Security Information Sample Clauses

Security Information. The Client acknowledges that the Security Information is confidential and agrees that it is responsible for maintaining its confidentiality. The Client agrees that it must:
AutoNDA by SimpleDocs
Security Information. Siemens provides products and solutions with industrial security functions that support the secure operation of plants, systems, machines and networks. In order to protect plants, systems, machines and networks against cyber threats, it is necessary to implement – and continuously maintain – a holistic, state-of-the-art industrial security concept. Siemens’ products and solutions only form one element of such a concept. You are responsible to prevent unauthorized access to Your plants, systems, machines and networks. Such systems, machines and components should only be connected to the enterprise network or the internet if and to the extent such a connection is necessary and only when appropriate security measures (e.g. firewalls and/or network segmentation) are in place. Additionally, Siemens guidance on appropriate security measures should be taken into account. Please visit hereto xxxxx://xxx.xxxxxxx.xxx/industrialsecurity. Siemens’ products and solutions undergo continuous development to make them more secure. Siemens strongly recommends that updates are applied as soon as available and that the latest product versions are used. Use of product versions that are no longer supported, and failure to apply latest updates may increase customer’s exposure to cyber threats. To stay informed about the latest security threats, patches and other related measures, published, among, please subscribe to the Siemens Industrial Security RSS Feed under xxxxx://xxx.xxxxxxx.xxx/industrialsecurity and visit xxxx://xxx.xxxxxxx.xxx/cert/en/cert-security-advisories.htm.
Security Information. Agency shall comply with all privilege requirements and procedures set forth by the USDHS, USSS or other governmental entity. If Agency has custody of a record provided by City which contains details of security arrangements or investigations, Agency shall, as soon as practical and without delay, notify City of any request to disclose such record and shall follow the requirements of Section 13.5, below, prior to disclosure. For purposes of this Paragraph, the term “record” shall be broadly construed and shall include, but not be limited to, all documents, paper, electronic files, and other things containing information, irrespective of the form of that record or data, i.e. electronic, hard copy, voice recording, photograph, etc., unless such form is specified by law.
Security Information. Siemens provides products and solutions with industrial security functions that support the secure operation of plants, systems, machines and networks. In order to protect plants, systems, machines and networks against cyber threats, it is necessary to implement – and continuously maintain – a holistic, state-of-the-art industrial security concept. Siemens’ products and solutions only form one element of such a concept. You are responsible to prevent unauthorized access to Your plants, systems, machines and networks. Systems, machines and components should only be connected to the enterprise network or the internet if and to the extent such a connection is necessary and with appropriate security measures (e.g. use of firewalls and network segmentation) in place. For additional information on industrial security measures that may be implemented, please visit xxxxx://xxx.xxxxxxx.xxx/industrialsecurity. Siemens’ products and solutions undergo continuous development to make the more secure. Siemens strongly recommends to apply product updates as soon as available and to always use the latest product versions. Use of product versions that are no longer supported, and failure to apply latest updates may increase customer’s exposure to cyber threats. To stay informed about product updates, subscribe to the Siemens Industrial Security RSS Feed under xxxxx://xxx.xxxxxxx.xxx/industrialsecurity.
Security Information. Important Information When Traveling Outside The United States – If you plan to travel outside the U.S., please contact a bankcard representative at 0-000-000-0000. For security reasons, some foreign countries may be blocked or have certain restrictions. Your account is also protected by a fraud monitoring system that uses sophisticated technologies that seeks out and identifies suspicious card activity on your behalf. Fraud is serious business. Therefore, if high risk or suspicious activity occurs, you may receive calls from security analysts to confirm activity. In some cases your account may be temporarily blocked until validity of charges is confirmed.
Security Information. 11.1.1 Your Transaction Platform Account is the record of your activities and transactions on the Transaction Platform. You can get details of your Transaction Platform Account through the Call Centre or when you log-in to the Transaction Platform Website.
Security Information. 3.6. Except where otherwise provided in this clause 3.6, you are responsible for paying any losses, fees or charges arising from Trades entered into or instructions given using your Account number and Security Information. You will not be responsible for any losses after we receive a request from you that we stop using any item of the Security Information. You will also not be responsible for any losses where we have been negligent in allowing a person you have not authorised to access your Account, or where it can be shown that a person has gained access to our Trading Platform by abuse of our systems except where such loss results from your failure to comply with clause 3.5 or 27.5. If you fail to comply with these clauses then you will be liable for the resulting loss. Please note that we do not restrict the domain from which any person can access the Trading Platform.
AutoNDA by SimpleDocs
Security Information. We are aware of the many instances of data security breaches and continue to work on new ways to protect your information. For our most sensitive databases, we use encrypted formats within controlled and secure environments that have restricted access. Although we work to ensure the integrity and security of our network and computer systems, we cannot guarantee that our security measures will prevent unauthorized access.
Security Information. As soon as possible following the date hereof, Sellers shall make available to Purchaser the appropriate personnel to discuss the Acquired Subsidiaries' information security policies, experiences complying with such policies and material breach of such policies.
Security Information. Show Management will provide reasonable security protection when exhibits are closed, but the safekeeping of the exhibitor’s property shall remain the responsibility of the exhibitor. Each exhibitor is encouraged to purchase a portal-to- portal rider (available at a nominal cost) on their own insurance policy, protecting them against loss through theft, fire, damage, etc. Please do not leave valuables such as laptops, PDA’s, purses, briefcases, plasma screens and cell phones unattended in your booth at any time. If you will be leaving valuables in your booth overnight, we recommend that you retain the services of the official security company for your booth. Sound Regulations In general, exhibitors may use sound equipment in their booths so long as the noise level does not disrupt the activities of neighboring exhibitors. Speakers and other sound devices should be positioned to direct sound into the booth rather than into the aisle. Rule of thumb: Sound and noise should not exceed 85 decibels.
Time is Money Join Law Insider Premium to draft better contracts faster.