Encryption Technology Sample Clauses

Encryption Technology. Provider and Investigator undertake to protect Sponsor Confidential Information (including but not limited to patent- relevant, scientific or technical information) against unauthorized access by third parties. If Sponsor Confidential Information is communicated via Internet Mail, use of Internet Mail Encryption Technology is compulsory (for direct communication between the Parties, Sponsor provides for a suitable technology at xxxx://xxxxxx.xxxxxxxxxx- xxxxxxxxx.xxx free of charge).
AutoNDA by SimpleDocs
Encryption Technology. The Company's Business as currently conducted complies with all U.S. applicable Laws, rules and regulations regarding encryption technology, including, without limitation, the import and export thereof. All CCAT's received by the Company are listed on Section 5.13(m) of the Company Disclosure Schedule.
Encryption Technology. The Receiving Party undertakes to protect Confidential Information (including but not limited to patent-relevant, scientific or technical information) against unauthorized access by third parties. If Confidential Information is communicated via Internet Mail, use of Internet Mail Encryption Technology is compulsory (for direct communication between the Parties, BOEHRINGER provides for a suitable technology at xxxx://xxxxxx.xxxxxxxxxx-xxxxxxxxx.xxx free of charge).
Encryption Technology. The Company Business as currently conducted complies with all U.S. Applicable Laws, rules and regulations regarding encryption technology, including, without limitation, the import and export thereof.
Encryption Technology. The Bank uses encryption technology to secure your Business Online Banking connection. When you go to the Bank’s website, you will see a secure padlock icon displayed if you have established a secure connection with the Bank. When the secure padlock icon properly displays, the information passed between your computer and the online banking server is encrypted in an effort to protect your private information. If you do not see a secure padlock icon, the website you have found may be a copycat website that was created by a fraudster to obtain your personal information. Do not input your username, password, answers to security questions or any other personal information. Close the Internet browser and immediately contact the Bank by telephone.
Encryption Technology. At least 128-bit encryption technology or its equivalent. - Individual User IDs and Passwords. Each person accessing the Premier Business Connect Service must have a User ID and individual Password. - Tokens. When our ACH Origination Service, Wire Transfer Service and/or Bill Payment Service are approved for use by you, an additional required security procedure incorporates use of a separate security device or token (“Token”) which generates a One-Time-Password for log-in functionality. A Token provides an additional layer of security and will be issued to authorized user(s) for use in gaining access to the above-described features and/or modules associated with the Services. Tokens may also be made available to you for use with other features of the Services upon request.
Encryption Technology. 31 2.38 Hart-Xxxxx-Xxxxxx Xxxpliance...................................................................31 2.39 Grants.........................................................................................31
AutoNDA by SimpleDocs
Encryption Technology. The Company's business as currently conducted and as currently proposed to be conducted does not involve the use or development of, or engagement in, encryption technology, and the Company's business as currently conducted and as currently proposed to be conducted does not require the Company to obtain a license from the Israeli Ministry of Defense or an authorized body thereof pursuant to Section 2(a) of the Control of Products and Services Declaration (Engagement in Encryption), 1974, as amended.
Encryption Technology. The Company Products do not include or use any encryption technology.
Encryption Technology. The Company and its Subsidiaries do not use or develop or engage in encryption technology or other technology whose development, commercialization or export is restricted under applicable Laws in Israel, and are not required to obtain a marketing, registration, export license or other relevant license from any of the Israeli Ministry of Economy, the Israeli Ministry of Defense, or any authorized body pursuant to Section 2(a) of the Israeli Control of Products and Services Declaration (Engagement in Encryption), 1974, as amended.
Time is Money Join Law Insider Premium to draft better contracts faster.