Identification of Cyber Threats Sample Clauses

Identification of Cyber Threats. If The Participating Public Agency identifies or otherwise becomes aware of any vulnerabilities or other Cyber Threats relating to the Deliverables for which Contractor has not released a Patch, The Participating Public Agency shall promptly notify Contractor of such vulnerability or other Cyber Threat(s) via the Contractor Report a Vulnerability page (xxxxx://xxx.xx.xxx/ww/en/work/support/cybersecurity/report-a-vulnerability.jsp#Region 4 ESCs) and further provide Contractor with any reasonably requested information relating to such vulnerability (collectively, “Feedback”). Contractor shall have a non-exclusive, perpetual and irrevocable right to use, display, reproduce, modify, and distribute the Feedback (including any confidential information or intellectual property contained therein) in whole or part, including to analyze and fix the vulnerability, to create Patches or Updates for its customers, and to otherwise modify its Deliverables, in any manner without restrictions, and without any obligation of attribution or compensation to The Participating Public Agency; provided, however, Contractor shall not publicly disclose The Participating Public Agency’s name in connection with such use or the Feedback (unless The Participating Public Agency consents otherwise). By submitting Feedback, The Participating Public Agency represents and warrants to Contractor that The Participating Public Agency has all necessary rights in and to such Feedback and all information it contains, including to grant the rights to Contractor t such Feedback does not infringe any proprietary or other rights of third parties or contain any unlawful information.
AutoNDA by SimpleDocs
Identification of Cyber Threats. If Customer identifies or otherwise becomes aware of any vulnerabilities or other Cyber Threats relating to the Deliverables for which ESCO has not released a Patch, Customer shall promptly notify ESCO of such vulnerability or other Cyber Threat(s) via the ESCO Report a Vulnerability page (xxxxx://xxx.xx.xxx/ww/en/work/support/cybersecurity/report-a- vulnerability.jsp#Customers) and further provide ESCO with any reasonably requested information relating to such vulnerability (collectively, “Feedback”). ESCO shall have a non-exclusive, perpetual and irrevocable right to use, display, reproduce, modify, and distribute the Feedback (including any confidential information or intellectual property contained therein) in whole or part, including to analyze and fix the vulnerability, to create Patches or Updates for its customers, and to otherwise modify its Deliverables, in any manner without restrictions, and without any obligation of attribution or compensation to Customer; provided, however, ESCO shall not publicly disclose Customer’s name in connection with such use or the Feedback (unless Customer consents otherwise). By submitting Feedback, Customer represents and warrants to ESCO that Customer has all necessary rights in and to such Feedback and all information it contains, including to grant the rights to ESCO described herein, and that such Feedback does not infringe any proprietary or other rights of third parties or contain any unlawful information.
Identification of Cyber Threats. If Owner identifies or otherwise becomes aware of any vulnerabilities or other Cyber Threats relating to the Products, Software, or Services for which Uniflair has not released a Patch, Owner shall promptly notify Uniflair of such vulnerability or other Cyber Threat(s) via the Schneider Report a Vulnerability page
Identification of Cyber Threats. If Customer identifies or otherwise becomes aware of any vulnerabilities or other Cyber Threats relating to the Products, Software, or Services for which Company has not released a Patch, Customer shall promptly notify Company of such vulnerability or other Cyber Threat(s)via the Company's Report a Vulnerability page (https:xxxxx.xx.xxx/ww/en/work/support/cybersecurity/report-a-vulnerability.jsp#Customers}and further provide Company with any reasonably requested information relating to such vulnerability (collectively, "Feedback"}.Company shall have a non-exclusive, perpetual and irrevocable right to use, display, reproduce, modify, and distribute the Feedback(including any confidential information or intellectual property contained therein} in whole or part, including to analyze and fix the vulnerability, to create Patches or Updates for its customers, and to otherwise modify its Products, Software, or Services, in any manner without restrictions, and without any obligation of attribution or compensation to Customer; provided, however, Company shall not publicly disclose Customer's name in connection with such use or the Feedback(unless Customer consents otherwise}. By submitting Feedback, Customer represents and warrants to Company that Customer has all necessary rights in and to such Feedback and all information it contains, including to grant the rights to Company described herein, and that such Feedback does not infringe any proprietary or other rights of third parties or contain any unlawful information.

Related to Identification of Cyber Threats

  • Identification of Goods Identification of the goods shall not be deemed to have been made until both Buyer and Seller have agreed that the goods in question are to be appropriate to the performance of this Agreement.

  • Identification Badges Identification badges will be supplied by Advanced Behavioral Health (ABH) to all credentialed individuals who are providing services to children. Badges must be presented to the child/youth and any present adults at the time of service and must be worn for the duration of the service. Badges will be updated every two years during the re- credentialing process. Any individual or agency who fails to submit a photo ID to ABH within the designated timeframe will have their credentialing status terminated.

  • Non-Identification Approved Users agree not to use the requested datasets, either alone or in concert with any other information, to identify or contact individual participants from whom data and/or samples were collected. Approved Users also agree not to generate information (e.g., facial images or comparable representations) that could allow the identities of research participants to be readily ascertained. These provisions do not apply to research investigators operating with specific IRB approval, pursuant to 45 CFR 46, to contact individuals within datasets or to obtain and use identifying information under an 2 The project anniversary date can be found in “My Projects” after logging in to the dbGaP authorized-access portal. IRB-approved research protocol. All investigators including any Approved User conducting “human subjects research” within the scope of 45 CFR 46 must comply with the requirements contained therein.

  • Client identification 9.1. The Company has the right to require the Client to confirm his/her registration information specified when opening a trading account. To do so, the Company may ask the Client at its own discretion and at any time to provide a notarized electronic copy of his/her identification document, bank statement or public utilities xxxx as a proof of residence. In particular cases, the Company may ask the Client to provide a photo of him/her holding his/her ID near his/her face. The detailed client identification requirements are set out in the “AML policies” section on the Company’s official site.

  • Certification Regarding Prohibition of Certain Terrorist Organizations (Tex Gov. Code 2270) Vendor certifies that Vendor is not a company identified on the Texas Comptroller’s list of companies known to have contracts with, or provide supplies or services to, a foreign organization designated as a Foreign Terrorist Organization by the U.S. Secretary of State. Does Vendor certify? Yes, Vendor certifies Certification Regarding Prohibition of Boycotting Israel (Tex. Gov. Code 2271) If (a) Vendor is not a sole proprietorship; (b) Vendor has ten (10) or more full-time employees; and (c) this Agreement or any agreement with a TIPS Member under this procurement has value of $100,000 or more, the following certification shall apply; otherwise, this certification is not required. Vendor certifies, where applicable, that neither the Vendor, nor any affiliate, subsidiary, or parent company of Vendor, if any, boycotts Israel, and Vendor agrees that Vendor and Vendor Companies will not boycott Israel during the term of this Agreement. For purposes of this Agreement, the term “boycott” shall mean and include refusing to deal with, terminating business activities with, or otherwise taking any action that is intended to penalize, inflict economic harm on, or limit commercial relations with Israel, or with a person or entity doing business in Israel or in an Israeli-controlled territory but does not include an action made for ordinary business purposes. When applicable, does Vendor certify? Yes, Vendor certifies 5 Certification Regarding Prohibition of Contracts with Certain Foreign-Owned Companies (Tex. Gov. 5 Code 2274) Certain public entities are prohibited from entering into a contract or other agreement relating to critical infrastructure that would grant Vendor direct or remote access to or control of critical infrastructure in this state, excluding access specifically allowed by a customer for product warranty and support purposes. Vendor certifies that neither it nor its parent company nor any affiliate of Vendor or its parent company, is (1) owned by or the majority of stock or other ownership interest of the company is held or controlled by individuals who are citizens of China, Iran, North Korea, Russia, or a designated country; (2) a company or other entity, including governmental entity, that is owned or controlled by citizens of or is directly controlled by the government of China, Iran, North Korea, Russia, or a designated country; or (3) headquartered in China, Iran, North Korea, Russia, or a designated country. For purposes of this certification, “critical infrastructure” means “a communication infrastructure system, cybersecurity system, electric grid, hazardous waste treatment system, or water treatment facility.” Vendor certifies that Vendor will not grant direct or remote access to or control of critical infrastructure, except for product warranty and support purposes, to prohibited individuals, companies, or entities, including governmental entities, owned, controlled, or headquartered in China, Iran, North Korea, Russia, or a designated country, as determined by the Governor. When applicable, does Vendor certify? Yes, Vendor certifies 5 Certification Regarding Prohibition of Discrimination Against Firearm and Ammunition Industries (Tex.

  • Identification Cards Identification (“ID”) cards are issued by Us for identification purposes only. Possession of any ID card confers no right to services or benefits under this Contract. To be entitled to such services or benefits, Your Premiums must be paid in full at the time that the services are sought to be received.

Time is Money Join Law Insider Premium to draft better contracts faster.