Security Domains Sample Clauses

Security Domains. The security architecture defines a set of distinct security domains that delimitate physical and logical units where a single and homogeneous security policy is valid and applied. Each domain has security policy that controls the behaviour of the security services being provided. Secure interaction between domains must be in accordance with agreed security policy governing this interaction. Agreed policies must be implemented within each individual domain. FLAME operates in a multi-domain environment where logical domains span multiple physical domains. The physical security domains (i.e. sites, platform and network) and their respective trust relationships. Each domain must implement security policy to protect their respective assets in accordance with the trusted relationships:
AutoNDA by SimpleDocs
Security Domains. The security architecture defines a set of distinct security domains that delimitate physical and logical units where a single and homogeneous security policy is valid and applied. Each domain has security policy that controls the behaviour of the security services being provided. Secure interaction between domains must be in accordance with agreed security policy governing this interaction. Agreed policies must be implemented within each individual domain. FLAME operates in a multi-domain environment where logical domains span multiple physical domains. The physical security domains (i.e. sites, platform and network) and their respective trust relationships. Each domain must implement security policy to protect their respective assets in accordance with the trusted relationships:  Infrastructure domain: A site that owns physical infrastructure that is used to deliver media services to participants, typically a building or a venue but also includes public spaces offered within cities. The infrastructure provider is the data controller for subjects within the domain and responsible for ensuring data protection including ensuring processing of data conducted by 3rd parties such as the Platform is performed in accordance with relevant regulations (e.g. EU Directive 95/46 and nation state implementations). The Infrastructure Provider must operate an IT infrastructure to manage and deliver media services including servers, desktops, laptops, and other devices connected to FLAME network entry points. The infrastructure must be protected in accordance with standards for information security (e.g., ISO/IEC 27001).

Related to Security Domains

  • Security Documents The due and punctual payment of the principal of, interest, Additional Amounts and premium, if any, on the Notes and any Note Guarantee when and as the same shall be due and payable, whether on an interest payment date, at maturity, by acceleration, repurchase, redemption or otherwise, and interest on the overdue principal of and interest and Additional Amounts (to the extent permitted by law), if any, on the Notes and any Note Guarantee and performance of all other obligations of the Issuer and any Guarantor to the Holders of Notes, the Trustee and the Security Agent under this Indenture, the Notes and any Note Guarantee, according to the terms hereunder or thereunder, are secured as provided in the Collateral Documents and the Intercreditor Agreement. Each Holder of Notes, by its acceptance thereof, consents and agrees to the terms of the Collateral Documents and the Intercreditor Agreement and any additional intercreditor agreement (including, without limitation, the provisions providing for foreclosure and release of Collateral and authorizing the Security Agent to enter into any Collateral Document on its behalf) as the same may be in effect or may be amended from time to time in accordance with its terms and authorizes and directs the Security Agent to enter into the Collateral Documents and the Intercreditor Agreement and any additional intercreditor agreement and to perform its obligations and exercise its rights thereunder in accordance therewith. The Issuer will deliver to the Trustee copies of all documents delivered to the Security Agent pursuant to the Collateral Documents, and the Issuer and the Parent will, and the Parent will cause each of its Restricted Subsidiaries to, do or cause to be done all such acts and things as may be required, or which the Security Agent from time to time may reasonably request, to assure and confirm to the Trustee that the Security Agent holds, for the benefit of the Trustee and the Holders, duly created, enforceable and perfected Liens as contemplated hereby and by the Collateral Documents and the Intercreditor Agreement, so as to render the same available for the security and benefit of this Indenture and of the Notes and any Note Guarantee secured hereby, according to the intent and purposes herein expressed. The Issuer and any Guarantor will each take, and will cause their respective Restricted Subsidiaries to take (including as may be requested by the Trustee) any and all actions reasonably required to cause the Collateral Documents and the Intercreditor Agreement to create and maintain, as security for the Obligations of the Issuer and any Guarantor hereunder, in respect of the Collateral, valid and enforceable perfected Liens in and on such Collateral ranking in right and priority of payment as set forth in the Intercreditor Agreement and subject to no other Liens other than as permitted by the terms of this Indenture and the Intercreditor Agreement.

  • Security Technology When the service is accessed using a supported web browser, Secure Socket Layer (“SSL”), or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall include server authentication and data encryption. Provider shall host data pursuant to the DPA in an environment using a firewall that is periodically updated according to industry standards.

  • Collateral The Collateral for this Note includes the Funding Agreement and the Guarantee specified on the face hereof.

  • Security Arrangements Infrastructure security of electric system equipment and operations and control hardware and software is essential to ensure day-to-day reliability and operational security. FERC expects the NYISO, the Connecting Transmission Owner, Market Participants, and Interconnection Customers interconnected to electric systems to comply with the recommendations offered by the President’s Critical Infrastructure Protection Board and, eventually, best practice recommendations from the electric reliability authority. All public utilities are expected to meet basic standards for system infrastructure and operational security, including physical, operational, and cyber-security practices.

  • Security and Charge 14.1 In consideration of the Contractor agreeing to supply the Materials, the Client charges all of its rights, title and interest (whether joint or several) in any land, realty or other assets capable of being charged, owned by the Client either now or in the future, to secure the performance by the Client of its obligations under these terms and conditions (including, but not limited to, the payment of any money).

  • SECURITY PROCESSES If requested by an Authorized User as part the Request for Quote process, Contractor shall complete a Consensus Assessment Initiative Questionnaire (CAIQ) including on an annual basis thereafter, if requested by the Authorized User. The CAIQ is available at Cloud Security Alliance (xxxxx://xxxxxxxxxxxxxxxxxxxxx.xxx/). The CAIQ may be used to assist the Authorized User in building the necessary assessment processes when engaging with Contractors. In addition to a request for a CAIQ, Contractor shall cooperate with all reasonable Authorized User requests for a Written description of Contractor’s physical/virtual security and/or internal control processes. The Authorized User shall have the right to reject any Contractor’s RFQ response or terminate an Authorized User Agreement when such a request has been denied. For example, Federal, State and local regulations and/or laws may require that Contractors operate within the Authorized User’s regulatory environment. In order to ensure that security is adequate and free of gaps in control coverage, the Authorized User may require information from the Contractor’s Service Organization Controls (SOC) audit report.

  • Security Agreement The words "Security Agreement" mean and include without limitation any agreements, promises, covenants, arrangements, understandings or other agreements, whether created by law, contract, or otherwise, evidencing, governing, representing, or creating a Security Interest.

  • Security and Access The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities Information Technology and Access Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Access Resources or other Company property or materials by others.

  • Collateral Assignment The Owner may assign this contract as collateral security. The Company is not responsible for the validity or effect of a collateral assignment. The Company will not be responsible to an assignee for any payment or other action taken by the Company before receipt of the assignment in writing at its Home Office. The interest of any beneficiary will be subject to any collateral assignment made either before or after the beneficiary is named. A collateral assignee is not an Owner. A collateral assignment is not a transfer of ownership. Ownership can be transferred only by complying with Section 8.2.

  • Intellectual Property Protection The Group Companies shall establish and maintain appropriate intellectual inspection system to protect the Proprietary Rights of the Group Companies. The Group Companies shall, and the Founders shall cause the Group Companies to fully comply with the laws and regulations in respect of the protection of the Proprietary Rights and refrain from infringing the Proprietary Rights of other parties. Ecommerce Company shall, and the other Warrantors shall procure Ecommerce Company to, use its best efforts to obtain as soon as possible and maintain the registration of the core trademarks used in the Business (including without limitation, the marks of “perfect diary”, “完美日记” and the combination of the foregoing) in the appropriate goods and services (including without limitation, cosmetics, cosmetics tools and advertisement). The Group Companies shall take all necessary or desirable actions to protect their trademarks, including initiating trademark petitions against any trademark applications filed by any third party for a trademark identical or similar to the Group Companies’ trademarks.

Time is Money Join Law Insider Premium to draft better contracts faster.