Security Resources Sample Clauses

Security Resources. The Parties’ may, upon mutual agreement, provide resources from its security group to assist with an identified Data Security Breach for the purpose of meeting its obligations in relation to the notification of a Data Security Breach under Applicable Laws or other notification obligations or requirements.
AutoNDA by SimpleDocs
Security Resources. The next sections present three individual scenarios providing an example of each of the available security resource types. For each example, we choose to deploy the resource inside the ADS testbed. The newly created machine will be attached to the private network and OpenStack will provide a floating IP to reach the resource. In order to log on the machine, we provide our public SSH key. Below there are the yaml definition of the security resources available.
Security Resources. Dropbox provides the following Security Resources for these services: (a) the Dropbox Security Whitepaper available at xxxxx://xxx.xxxxxxx.xxx/static/business/resources/Security_Whitepaper.pdf; and
Security Resources. A Security Resource is a commonly used security agent that the Experimenter can include in her experiment. She can access and configure it through a static initial configuration, included in the TOSCA description of the Resource, or, once deployed, through a REST interface that exposes its main services. The Experimenter can also ask the Security Resource to send its log messages to a remote log collector, which makes them available in a simple web page reserved to her. The Experimenter could easily access it through its web browser and check the behaviour of her all security agents, and to see some statistics. The Experimenter can get the Security Resource in two different formats:  As an agent directly installed in the VM that she wants to monitor. The system will provide her a script that the Experimenter has just to run inside the VM. It will be already configured as required in the TOSCA description of the resource. The output of the script will provide to the Experimenter information on how to access the deployed resource (URLs, etc.)  As a standalone VM the Security Resource will be deployed directly by the Security Manager in the testbed chosen by the Experimenter. The Security Manager will take care of the initial configuration of the resource. The Experimenter has to set up on her own the redirection of the network traffic that she wants to control through the Security Resource VM (by means of tunnelling or SDN capabilities). To date the only Security Resource available on the SoftFIRE environment is the firewall.
Security Resources. Security Resources regarding these Services are available at xxxxx://xxx.xxxxxxxxx.xxx/trust/security.

Related to Security Resources

  • Additional Resources The WLSC may establish workgroups that include other department representatives and/or subject matter experts. These subcommittees will conform with rules established by the WLSC.

  • Water Resources Four (4) Union Stewards unless the unit falls below sixty (60) employees and then not more than two (2) Union Stewards.

  • Electric Storage Resources Developer interconnecting an electric storage resource shall establish an operating range in Appendix C of its LGIA that specifies a minimum state of charge and a maximum state of charge between which the electric storage resource will be required to provide primary frequency response consistent with the conditions set forth in Articles 9.5.5, 9.5.5.1, 9.5.5.2, and 9.5.5.3 of this Agreement. Appendix C shall specify whether the operating range is static or dynamic, and shall consider (1) the expected magnitude of frequency deviations in the interconnection; (2) the expected duration that system frequency will remain outside of the deadband parameter in the interconnection; (3) the expected incidence of frequency deviations outside of the deadband parameter in the interconnection; (4) the physical capabilities of the electric storage resource; (5) operational limitations of the electric storage resources due to manufacturer specification; and (6) any other relevant factors agreed to by the NYISO, Connecting Transmission Owner, and Developer. If the operating range is dynamic, then Appendix C must establish how frequently the operating range will be reevaluated and the factors that may be considered during its reevaluation. Developer’s electric storage resource is required to provide timely and sustained primary frequency response consistent with Article 9.5.5.2 of this Agreement when it is online and dispatched to inject electricity to the New York State Transmission System and/or receive electricity from the New York State Transmission System. This excludes circumstances when the electric storage resource is not dispatched to inject electricity to the New York State Transmission System and/or dispatched to receive electricity from the New York State Transmission System. If Developer’s electric storage resource is charging at the time of a frequency deviation outside of its deadband parameter, it is to increase (for over-frequency deviations) or decrease (for under-frequency deviations) the rate at which it is charging in accordance with its droop parameter. Developer’s electric storage resource is not required to change from charging to discharging, or vice versa, unless the response necessitated by the droop and deadband settings requires it to do so and it is technically capable of making such a transition.

  • Security Systems The Service may not be compatible with security systems. You may be required to maintain a telephone connection through your local exchange carrier in order to use any alarm monitoring functions for any security system installed in your home or business. You are responsible for contacting the alarm monitoring company to test the compatibility of any alarm monitoring or security system with the Service.

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • CONTRACTOR RESOURCES Contractor shall obtain approval in advance by the State, in consultation with the Agency, of all employees, independent contractors or agents proposed for each SOW-RFP Project (“Key Personnel”). Key Personnel shall be identified in each SOW Agreement. Contractor shall use reasonable efforts to make available all Key Personnel for the entire life of the SOW RFP Project. Contractor shall not change Key Personnel without providing the State written justification and obtaining prior written approval of the State. State approvals for replacement of Key Personnel will not be unreasonably withheld. The replacement of Key Personnel shall have comparable or greater skills and applied experience than being replaced and be subject to reference and background checks described above. If Contractor removes Key Personnel for any reason, Contractor agrees to provide replacement Key Personnel and shall provide the first thirty (30) days of such replacement resource(s) with equivalent skill at no charge. Notwithstanding the foregoing, the State acknowledges that Key Personnel may become unavailable due to termination of employment for any reason, through disability or death, illness, or through leave of absence such as FMLA or National Guard duty for example. In such circumstances, Contractor shall promptly notify the State in writing of the impending or actual departure of any Key Personnel and of the qualifications and identity of proposed replacement Key Personnel. The State has the right to reasonably disapprove of any replacement Key Personnel. If Key Personnel does not perform up to acceptable or professional standards as required in this Master Agreement or the SOW Agreement, Contractor shall, when notified by the State, either replace the employees, independent contractors or agents with approved employees, independent contractors or agents or take remedial action agreed by State to ensure that Contractor Resources are acceptable to the State for the SOW Agreement. The State’s right to request replacement of Contractor personnel hereunder relates solely to the removal of individuals from work on this Master Agreement and/or the particular SOW Agreement and does not create any employment or principal- agent relationship with the State. Nothing in this Master Agreement or any SOW Agreement entered into hereunder authorizes the State to direct the Contractor’s termination of, or other adverse action related to, the employment of any individual.

  • PROJECT FINANCIAL RESOURCES i) Local In-kind Contributions $0 ii) Local Public Revenues $0 iii) Local Private Revenues iv) Other Public Revenues: $0 - ODOT/FHWA $0 - OEPA $2,675,745 - OWDA $0 - CDBG $0 - Other $0 SUBTOTAL $2,675,745 v) OPWC Funds: - Loan $299,000 SUBTOTAL $299,000 TOTAL FINANCIAL RESOURCES $2,974,745

  • Password Security You are responsible for maintaining adequate security and control of any and all User IDs, Passwords, hints, personal identification numbers (PINs), or any other codes that you use to access the Account. Do not discuss, compare, or share information about your account number or password unless you are willing to give them full use of your money. Any loss or compromise of the foregoing information and/or your personal information may result in unauthorized access to your Account by third-parties and the loss or theft of any funds held in your Account and any associated accounts, including your Account. Checks and electronic withdrawals are processed by automated methods, and anyone who obtains your account number or access device could use it to withdraw money from your account, with or without your permission. You are responsible for keeping your email address and telephone number up to date in order to receive any notices or alerts that we may send you. We assume no responsibility for any loss that you may sustain due to compromise of your account login credentials due to no fault of ours and/or your failure to follow or act on any notices or alerts that we may send to you. If you believe your Account information has been compromised, or that someone has transferred or may transfer money from your account without your permission, contact us immediately, through Synapse, at xxxx@xxxxxxxxx.xxx or call at +0(000) 000-0000. You agree to promptly review all Account and transaction records and other Communications that we make available to you and to promptly report any discrepancy to us.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Engineer Resources The Engineer shall furnish and maintain quarters for the performance of all services, in addition to providing adequate and sufficient personnel and equipment to perform the services required under the contract. The Engineer certifies that it presently has adequate qualified personnel in its employment for performance of the services required under this contract, or it will be able to obtain such personnel from sources other than the State.

Time is Money Join Law Insider Premium to draft better contracts faster.