Protection Measures Sample Clauses

Protection Measures. Verizon will implement appropriate technical and organizational measures to protect Regulated Customer Data against accidental or unlawful destruction or accidental loss, alteration, unauthorized disclosure or access and against other unlawful forms of processing which measures may for example relate to data handling practices, backup procedures and server, workstation and transmission security for internal communications.
AutoNDA by SimpleDocs
Protection Measures. OVHcloud shall implement protection against DOS and DDoS-type (Distributed Denial of Service) hacking attempts provided that these attacks are conducted in a manner reasonably considered to be serious enough by OVHcloud to justify such protection. In implementing such protection, the OVHcloud shall use reasonable endeavors to ensure that the operation of the Client’s Services is maintained throughout the duration of a DOS or DDoS attack. The function provided in this article involves monitoring the traffic sent to the Client’s Services from outside OVHcloud’s network. The traffic identified as illegitimate shall then be rejected by OVHcloud prior to reaching the Client’s Infrastructure, thus allowing legitimate users to access the applications offered by the Client in spite of the attack.
Protection Measures. The Seller has taken reasonable measures to protect the proprietary nature of each item of Seller Owned Intellectual Property, and to maintain in confidence all trade secrets and confidential information comprising a part thereof. The Seller has complied with all applicable contractual and legal requirements pertaining to information privacy and security. No complaint relating to an improper use or disclosure of, or a breach in the security of, any such information has been made or, to the knowledge of the Seller, threatened against the Seller. To the knowledge of the Seller, there has been no: (i) unauthorized disclosure of any third party proprietary or confidential information in the possession, custody or control of the Seller or (ii) breach of the Seller’s security procedures wherein confidential information has been disclosed to a third person. The Seller has actively policed the quality of all goods and services sold, distributed or marketed under each of its Trademarks and has enforced adequate quality control measures to ensure that no Trademarks that it has licensed to others shall be deemed to be abandoned.
Protection Measures. Company T has taken reasonable measures at a level that is not below reputable industry standards to maintain the confidentiality and value of all confidential information used or held for use in the operation of the business of Company T and its Subsidiaries, including the source code for any Company T Software and all other confidential Company T Intellectual Property. No material confidential information, trade secrets or other confidential Company T Intellectual Property have been disclosed by Company T to any Person except pursuant to non-disclosure and/or license agreements that obligate such Person to keep such confidential information, trade secrets or other confidential Company T Intellectual Property confidential and to the knowledge of Company T, no party thereto is in material default of any such agreement.
Protection Measures. The China Online Companies have taken reasonable measures consistent with industry standards to maintain the confidentiality and value of all confidential information used or held for use in the operation of the China Online Business, including the source code for any China Online Software or China Online Products and all other confidential China Online Intellectual Property. To the knowledge of SINA, no material confidential information, trade secrets or other confidential China Online Intellectual Property have been disclosed by the China Online Companies to any Person except pursuant to appropriate non-disclosure and/or license agreements that obligate such Person to keep such confidential information, trade secrets or other confidential China Online Intellectual Property confidential and to the knowledge of SINA, no party thereto is in material default of any such agreement.
Protection Measures. CRIC has taken reasonable measures consistent with industry standards to maintain the confidentiality and value of all confidential information used or held for use in the operation of the CRIC Business, including the source code for any CRIC Software or CRIC Products and all other confidential CRIC Intellectual Property. To the knowledge of CRIC, no material confidential information, trade secrets or other confidential CRIC Intellectual Property have been disclosed by CRIC to any Person except pursuant to appropriate non-disclosure and/or license agreements that obligate such Person to keep such confidential information, trade secrets or other confidential CRIC Intellectual Property confidential and to the knowledge of CRIC, no party thereto is in material default of any such agreement.
Protection Measures. The Company and each of its Subsidiaries has taken commercially reasonable measures to protect the proprietary nature of each item of its material proprietary Intellectual Property, and to maintain in confidence all trade secrets and confidential information comprising a part thereof. To the knowledge of the Company, there has been no material violation of the policies or practices of the Company or its Subsidiaries related to protection of Intellectual Property owned, licensed or used by the Company or its Subsidiaries or any confidentiality or nondisclosure Contract relating to the Intellectual Property owned by the Company or any of its Subsidiaries.
AutoNDA by SimpleDocs
Protection Measures. The Seller has taken reasonable measures to protect the proprietary nature of each item of Seller Owned Intellectual Property, if any, and to maintain in confidence all trade secrets and confidential information comprising a part thereof. To the Knowledge of Seller, Seller has complied with all applicable contractual and legal requirements pertaining to information privacy and security. No complaint relating to an improper use or disclosure of, or a breach in the security of, any such information has been made or, to the Knowledge of the Seller, is threatened against the Seller. To the Knowledge of the Seller, there has been no: (i) unauthorized disclosure of any third party proprietary or confidential information in the possession, custody or control of the Seller or (ii) breach of the Seller’s security procedures wherein confidential information has been disclosed to a third person.
Protection Measures. The Company has taken reasonable measures to protect the proprietary nature of each item of Company Owned Intellectual Property, and to maintain in confidence all trade secrets and confidential information comprising a part thereof. The Company has complied in all material respects with all applicable contractual and legal requirements pertaining to information privacy and security. No complaint relating to an improper use or disclosure of, or a breach in the security of, any such information has been made or, to the Knowledge of the Company, threatened against the Company. To the Knowledge of the Company, there has been no: (i) unauthorized disclosure of any third party proprietary or confidential information in the possession, custody or control of the Company or (ii) breach of the Company’s security procedures wherein confidential information has been disclosed to a third person.
Protection Measures. First of all, a good and effective governance of the Blockchain by the Governing Body is required. This means that the correct choice of organizations operating consensus nodes is of vital importance. Technical and organizational policies and guidelines are needed, which are obligatory for each consensus node. And there must exist rules concerning the admissibility of audits and the withdrawal of approval in case of violation of guidelines. On the technical level, consensus nodes must be protected by state-of-the-art network and endpoint security measures. Network security measures include but are not limited to correctly configured firewalls, intrusion detection and prevention systems and proper network segmentation. Endpoint security means hardened operating systems, regularly performed vulnerability scans and further measures.
Time is Money Join Law Insider Premium to draft better contracts faster.