Key Compromise definition
Examples of Key Compromise in a sentence
You warrant to ISRG and the public-at-large, and You agree, that You will promptly cease all use of the Private Key corresponding to the Public Key included in Your Certificate upon revocation of Your Certificate for reasons of known or suspected Key Compromise.
You warrant to ISRG and the public-at-large, and You agree, that You will immediately request that Your Certificate be revoked if: (i) there is any actual or suspected misuse or Key Compromise of the Private Key associated with the Public Key included in Your Certificate, or (ii) any information in Your Certificate is, or becomes, misleading, incorrect or inaccurate.
Subscriber acknowledges that Microsoft may independently determine that a Certificate is malicious or there has been a Key Compromise, and Microsoft services and applications may have the ability to modify Microsoft customer experiences to reflect Microsoft’s determination without notice and without regard to the revocation status of the Certificate.
An obligation and warranty to promptly cease all use of the Private Key corresponding to the Public Key included in the Certificate upon revocation of that Certificate for reasons of Key Compromise.
An obligation to respond to TrustFactory CA’s instructions concerning Key Compromise or Certificate misuse within forty-eight (48) hours.
Key Compromise: A Private Key is said to be compromised if its value has been disclosed to an unauthorized person, an unauthorized person has had access to it, or there exists a practical technique by which an unauthorized person may discover its value.
If you wish to report complaints or suspected Private Key Compromise, Certificate misuse, or other types of fraud, compromise, misuse, or inappropriate conduct related to Certificates at any time, you agree to follow the Problem Reporting procedures stated in Trend Micro’s CPS.
The subscriber is obliged to promptly cease all use of the Private Key corresponding to the Public Key included in the Certificate upon revocation of that Certificate for reasons of Key Compromise.
The subscriber is obliged to respond to the CA’s instructions concerning Key Compromise or Certificate misuse within reasonable time.
Secret Key Compromise – any event and/or action (loss, unauthorized copying, or suspicion of unauthorized copying, etc.) that has led or may lead to unauthorized use of the Secret Key.