S ecurity Sample Clauses

S ecurity. 5.1 IGX shall provide an unconditional, revolving, standby irrevocable Letter of Credit (“LC”) to Transporter, in accordance with the GTA, in respect of any or all the GTA(s) that it has entered into with the Transporter on behalf of the respective buyers and such LC shall permit the Transporter to draw down amounts either wholly or partially on account of defaults in payments of invoices/ debit notes raised on the Buyer committed under such GTA (s) .
AutoNDA by SimpleDocs
S ecurity. Contractor shall comply with New York State Enterprise Information Security Office (EISO), Cyber Security Policy P03-002, NYSERDA’s Information Security Policy, and other New York State policies/procedures including but not limited to prevent unauthorized access to restricted areas of the Web Site and any databases or other sensitive material generated from or used in conjunction with the Web Site; and Contractor shall notify NYSERDA’s Information Security Office as soon as possible of any known security breaches or holes. Questions concerning this policy may be directed to the EISO (000) 000-0000, attn: Director. Or visit EISO at xxxxx://xxx.xxx.xx.xxx/eiso.
S ecurity. Company has adopted a written security policy that includes administrative, technical and physical safeguards that are intended to protect Customer’s Confidential Information from unauthorized access and use. However, the parties acknowledge and agree that the use of or connection to the Internet provides the opportunity for unauthorized third parties to circumvent such precautions and illegally gain access to Confidential Information. Accordingly, Company cannot and does not (and nothing in the Agreement is intended to) guarantee the privacy, security or authenticity of any information so transmitted over or stored in any system connected to the Internet. Unless otherwise authorised by Company, any Customer Information that is subject to specific legal requirements or safeguards regarding security and/or privacy shall be encrypted by Customer prior to transmission to Company.
S ecurity. Okta shall maintain appropriate administrative, physical, and technical safeguards to protect the security and integrity of the Service and the Customer Data as described in the applicable Okta Security and Privacy Documentation. Okta will conform with security protocols which are further described in Okta’s most recently completed Service Organization Control 2 (SOC 2) audit reports or other similar independent third-party annual audit report (“Audit Report”). Upon Customer’s request, Okta shall provide Customer with a copy of Okta’s then-current Audit Report. During the Term, Okta shall not materially diminish the protections provided by the controls set forth in Okta’s then-current Audit Report. Except with respect to a Free Trial Service, to the extent that Okta processes any Personal Data (as defined in the DPA) on Customer’s behalf in the provision of the Service, the data processing addendum at xxxxx://xxx.xxxx.xxx/trustandcompliance ("DPA") as may be updated by Okta if required by applicable Law, which are hereby incorporated by reference, shall apply and the parties agree to comply with such terms. For purposes of the Standard Contractual Clauses attached to the DPA, when and as applicable, Customer and its Affiliates are each the data exporter, and Customer's signing of or entering into this Agreement, and an applicable Affiliate's signing of or entering into an Order Form, shall be treated as signing of the Standard Contractual Clauses and their Appendices.
S ecurity. You understand the importance of your role in preventing misuse of your accounts and you agree to promptly examine your Statements for each of your First Federal accounts as soon as you receive/access it. You agree to protect the confidentiality of Your account and account number, and your user ID and password. You understand that your user ID and password by itself or together with information related to your account, may allow unauthorized access to your account. Data transferred via eStatements is not encrypted. You acknowledge that the internet is inherently insecure and that all data transfers, including electronic mail, occur openly in the internet and potentially can be monitored and read by others. We cannot and do not warrant that all data transfers utilizing the internet or email transmitted to and from us, will not be monitored or read by others.
S ecurity. You agree to take reasonable measures to protect the security of any devices you connect to the internet through the Service, including, without limitation, maintaining at your cost an up-to-date version of anti-virus and/or firewall software to protect your devices from malicious code, programs or other internal components (such as a computer virus, computer worm, computer time bomb or similar component). You expressly agree that if your computer or an internet connected device becomes infected and causes any of the prohibited activities listed in the Acceptable Use Policy, Viasat may immediately suspend your Service until such time as your computer is sufficiently protected to prevent further prohibited activities. You will be fully liable for all monthly fees and other charges under this Agreement during any period of suspension. Although Viasat has no obligation to monitor the Services or its network, Viasat and its authorized suppliers reserve the right to monitor bandwidth, usage, transmissions, and content from time to time in order to operate the Services, identify violations of this Agreement, or protect the Viasat network, the Services and other users of the Services. In all cases, you are solely responsible for the security of any device you choose to connect to the Service, including, without limitation, the security of any data stored or shared on such device(s).
S ecurity. Although Vibe will engage in reasonable steps to protect User’s personal information from loss, misuse, unauthorized access, alteration and/or disclosure, User recognizes and understands that Vibe cannot guaranty that such personal information will be completely secure or error-free due to the nature of the internet and internet transmissions.
AutoNDA by SimpleDocs
S ecurity. The Licensee shall ensure that the doors of the Equipment Room are closed and locked, before the Licensee or the Licensee’s employees leave the Equipment Room, so as to prevent waste or damage, and for any default or carelessness in this regard the Licensee shall make good all injuries sustained by the Licensor or other tenants or occupants of the Building. The Licensee shall keep the doors to the Equipment Room corridors closed and locked at all times when not in use. No additional locks or bolts of any kind shall be placed upon any of the doors or windows by any Licensee, nor shall any changes be made in existing locks or the mechanism thereof. Lock cylinders and keys shall be changed by the Licensor at the Licensee’s expense upon receipt of written request from the Licensee. The Licensee must, upon the expiration or sooner termination of its tenancy, return to the Licensor all keys and/or access cards either furnished to, or otherwise procured by, such Licensee, and in the event of the loss of any keys so furnished, the Licensee shall pay to the Licensor the cost of replacement keys. Building janitors and contract cleaners will be provided with a passkey to offices in the Building.
S ecurity. The District shall erect and maintain all signs, gates and fences for the Drop-Off Center. The District shall 'secure the Drop-Off Center during nonworking hours.
S ecurity. Customer acknowledges that RMI and Customer are responsible, respectively, only for the security of their own proprietary systems, and not for the systems of the other Party or any third- party, including without limitation any third-party supplier. It is the responsibility of each Party to put measures in place that protect any confidential information solely in its control. Customer is responsible for adding authorized users to its account, for maintaining the confidentiality of all account passwords, for ensuring that each account password is used only by the authorized user, for ensuring that accounts and passwords are not shared, and for maintaining the security of its account and of the equipment needed to connect to, access, or use RMI’s Services. Customer shall limit access to the Services only to authorized users. Customer shall notify RMI immediately if Customer becomes aware of or suspects a misuse or security breach.
Time is Money Join Law Insider Premium to draft better contracts faster.