Web Security Sample Clauses

Web Security. (WS) The WS service uses the USS infrastructure, notably two databases - LogDB and CoreDB - for log data and policy/rule/configuration data respectively - described in clause 2 of this Module B.
AutoNDA by SimpleDocs
Web Security a. The ASP will disclose the use of various web architecture and programming languages, including, but not limited to Java, JavaScript, ActiveX, PHP, Python, C, Perl, VBScript, etc.
Web Security. To prepare for our move to Secure Sockets Layer (SSL -- encrypted communication between servers and browsers) support for our websites, we chose xxxxxxxxx.xxx as the source of our SSL certificates. Xxxxxx notices:  Teleforms: Libraries reported that their patrons were not receiving “hold pickup” phone notices. The Teleforms log showed no problems and we could hear calls being made. When we listened closely, though, we could hear that “hold pickup” calls were being answered with the message, “You must dial an area code first.” All patron records in Sierra have area codes in their phone numbers, so we contacted III, who had us reapply a code and restart the server. That fixed the problem. There are other problems with Teleforms, though, that we continue to work with III to resolve.  Email: Some patrons report that they’re not receiving email notices. If not the usual suspect (Spam folder), then It may be that the volume of emails we send is causing ISPs to block us temporarily if they think we’re spammers. We’re trying to get whitelisted with Spectrum, since that’s one of the biggest ISPs and is used by many of the patrons who have reported this problem.  Sierra-cc: To log Sierra emails, we Bcc xxxxxx-xx@xxxx.xxx on every message. When looking at that account to troubleshoot a problem report, we saw that there were 1.2 million messages in the Inbox. We deleted all messages that were more than thirty days old, and installed a script that runs continually to delete old (> 30 days) messages automatically. (We send more than 85,000 hold and overdue emails a month.) Sierra changes:  On the recommendation of the Cataloging Advisory Council we added a new Material Type: Digital Media.  FTP problem: As a result (we think) of our hardening of security on our servers, EGRN and XXXX lost the ability to ftp content to their WordPress sites on our linux web server. We made some adjustments to correct this problem.  Sierra Item Types/Loan Rules: As part of the Cataloging Advisory Council’s project to simplify and reduce the number of Item Types and Loan Rules, Xxx worked with SNLK, BRUN, NASSS, and other libraries to analyze and change theirs.  New Item Type: At BETH’s request, we created a new Sierra Item Type - 121: Instrument.
Web Security. Supplier will provide Seagate with the process for doing security- specific quality assurance testing for the application, for example, testing of authentication, authorization, and accounting functions, as well as any other activity designed to validate the security architecture.
Web Security. 1. At University of Louisiana at Lafayette's discretion, the ASP may be required to disclose the specific configuration files for any web servers and associated support functions (such as search engines or databases).

Related to Web Security

  • JOB SECURITY 23.01 Subject to the willingness and capacity of individual employees to accept relocation and retraining, the Employer will make every reasonable effort to ensure that any reduction in the work force will be accomplished through attrition.

  • Network Security 10.1 Protection of Service and Property. Each Party shall exercise the same degree of care to prevent harm or damage to the other Party and any third parties, its employees, agents or End User Customers, or their property as it employs to protect its own personnel, End User Customers and property, etc.

  • Server Security Servers containing unencrypted PHI COUNTY discloses to 4 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 5 must have sufficient administrative, physical, and technical controls in place to protect that data, based 6 upon a risk assessment/system security review.

  • Cyber Security Except as disclosed in the Registration Statement and the Prospectus, (x)(i) to the knowledge of the Company, there has been no security breach or other compromise of or relating to any information technology and computer systems, networks, hardware, software, data, or equipment owned by the Company or its subsidiaries or of any data of the Company’s, the Operating Partnership’s or the Subsidiaries’ respective customers, employees, suppliers, vendors that they maintain or that, to their knowledge, any third party maintains on their behalf (collectively, “IT Systems and Data”) that had, or would reasonably be expected to have had, individually or in the aggregate, a Material Adverse Effect, and (ii) the Company, the Operating Partnership and the Subsidiaries have not received any written notice of, and have no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to their IT Systems and Data that had, or would reasonably be expected to have had, a Material Adverse Effect; (y) the Company, the Operating Partnership and the Subsidiaries are presently in compliance with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the protection of IT Systems and Data from a security breach or unauthorized use, access, misappropriation, modification or other compromise, except as would not, in the case of this clause (y), individually or in the aggregate, have a Material Adverse Effect; and (z) the Company, the Operating Partnership and the Subsidiaries have implemented commercially reasonable backup and disaster recovery technology.

  • Airport Security The Contractor shall be familiar with and conduct its operations in accordance with all regulations and directives of the Authority and the Transportation Security Administration, and any other federal, state or local government having jurisdiction over the airport, with respect to the maintenance of airport security.

  • Password Security You are responsible for maintaining adequate security and control of any and all User IDs, Passwords, hints, personal identification numbers (PINs), or any other codes that you use to access the Account. Do not discuss, compare, or share information about your account number or password unless you are willing to give them full use of your money. Any loss or compromise of the foregoing information and/or your personal information may result in unauthorized access to your Account by third-parties and the loss or theft of any funds held in your Account and any associated accounts, including your Account. Checks and electronic withdrawals are processed by automated methods, and anyone who obtains your account number or access device could use it to withdraw money from your account, with or without your permission. You are responsible for keeping your email address and telephone number up to date in order to receive any notices or alerts that we may send you. We assume no responsibility for any loss that you may sustain due to compromise of your account login credentials due to no fault of ours and/or your failure to follow or act on any notices or alerts that we may send to you. If you believe your Account information has been compromised, or that someone has transferred or may transfer money from your account without your permission, contact us immediately, through Synapse, at xxxx@xxxxxxxxx.xxx or call at +0(000) 000-0000. You agree to promptly review all Account and transaction records and other Communications that we make available to you and to promptly report any discrepancy to us.

  • Bid Security 2.1 Bid security, as a guarantee of good faith, in the form of a certified check, cashier's check, or bidder's bond, may be required to be submitted with this bid document, as indicated on the bid.

Time is Money Join Law Insider Premium to draft better contracts faster.