Data Storage, Isolation and Authentication Sample Clauses

Data Storage, Isolation and Authentication. The Data Importer stores data in a multi-tenant environment on the Data Importer-owned servers. Data, the Services database and file system architecture are replicated between multiple geographically dispersed data centers. Workfront logically isolates data on a per end user basis at the application layer. The Data Importer also logically isolates the Data Exporter's data, and the Data Exporter will be given control over specific data sharing policies. The Data Importer logically separates the Data Exporter's data, including data from different end users from each other, and data for an authenticated end user will not be displayed to another end user (unless the former end user or administrator allows the data to be shared). A central authentication system is used across all Services to increase uniform security of data. The Data Exporter will be given control over specific data sharing policies. Those policies, in accordance with the functionality of the Services, will enable the Data Exporter to determine the product sharing settings applicable to end users for specific purposes. The Data Exporter may choose to make use of certain logging capability that the Data Importer may make available via the Services, products and APIs. The Data Exporter agrees that its use of the APIs is subject to the API terms of use.
AutoNDA by SimpleDocs
Data Storage, Isolation and Authentication. The Data Importer stores data in a multi-tenant environment on the Data Importer-owned servers. Data, the Services database and file system architecture are replicated between multiple geographically dispersed data centers. Workfront logically isolates data on a per end user basis at the application layer. The Data Importer also logically isolates the Data Exporter's data, and the Data Exporter will be given control over specific data sharing policies. The Data Importer logically separates the Data Exporter's data, including data from different end users from each other, and data for an authenticated end user will not be displayed to another end user (unless the former end user or administrator allows the data to be shared). A central authentication system is used across all Services to increase uniform security of data. The Data Exporter will be given control over specific data sharing policies. Those policies, in accordance with the functionality of the Services, will enable the Data Exporter to determine the product sharing settings applicable to end users for specific purposes. The Data Exporter may choose to make use of certain logging capability that the Data Importer may make available via the Services, products and APIs. The Data Exporter agrees that its use of the APIs is subject to the API terms of use. Decommissioned Disks and Disk Erase Policy. Certain disks containing data may experience performance issues, errors or hardware failure that lead them to be decommissioned ("Decommissioned Disk"). Every Decommissioned Disk is subject to a series of data destruction processes (the "Data Retention and Destruction Policy") before leaving the Data Importer's premises either for reuse or destruction. Decommissioned Disks are erased in a multi-step process to a reasonably unreadable condition. The erased Decommissioned Decommissioned Disk cannot be erased, it is securely stored until it can be destroyed.
Data Storage, Isolation and Authentication. ● Provider stores data in a multi-tenant environment. Data, the services database, and file system architecture are replicated between multiple data centers. Provider logically isolates data on a per customer basis at the application layer. Provider logically separates Customer’s data, including data from different end users, from each other, and data for an authenticated end user will not be displayed to another end user (unless the former end user or administrator allows the data to be shared).

Related to Data Storage, Isolation and Authentication

  • Execution and Authentication At least one Officer must sign the Notes for the Company by manual or facsimile signature. If an Officer whose signature is on a Note no longer holds that office at the time a Note is authenticated, the Note will nevertheless be valid. A Note will not be valid until authenticated by the manual signature of the Trustee. The signature will be conclusive evidence that the Note has been authenticated under this Indenture. The Trustee will, upon receipt of a written order of the Company signed by an Officer (an “Authentication Order”), authenticate Notes for original issue that may be validly issued under this Indenture, including any Additional Notes. The aggregate principal amount of Notes outstanding at any time may not exceed the aggregate principal amount of Notes authorized for issuance by the Company pursuant to one or more Authentication Orders, except as provided in Section 2.07 hereof. The Trustee may appoint an authenticating agent acceptable to the Company to authenticate Notes. An authenticating agent may authenticate Notes whenever the Trustee may do so. Each reference in this Indenture to authentication by the Trustee includes authentication by such agent. An authenticating agent has the same rights as an Agent to deal with Holders or an Affiliate of the Company.

  • Access by and Authentication of Authorized Users Authorized Users of the Participating Institutions shall be granted access to the Licensed Materials pursuant to the following:

  • Executed and authenticated be executed manually or in facsimile by or on behalf of the Issuer and authenticated manually by or on behalf of the Fiscal Agent; and

  • Authorization, Authentication, and Access In order to ensure that access to the Data is limited to authorized staff, the Contractor must:

  • Execution, Authentication, Availability and Dating of the Residual Certificates The Residual Certificates shall be executed on behalf of Xxxxxx Mae by an Authorized Officer of Xxxxxx Xxx under the corporate seal of Xxxxxx Mae, which may be in facsimile form and be imprinted or otherwise reproduced thereon, and shall be attested by the Secretary, Assistant Secretary, or a second Authorized Officer of Xxxxxx Xxx. The signature of any of these Persons on the Residual Certificates may be manual or facsimile. A Residual Certificate bearing the manual or facsimile signature of individuals who were at any time officers of Xxxxxx Mae shall bind Xxxxxx Xxx, notwithstanding that such individuals or any of them have ceased to hold such offices prior to the authentication and delivery of such Certificate or did not hold such offices at the date of such Certificate. At any time and from time to time after the execution and delivery of this Trust Agreement, Xxxxxx Mae may deliver Residual Certificates executed by Xxxxxx Xxx to the Certificate Registrar for authentication and the Certificate Registrar shall authenticate and make available such Certificates as provided in this Trust Agreement and not otherwise. No Residual Certificate shall be entitled to any benefit under this Trust Agreement or be valid for any purpose, unless there appears on such Residual Certificate a certificate of authentication substantially in the form provided for herein, executed by the Certificate Registrar by the manual or facsimile signature of one of its authorized signatories, and such certificate upon any Residual Certificate shall be conclusive evidence, and the only evidence, that such Residual Certificate has been duly authenticated and made available hereunder. Each Residual Certificate shall be dated the date of its authentication.

  • Execution Completion Authentication and Delivery (a) The Notes shall be executed on behalf of the Issuer by one or more officers of the Issuer authorized to do so pursuant to one or more resolutions of the Issuer, whose signatures may be manual or facsimile (an "Authorized Officer"). Notes bearing the manual or facsimile signature of an Authorized Officer shall bind the Issuer, notwithstanding that such person no longer serves as the official so authorized to execute the Notes prior to the authentication and delivery of the Notes or was not such an official at the date of execution of such Notes. The Global Agent shall have no responsibility to the Issuer to determine by whom or by what means a facsimile signature may have been affixed on the Notes, or to determine whether any facsimile or manual signature is genuine.

  • Execution, Authentication, Delivery and Dating of Rights Certificates (a) The Rights Certificates shall be executed on behalf of the Company by any of its Chairman of the Board, President, Chief Executive Officer and Chief Financial Officer. The signature of any of these officers on the Rights Certificates may be manual or facsimile. Rights Certificates bearing the manual or facsimile signatures of individuals who were at any time the proper officers of the Company shall bind the Company, notwithstanding that such individuals or any of them have ceased to hold such offices either before or after the countersignature and delivery of such Rights Certificates.

  • Designation and Authorization 1. Each Party shall have the right to designate as many airlines as it wishes to conduct international air transportation in accordance with this Agreement and to withdraw or alter such designations. Such designations shall be transmitted to the other Party in writing through diplomatic channels, and shall identify whether the airline is authorized to conduct the type of air transportation specified in Annex I or in Annex II or both.

  • Use of Private Automobile 43.1 Where an automobile mileage allowance is paid, such allowance will be in accordance with the Company’s policy but not less than $.34 cents per km. RULE 44 Deduction of Union Dues

  • Authentication This Note shall not be valid until authenticated by the manual signature of the Trustee or an authenticating agent.

Time is Money Join Law Insider Premium to draft better contracts faster.