Client Security Sample Clauses

Client Security. 5.1 IBs must not:
AutoNDA by SimpleDocs
Client Security. Patching of security vulnerabilities to the operating system and software must meet or exceed the service level interval defined by the vendor for the threat level of the vulnerability. • Clients must have Malware protection with automatic signature updates. • Systems located in an unsecured area and attached to the Supplier network must not accesssystems and network segments containing Confidential Information. • All client systems that access Confidential Information, whether in use or not, must be physically secured. • Client systems which access Confidential Information from secured locations must have a passwordprotected screen saver or automated logoff after no more than 15 minutes of inactivity of account access. This includes any third-party vendors that may contract with those vendorsand have privileged access as well.
Client Security. The Client agrees to provide security in the amount described in item 14) of Schedule A and issued by an institution and in a form which is acceptable to GT (acting reasonably) and its respective banks or financiers.
Client Security. ‌ NYLAG will continue to work with the landlord to maintain and refine protocols concerning front desk security issues such as clients with identification issues, including the following:
Client Security. 7.1 The Client warrants that all cash, securities or other assets of any nature transferred to or held by Platform Securities, its nominees and custodians for the Client are the sole and beneficial property of the Client and are free and clear of any interest, charge or other encumbrance and will not charge, assign or otherwise dispose of or create any interest therein.
Client Security. Patching of security vulnerabilities to the operating system and software must meet or exceed the service level interval defined by the vendor for the threat level of the vulnerability. Clients must have Malware protection with automatic signature updates. Systems located in an unsecured area and attached to the Supplier network must not access systems and network segments containing confidential data. All client systems that access confidential data, whether in use or not, must be physically secured. Client systems which access confidential data from secured locations must have a password protected screen saver or automated logoff after no more than 15 minutes of inactivity of account access. This includes any third-party vendors that may contract with those vendors and have privileged access as well. Firewall Setup Network segments connected to the Internet must be protected by a firewall and configured to secure all devices behind it. All system security and event logs are reviewed regularly for anomalies, and available to McAfee Enterprise in the event of an incident. Unused ports and protocols must be disabled. Firewalls must be configured to prevent address spoofing. Only TCP ports should be used for web applications. Supplier firewalls must be configured to allow McAfee Enterprise scanning of McAfee Enterprise Web applications. McAfee Enterprise scanning source IP addresses will be provided to Suppliers. Data Security
AutoNDA by SimpleDocs
Client Security. ▪ Patching of security vulnerabilities to the operating system and software must meet or exceed the service level interval defined by the vendor for the threat level of the vulnerability. ▪ Clients must have Malware protection with automatic signature updates. ▪ Systems located in an unsecured area and attached to the Supplier network must not access systems and network segments containing confidential data. ▪ All client systems that access confidential data, whether in use or not, must be physically secured. ▪ Client systems which access confidential data from secured locations must have a password protected screen saver or automated logoff after no more than 15 minutes of inactivity of account access. This includes any third-party vendors that may contract with those vendors and have privileged access as well.
Client Security. Requirements The service requirements, functions, security features and other requirements set forth in Subsections A. through F. above, inclusive, shall be referred to singularly or collectively as the “Client Security Requirements.”

Related to Client Security

  • Government Securities 16 Guarantee.................................................... 17 Guarantor.................................................... 17 Holder....................................................... 17 Incur........................................................ 17

  • Replacement Securities If any mutilated Security or a Security with a mutilated coupon appertaining to it is surrendered to the Trustee, the Company shall execute and the Trustee shall authenticate and deliver, in exchange for such mutilated Security or in exchange for the Security to which a mutilated coupon appertains, a new Security of the same series and of like tenor and principal amount and bearing a number not contemporaneously outstanding, with coupons corresponding to the coupons, if any, appertaining to such mutilated Security or to the Security to which such mutilated coupon appertains. If there shall be delivered to the Company and the Trustee (i) evidence to their satisfaction of the destruction, loss or theft of any Security or coupon and (ii) such security or indemnity as may be required by them to save each of them and any agent of any of them harmless, then, in the absence of notice to the Company or the Trustee that such Security or coupon has been acquired by a bona fide purchaser, the Company shall execute and the Trustee shall authenticate and deliver, in lieu of any such destroyed, lost or stolen Security or in exchange for the Security to which a destroyed, lost or stolen coupon appertains (with all appurtenant coupons not destroyed, lost or stolen), a new Security of the same series and of like tenor and principal amount and bearing a number not contemporaneously outstanding, with coupons corresponding to the coupons, if any, appertaining to such destroyed, lost or stolen Security or to the Security to which such destroyed, lost or stolen coupon appertains. In case any such mutilated, destroyed, lost or stolen Security or coupon has become or is about to become due and payable, the Company in its discretion may, instead of issuing a new Security, pay such Security or coupon (without surrender thereof except in the case of a mutilated Security or coupon) if the applicant for such payment shall furnish to the Company and the Trustee such security or indemnity as may be required by them to save each of them and any agent of any of them harmless, and in the case of destruction, loss or theft, evidence satisfactory to the Company and the Trustee and any agent of them of the destruction, loss or theft of such Security and the ownership thereof; provided, however, that the Principal of and any interest on Unregistered Securities shall, except as otherwise provided in Section 4.02, be payable only at an office or agency located outside the United States of America. Upon the issuance of any new Security under this Section, the Company may require payment of a sum sufficient to cover any tax or other governmental charge that may be imposed in relation thereto and any other expenses (including the fees and expenses of the Trustee) connected therewith. Every new Security of any series, with its coupons, if any, issued pursuant to this Section in lieu of any destroyed, lost or stolen Security or in exchange for any mutilated Security, or in exchange for a Security to which a mutilated, destroyed, lost or stolen coupon appertains, shall constitute an original additional contractual obligation of the Company, whether or not the mutilated, destroyed, lost or stolen Security and its coupons, if any, or the mutilated, destroyed, lost or stolen coupon shall be at any time enforceable by anyone, and any such new Security and coupons, if any, shall be entitled to all the benefits of this Indenture equally and proportionately with any and all other Securities of that series and their coupons, if any, duly issued hereunder. The provisions of this Section are exclusive and shall preclude (to the extent lawful) any other rights and remedies with respect to the replacement or payment of mutilated, destroyed, lost or stolen Securities or coupons.

  • Investment Securities and Commodities (a) Each of the Company and its Subsidiaries has good title in all material respects to all securities and commodities owned by it (except those sold under repurchase agreements), free and clear of any Lien, except as set forth in the financial statements included in the Company Reports or to the extent such securities or commodities are pledged in the ordinary course of business to secure obligations of the Company or its Subsidiaries. Such securities and commodities are valued on the books of the Company in accordance with GAAP in all material respects.

  • Investment Securities Each of the Company and its subsidiaries has good and marketable title to all securities held by it (except securities sold under repurchase agreements or held in any fiduciary or agency capacity) free and clear of any lien, claim, charge, option, encumbrance, mortgage, pledge or security interest or other restriction of any kind, except to the extent such securities are pledged in the ordinary course of business consistent with prudent business practices to secure obligations of the Company or any of its subsidiaries and except for such defects in title or liens, claims, charges, options, encumbrances, mortgages, pledges or security interests or other restrictions of any kind that would not be material to the Company and its subsidiaries. Such securities are valued on the books of the Company and its subsidiaries in accordance with GAAP.

  • Collateral and Security Section 10.01

  • Access and Security Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.

  • Grant Security Grant Bank a security interest in any of Borrower’s assets. Negotiate Items. Negotiate or discount all drafts, trade acceptances, promissory notes, or other indebtedness in which Borrower has an interest and receive cash or otherwise use the proceeds.

  • Security Notwithstanding anything herein to the contrary, except for Section 27, to the extent requested by Indemnitee and approved by the Board, the Company may at any time and from time to time provide security to Indemnitee for the Company’s obligations hereunder through an irrevocable bank line of credit, funded trust or other collateral. Any such security, once provided to Indemnitee, may not be revoked or released without the prior written consent of Indemnitee.

Time is Money Join Law Insider Premium to draft better contracts faster.