Intercept-and-resend attack Sample Clauses

Intercept-and-resend attack. Eve intercepts all qubits from followers to leader. And she measures them to try to get the operations performed by followers. However, she doesn’t know what the qubits state and position is, prepared at step III-B4. She may change the qubit states prepared by followers, and she will be discovered according to the 1 probability with
AutoNDA by SimpleDocs

Related to Intercept-and-resend attack

  • Intercept Devices 26.1.1.1 Local and federal law enforcement agencies periodically request information or assistance from local telephone service providers. When either Party receives a request associated with an End User of the other Party, it shall refer such request to the Party that serves such End User, unless the request directs the receiving Party to attach a pen register, trap-and-trace or form of intercept on the Party's facilities, in which case that Party shall comply with any valid request.

  • Intercept and Referral Announcements 6.1 When a Customer changes its service provider from Verizon to CBB, or from CBB to Verizon, and does not retain its original telephone number, the Party formerly providing service to such Customer shall provide a referral announcement (“Referral Announcement”) on the abandoned telephone number which provides the Customer’s new number or other appropriate information, to the extent known to the Party formerly providing service. Notwithstanding the foregoing, a Party shall not be obligated under this Section to provide a Referral Announcement if the Customer owes the Party unpaid overdue amounts or the Customer requests that no Referral Announcement be provided.

  • Malicious Use of Orphan Glue Records Registry Operator shall take action to remove orphan glue records (as defined at xxxx://xxx.xxxxx.xxx/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct.

  • Trespass, vandalism and animals Without prejudice to the other provisions of this contract, each of the parties shall use all reasonable endeavours (including participating in such consultation and joint action as is reasonable in all the circumstances) to reduce:

  • Musculoskeletal Injury Prevention and Control (a) The Hospital in consultation with the Joint Health and Safety Committee (JHSC) shall develop, establish and put into effect, musculoskeletal prevention and control measures, procedures, practices and training for the health and safety of employees.

  • Contact with Third Parties In the event that Supplier receives a request from a third party (including an individual) to access any Personal Information in Supplier’s possession, Supplier will promptly forward a copy of such request to DXC and will cooperate with DXC in responding to any such request. Upon DXC’s request, Supplier will make Personal Information in its possession available to DXC or any Third Party designated in writing by DXC and will update Personal Information in Supplier’s possession in accordance with DXC's written instructions. If any government or competent authority requests Supplier to disclose or allow access to Personal Information, Supplier shall, unless legally prohibited, immediately notify DXC of such request and shall not disclose or allow access to such Personal Information without first giving DXC an opportunity to consult with the requesting government or authority to seek to prevent such disclosure or access. Supplier will respond to any such government or enforcement authority request only after consultation with DXC and at DXC’s discretion, unless otherwise required by law. Supplier shall promptly notify DXC if any complaints are received from Third Parties about its Processing of Personal Information, and Supplier shall not make any admissions or take any action that may be prejudicial to the defense or settlement of any such complaint. Supplier shall provide DXC with such reasonable assistance as it may require in connection with resolving any such complaint.

  • Indirect Materials An indirect material shall be treated as an originating material without regard to where it is produced and its value shall be the cost registered in the accounting records of the producer of the good.

  • Fraud, Waste, and Abuse Contractor understands that HHS does not tolerate any type of fraud, waste, or abuse. Violations of law, agency policies, or standards of ethical conduct will be investigated, and appropriate actions will be taken. Pursuant to Texas Government Code, Section 321.022, if the administrative head of a department or entity that is subject to audit by the state auditor has reasonable cause to believe that money received from the state by the department or entity or by a client or contractor of the department or entity may have been lost, misappropriated, or misused, or that other fraudulent or unlawful conduct has occurred in relation to the operation of the department or entity, the administrative head shall report the reason and basis for the belief to the Texas State Auditor’s Office (SAO). All employees or contractors who have reasonable cause to believe that fraud, waste, or abuse has occurred (including misconduct by any HHS employee, Grantee officer, agent, employee, or subcontractor that would constitute fraud, waste, or abuse) are required to immediately report the questioned activity to the Health and Human Services Commission's Office of Inspector General. Contractor agrees to comply with all applicable laws, rules, regulations, and System Agency policies regarding fraud, waste, and abuse including, but not limited to, HHS Circular C-027. A report to the SAO must be made through one of the following avenues: ● SAO Toll Free Hotline: 1-800-TX-AUDIT ● SAO website: xxxx://xxx.xxxxx.xxxxx.xx.xx/ All reports made to the OIG must be made through one of the following avenues: ● OIG Toll Free Hotline 0-000-000-0000 ● OIG Website: XxxxxxXxxxxXxxxx.xxx ● Internal Affairs Email: XxxxxxxxXxxxxxxXxxxxxxx@xxxx.xxxxx.xx.xx ● OIG Hotline Email: XXXXxxxxXxxxxxx@xxxx.xxxxx.xx.xx. ● OIG Mailing Address: Office of Inspector General Attn: Fraud Hotline MC 1300 P.O. Box 85200 Austin, Texas 78708-5200

  • Management of Special and Technical Environment Each certificated support person demonstrates an acceptable level of performance in managing and organizing the special materials, equipment and environment essential to the specialized programs.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

Time is Money Join Law Insider Premium to draft better contracts faster.