Definition of Security Sample Clauses

Definition of Security i) In this article “seniority” means a teacher’s aggregate length of service in the employment of the Board, inclusive of service under temporary employment, part time teaching and teacher-teaching-on-call that earns the teacher an increment. For the purposes of calculating length of service, part time teaching greater than
AutoNDA by SimpleDocs
Definition of Security a. In this agreement, the term “seniority” applies to an employee on continuing appointment and to his/her aggregate length of service in the employment of the Board, inclusive of service under temporary appointment and part- time teaching and as an Administrative Officer. Part-time teaching shall be credited for the purposes of seniority as if it were full-time teaching. In addition to the foregoing, the seniority for an employee under a continuing contract shall include:
Definition of Security. Notations. We denote by k the security parameter. An event is said to be negligible if it happens with probability less than the inverse of any polynomial in k. If G is a finite set, x ←R G indicates the process of selecting x uniformly and at random in G (thus we implicitly assume that G can be sampled efficiently). The UC Framework. Throughout this paper we assume basic familiarity with the universal com- posability framework. The interested reader is referred to [24, 25] for details. The model considered in this paper is the UC framework with joint state proposed by Xxxxxxx and Xxxxx [27].
Definition of Security. The term "
Definition of Security. As stated in the introduction, a central thesis to this paper is that the goal of an AKC protocol is essentially identical to the goal of an authenticated key transport protocol [7, 14]. The intent of an AKC protocol is therefore to assure two specified entities that they are involved in a real-time communication with each other. Further, the protocol must provide the two entities with a key distributed uniformly at random from {0, 1}k. No adversary should be able to learn any information about the agreed key held by an uncorrupted entity i, provided the entity j that i believes it is communicating with is also uncorrupted. Matching Conversations. To formalize the notion that two oracles are involved in a real-time commu- nication, the concept of matching conversation is defined. For simplicity we focus on the case where R, the number of flows in the protocol, is odd. The case where R is even is analogous. The idea of matching conversations was first formulated in [13], refined in [18], and later formalized in [7]. i,j Fix an execution of an adversary E. For any oracle Πs its conversation can be captured by a sequence: C = C s i,j = (τ1, α1, β1), (τ2, α2, β2), . . . , (τm, αm, βm) . i,j This sequence encodes that at time τ1 oracle Πs was asked α1 and responded with β1; and then at some later time τ2 > τ1, the oracle was asked α2 and answered β2; and so forth, until finally, at time τm it was i,j asked αm and answered βm. Adversary E terminates without asking oracle Πs any more queries. i,j If oracle Πs has α1 = λ, it is called an initiator oracle; otherwise it is called a responder oracle. Definition 2 [7]. Fix a number of flows R = 2ρ − 1 and an R-flow protocol P . Run P in the presence of an adversary E and consider two oracles Πs , an initiator oracle, and Πt , a responder oracle, that engage in conversations C and C′ respectively. i,j j,i
Definition of Security. In this article means a teacher's aggregate length of service in the employment of the Board, inclusive service under temporary employment, part teaching substitute teaching that earns the teacher an increment. the purposes of calculating length of service, part teaching greater than full time equivalence ) shall be credited as a full year of service and part time teaching at or less shall be credited as a half year of service. When the seniority of two or more continuing contract teachers equal pursuant to paragraph the teacher with the greatest unbroken length of service with the Board counting back from the seniority calculation date shall be deemed to have the greatest seniority. Teachers who resign subsequent to the date of signing this Agreement pursuant to or teachers who are terminated due to E. Reduction Force, and recalled pursuant to will be considered, for the purpose of this sub-section, as having unbroken length of service throughout the period but will not accumulate length of service during such period. When the seniority of two or more continuing contract teachers equal pursuant to paragraph the teacher with the greatest number of verified days of substitute teaching with the Board prior to appointment shall be deemed to have the greatest seniority, When the seniority of two or more contract teachers is equal pursuant to paragraph the teacher with the greatest verified aggregate length of contract service (pro rated) with another school authority recognized for salary experience purposes in this agreement shall be deemed to have the greatest seniority. When the seniority of two or more contract teachers is equal pursuant to paragraph the teacher with the earliest application for successful employment with the Board shall be deemed to have the greatest seniority. For the purposes of this Article, leaves of absence excess of one complete calendar month shall not count toward aggregate length of service with the Board, except:
Definition of Security. For purposes of this section, the term ‘‘secu- rity’’ means any share of stock in any corpora- tion, certificate of stock or interest in any cor- poration, note, bond, debenture, or evidence of indebtedness, or any evidence of an interest in or right to subscribe to or purchase any of the foregoing.
AutoNDA by SimpleDocs

Related to Definition of Security

  • Provision of Security At least thirty (30) Calendar Days prior to the commencement of the procurement, installation, or construction of a discrete portion of a Connecting Transmission Owner’s Attachment Facilities, Developer shall provide Connecting Transmission Owner, at Developer’s option, a guarantee, a surety bond, letter of credit or other form of security that is reasonably acceptable to Connecting Transmission Owner and is consistent with the Uniform Commercial Code of the jurisdiction identified in Article 14.2.1 of this Agreement. Such security for payment shall be in an amount sufficient to cover the cost for the Developer’s share of constructing, procuring and installing the applicable portion of Connecting Transmission Owner’s Attachment Facilities, and shall be reduced on a dollar-for-dollar basis for payments made to Connecting Transmission Owner for these purposes. In addition:

  • Principle of Security The Board and the Association agree that increased length of service in the employment of the Board entitles all employees covered by this Agreement to commensurate increase in security of teaching employment, provided that they possess the qualifications necessary for the positions available.

  • Grant of Security Each Grantor hereby grants to the Collateral Agent, for the ratable benefit of the Secured Parties, a security interest in such Grantor’s right, title and interest in and to the following, in each case, as to each type of property described below, whether now owned or hereafter acquired by such Grantor, wherever located, and whether now or hereafter existing or arising (collectively, the “Collateral”):

  • Release of Security (a) If a disposal of any asset subject to security created by a Security Document is made in the following circumstances:

  • SUBSTITUTION OF SECURITIES Upon request and at the sole cost and expense of Contractor, District shall permit substitution of securities in lieu of retention, in accordance with Public Contract Code Section 22300.

  • Principles of Security 2.1 The Contractor acknowledges that the Authority places great emphasis on confidentiality, integrity and availability of information and consequently on the security of the Premises and the security for the Contractor System. The Contractor also acknowledges the confidentiality of the Authority's Data.

  • Warranty of Security Unless otherwise agreed in writing, the Contractor and its subcontractors will not perform any of the services from outside of the United States, and the Contractor will not allow any State of Florida data to be sent by any medium, transmitted, or accessed outside of the United States. The Contractor agrees that a violation of items listed above will result in immediate and irreparable harm to the Customer and will entitle the Customer to a credit as provided in the Contract documents. This credit is intended only to cover the Customer’s internal staffing and administrative costs as well as the diminished value of services provided under the Contract and will not preclude the Customer from recovering other damages it may suffer as a result of such violation. For purposes of determining the damages due hereunder, a group of violations relating to a common set of operative facts (e.g., same location, same time period, same off-shore entity) will be treated as a single event. A violation of this provision will also entitle the Customer to recover any damages arising from a breach of this section and constitutes an event of default. The Contractor must notify the Department and the Customer as soon as possible, in accordance with the requirements of section 501.171, F.S., if applicable, and in all events within one (1) business day in the event Contractor discovers any data is breached, any unauthorized access of data occurs (even by persons or companies with authorized access for other purposes), any unauthorized transmission of data occurs, or of any credible allegation or suspicion of a material violation of the above. This notification is required regardless of the number of persons or type of data affected. The notification must be clear and conspicuous and include a description of the following:

Time is Money Join Law Insider Premium to draft better contracts faster.