Security Protocols definition

Security Protocols means the security protocols for the Leased Premises and/or the Property set forth on Exhibit 6.2 hereto, as amended or modified by Lessor from time to time, subject to and in accordance with the terms of this Land Lease.
Security Protocols means the security protocols described in Section
Security Protocols means security requirements at the Project site imposed by a Recipient and/or Recipients’ Affiliate’s to safeguard Recipients’ and/or Recipients’ Affiliate’s business operations at the Project site, including but not limited to (a) requiring WEDC and any other third-party entering the Project site to be accompanied at all times by an authorized employee of Recipients and/or Recipients’ Affiliate; (b) requiring visitors to sign a log, provide photo identification acceptable to Recipients and/or Recipients’ Affiliate, and obtain security clearances if required by Recipients and/or Recipients’ Affiliate or their customer(s); (c) restricting access to high-security areas of the Project Location (provided that WEDC shall have access to documentation necessary to validate Recipients’ and/or Recipients’ Affiliate’s compliance with this Agreement); and (d) requiring at least three (3) business dayswritten notice prior to any physical site visit or audit of the Project site or Project.

Examples of Security Protocols in a sentence

  • The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications.

  • The TAMARIN Prover for the Symbolic Analysis of Security Protocols.

  • You agree to use software programs developed by third parties including but not limited to the generality of those mentioned above, browser software that supports Data Security Protocols compatible with protocols used by the Company.

  • In Proceedings of the 5th International Workshop on Security Protocols, pages 91–104, London, UK, UK, 1998.

  • Automated Validation of Internet Security Protocols and Applications.

  • The Modelling and Analysis of Security Protocols: the CSP Approach.

  • In Veronique Cortier and Steve Kremer, editors, Formal Models and Techniques for Analyzing Security Protocols, Cryptology and Information Security Series.

  • You agree to use software programs developed by third parties including but not limited to the generality of those mentioned above, browser software that supports Data Security Protocols compatible with the protocols used by the Company.

  • The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols.

  • The Client agrees to use software programs developed by third parties including but not limited to the generality of those mentioned above, browser software that supports Data Security Protocols compatible with protocols used by the Company.


More Definitions of Security Protocols

Security Protocols by any person by whatever means including hacking, theft, forgery / electronic forgery or any other mode or manner. Notwithstanding anything stated hereinabove, on coming to know of any unauthorized access / use of any “security protocols”, it shall be the duty of the Client to take all necessary steps including but not limited to informing Broker in writing with full details of the same and ensuring that such breach, loss of passwords / security protocols and / or confidentiality are immediately stopped. Broker reserves right to suspend the client account/reject the orders in case of any misuse identified / wrong credential provided / any
Security Protocols means the applicable security procedures made available by M&T: (a) for verifying that an Instruction is that of Client; (b) for encrypting or otherwise helping to restrict access to information, the Accounts, or Services, which may include user IDs, passwords, algorithms, or other codes, identifying words or numbers, check stock, tokens, challenge questions, and encryption; or (c) otherwise intended to mitigate fraud risk (e.g., dual authorization).

Related to Security Protocols

  • Security Procedures means rules and regulations governing access to, and health and safety procedures while on, Government premises; and information technology security protocols;

  • Security procedure means a procedure employed for the purpose of verifying that an electronic signature, record, or performance is that of a specific person or for detecting changes or errors in the information in an electronic record. The term includes a procedure that requires the use of algorithms or other codes, identifying words or numbers, encryption, or callback or other acknowledgment procedures.

  • Computer Security Procedures means procedures for prevention of unauthorized computer access and use and administration of computer access and use as provided in writing to the Underwriter.

  • Information Security Program means the administrative, technical, and physical safeguards that a licensee uses to access, collect, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle nonpublic information.

  • Security Property means all right, title and interest in, to and under any Security Document, including:

  • Security Vulnerability means a flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in a security breach such that data is compromised, manipulated or stolen or the system damaged.

  • Security Provider means you and/or any other person or entity furnishing security for any Credit Facilities and/or any party to any security document.

  • Data Safeguards means the highest industry-standard safeguards (including administrative, physical, technical, and procedural safeguards) against the destruction, loss, misuse, unauthorized disclosure, or alteration of the JBE Data or Confidential Information, and such other related safeguards that are set forth in Applicable Laws, a Statement of Work, or pursuant to JBE policies or procedures.

  • Technical safeguards means the technology and the policy and procedures for its use that 27 protect electronic PHI and control access to it.

  • Security Policy Framework means the Cabinet Office Security Policy Framework (available from the Cabinet Office Security Policy Division);

  • Database Management System (DBMS) A system of manual procedures and computer programs used to create, store and update the data required to provide Selective Routing and/or Automatic Location Identification for 911 systems. Day: A calendar day unless otherwise specified. Dedicated Transport: UNE transmission path between one of CenturyLink’s Wire Centers or switches and another of CenturyLink’s Wire Centers or switches within the same LATA and State that are dedicated to a particular customer or carrier. Default: A Party’s violation of any material term or condition of the Agreement, or refusal or failure in any material respect to properly perform its obligations under this Agreement, including the failure to make any undisputed payment when due. A Party shall also be deemed in Default upon such Party’s insolvency or the initiation of bankruptcy or receivership proceedings by or against the Party or the failure to obtain or maintain any certification(s) or authorization(s) from the Commission which are necessary or appropriate for a Party to exchange traffic or order any service, facility or arrangement under this Agreement, or notice from the Party that it has ceased doing business in this State or receipt of publicly available information that signifies the Party is no longer doing business in this State.

  • Database Management System (“DBMS”) is a computer process used to store, sort, manipulate and update the data required to provide Selective Routing and ALI.

  • Security System means the building access control system developed by Manager and known as the O.P.E.N.centrix - Open Platform for Essential Networks, which includes, without limitation, the Application Software, the firmware containing the Application Software, the O.P.E.N.cortex platform software and all hardware related thereto;

  • Administrative Safeguards are administrative actions, and policies and procedures, to manage the selection, development, implementation, and maintenance of security measures to protect electronic PHI and to manage the conduct of Contractor’s workforce in relation to the protection of that information.

  • Protocol means, in respect of any category of object and associated rights to which this Convention applies, the Protocol in respect of that category of object and associated rights;

  • Commercial applicator means any person, unless exempted in I(4) hereunder, whether or not the person is a private applicator with respect to some uses, who:

  • Kyoto Protocol means the protocol to the UNFCCC adopted at the Third Conference of the Parties to the UNFCCC in Kyoto, Japan on 11 December 1997 as may be amended;

  • Contractor Software means software which is proprietary to the Contractor, including software which is or will be used by the Contractor for the purposes of providing the Services.

  • ISM Code Documentation includes, in respect of a Ship:

  • Step therapy protocol means a protocol or program that establishes the specific

  • Identity proofing means a process or service by which a third person provides a notary public with a means to verify the identity of a remotely located individual by a review of personal information from public or private data sources.

  • Security Standards means the final rule implementing HIPAA’s Security Standards for the Protection of Electronic PHI, as amended.

  • Technological safeguards means the technology and the policy and procedures for use of the technology to protect and control access to personal information.

  • Protocols means written directions and orders, consistent with the department’s standard of care, that are to be followed by an emergency medical care provider in emergency and nonemergency situations. Protocols must be approved by the service program’s medical director and address the care of both adult and pediatric patients.

  • Security alarm system means a device or series of devices, intended to summon law enforcement personnel during, or as a result of, an alarm condition. Devices may include hard- wired systems and systems interconnected with a radio frequency method such as cellular or private radio signals that emit or transmit a remote or local audible, visual, or electronic signal; motion detectors, pressure switches, duress alarms (a silent system signal generated by the entry of a designated code into the arming station to indicate that the user is disarming under duress); panic alarms (an audible system signal to indicate an emergency situation); and hold-up alarms (a silent system signal to indicate that a robbery is in progress).

  • Client Application means an application developed by Licensee that a) utilizes the Runtime Product, b) is installed fully on an end user’s machine, with all report processing local to that machine, and c) adds significant and primary functionality to the Runtime Product.