compliance with policy. EBSCO’s Information Security team The EBSCO IS team holds specific certifications (ISC2, SANS/GIAC) specializing in Information Systems, Intrusion Analysis / Prevention, Incident Handling, Computer Forensics, in addition to having years of experience working with industry security best practices. Is responsible for developing a strategy and approach to achieve objectives consistent with EBSCO’s desired information security posture. EIS InfoSec is also responsible for developing, facilitating and/or overseeing the information policies, standards, guidelines, strategies and procedures; for conducting risk assessments; for managing incidents, and for providing internal / external reporting. Lastly, IS constantly eva...
White Paper. BIO, at Chemdex's request, will edit and provide ----------- other reasonable assistance in the preparation by Chemdex or its representatives of a white paper on electronic commerce in the biotechnology industry. BIO will use commercially reasonable efforts to cooperate with Chemdex in the preparation of a white paper of a quality which BIO, in the exercise of its reasonable discretion, would endorse, and upon completion of the white paper, will consider in good faith endorsing the same.
White Paper. Company has prepared a white paper and other materials concerning the sale of LetCoinShop Tokens and the LetCoinShop PLATFORM, which are available at xxx.xxxxxxxxxxx.xxx (the “White Paper”). The White Paper, as it may be amended from time to time, is hereby incorporated by reference. Buyer has read and understands the White Paper and its contents.
White Paper. Purchaser has received, read and understands the White Paper and its contents.
White Paper. Liquid Spins Security Server Protection Liquid Spins servers are hosted in the cloud using Amazon's Elastic Compute Cloud (EC2) service. All access to the server is via the Secure Shell protocol (SSH). Furthermore, SSH authentication only uses ssh keys which requires the private key and public key to be stored on the user's machine, and the public key to be stored on the server. This strongly protects the server against brute force attacks. Customer Authentication All customers of the Liquid Spins Music Store are required to register an account. Once registered, the customer will be able to login using our authentication measures by providing the email address and password they entered upon registration. The password for each customer is not stored in clear text. Rather, the password is encrypted using the BCrypt hashing algorithm. In the event of a security breach, all passwords are encrypted and therefore will not useful when viewing the passwords in the database. BCrypt is especially useful in preventing brute force attacks on a site due to it's slow encryption speed. Asset Protection All digital assets purchased from the Liquid Spins Music Store are stored in the cloud using Amazon's Simple Storage Service (S3). The permissions on those digital files are set with authenticated-read permissions. With those permissions no file stored will be accessible to anyone without proper authentication using a query string. The signature in the query string secures the request. Query string authentication requests require an expiration date. When a customer has authenticated with xxxxxxxxxxx.xxx and has made a purchase they are allowed to download the purchased product one time. The query string is generated using Amazon's S3 API and is valid for 3 seconds. After which time, the url expires preventing it from being shared.
AutoNDA by SimpleDocs
White Paper. Project has prepared the White Paper, which is available at xxxxx://xxxxxxxx.xx, describing further technical and detailed matters relating to the Argentas digital banking entity. The White Paper that may be amended from time to time are hereby incorporated by reference. Buyer has read and understands White Paper and its contents.
White Paper. Company has prepared the White Paper, which is available at xxxxx://XXX- xxxxx.xx, describing matters relating to the YOUnited Platform. The White Paper, as it may be amended from time to time, is hereby incorporated by reference. Buyer has read and understands the White Paper and its contents.
White Paper. Company has prepared the White Paper, which is available at xxxx://xxxxxxxx.xx/EON-Whitepaper.pdf, describing matters relating to the EOT Software. The White Paper, as it may be amended from time to time, is hereby incorporated by reference. Buyer has read and understands the White Paper and its contents.
Time is Money Join Law Insider Premium to draft better contracts faster.