Security Process Sample Clauses

Security Process. Before launch of the Services, Customer shall provide Google with a written list of Valid IP Addresses, and Google shall provide Customer a Client Name. All search queries sent to Google by or on behalf of the Customer must contain the Client Name and must use a Valid IP Address. Google shall have the right to immediately discontinue providing Services to IP addresses that are not Valid IP Addresses. Any modifications to the initial list of Valid IP Addresses provided to Google by Customer must be made in a written document executed by both parties or online via the Google Administration Console.
AutoNDA by SimpleDocs
Security Process. Within 5 days after the Effective Date, Customer shall provide Google with an initial written list of Valid IP Addresses, and Google shall provide Customer a Client Name. Upon mutual agreement and as required by this Agreement, Google shall provide Customer additional Client Names from time to time. All search queries sent to Google by or on behalf of the Customer must contain the Client Name and must use a Valid IP Address. Google shall have the right to immediately discontinue providing Services to IP addresses that are not Valid IP Addresses. Any modifications to the initial list of Valid IP Addresses provided to Google by Customer must be made in a written document executed by both parties or online via the Google Administration Console.
Security Process. Customer shall provide Google with its list of Valid IP Addresses, and Google shall provide Customer with [*] or Client Names, as required under this Agreement and as reasonably requested by Customer from time to time. In addition, Customer will deploy such number of [*] or Client Names as Google may reasonably request [*]. All search queries sent to Google by or on behalf of Customer must contain the Client Name and must use a valid IP address. Google shall have the right to immediately discontinue providing the Services to IP addresses that are not valid IP addresses. [*].
Security Process. The security Process required by this Policy is based upon the cyclical approach to information Technology security described in ISO 27002:2005 and related standards. In summary, each cycle of the Process includes the following steps:

Related to Security Process

  • Security Procedure The Client acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Client from Security Procedures offered by State Street. The Client agrees that the Security Procedures are reasonable and adequate for its wire transfer transactions and agrees to be bound by any payment orders, amendments and cancellations, whether or not authorized, issued in its name and accepted by State Street after being confirmed by any of the selected Security Procedures. The Client also agrees to be bound by any other valid and authorized payment order accepted by State Street. The Client shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated in writing to State Street. The Client must notify State Street immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Client’s authorized personnel. State Street shall verify the authenticity of all instructions according to the Security Procedure.

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Security / Passwords 2.1. A digital certificate and/or an encryption key may be required to access certain Services. You may apply for a digital certificate and/or an encryption key by following the procedures set forth at xxxx://xxx.xxx.xxx/certs/. You also will need an identification code (ID) and password(s) (Password) to access the Services.

  • Security Service Tenant acknowledges and agrees that, while Landlord may patrol the Project, Landlord is not providing any security services with respect to the Premises and that Landlord shall not be liable to Tenant for, and Tenant waives any claim against Landlord with respect to, any loss by theft or any other damage suffered or incurred by Tenant in connection with any unauthorized entry into the Premises or any other breach of security with respect to the Premises.

  • Security Services CONTRACTOR shall provide security services designed for preventing escapes, maintaining order, providing care, custody, control, supervision and management of the inmate population. A successful security program depends heavily on staff training, effective administration, and the establishment of inmate programs. The organization, staffing, and administration of the security program are vital to the Facility. The direction provided by a well-organized and clearly articulated operations manual, and emergency planning provides a solid base for successful administration. The final operations manual shall be submitted to the Bureau prior to the Service Commencement Date and shall be reviewed annually and updated as needed. Documentation of the review shall be provided annually to the On- Site Contract Monitor. Changes to the plan require written permission by the Contract Manager. The Department reserves the right to require changes to plans submitted to the Bureau.

  • Secured Party Access Permit the Agent, by the Agent's representatives and agents, to enter any premises where all or any part of the Collateral, or the books and records relating thereto, or both, are located, to take possession of all or any part of the Collateral and to remove all or any part of the Collateral.

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • FORM AND SECURITY PROCEDURES Proper Instructions may be in writing signed by the authorized individual or individuals or may be in a tested communication or in a communication utilizing access codes effected between electro-mechanical or electronic devices or may be by such other means and utilizing such intermediary systems and utilities as may be agreed to from time to time by the Custodian and the individual or organization giving the instruction, provided that the Fund has followed any security procedures agreed to from time to time by the applicable Fund and the Custodian including, but not limited to, the security procedures selected by the Fund by reference to the form of Funds Transfer Addendum hereto, the terms of which are part of this Agreement. The Custodian may agree to accept oral instructions, and in such case oral instructions will be considered Proper Instructions. The Fund shall cause all oral instructions to be confirmed in writing, but the Fund’s failure to do so shall not affect the Custodian’s authority to rely on the oral instructions.

  • Secured Party Control Bank, Secured Party, Servicer and Company each agree that Bank will comply with instructions given to Bank by Secured Party directing disposition of funds in the Collateral Accounts (“Disposition Instructions”) without further consent by Company or Servicer. Except as otherwise required by law, Bank will not agree with any third party to comply with instructions for disposition of funds in the Collateral Accounts originated by such third party.

Time is Money Join Law Insider Premium to draft better contracts faster.