Additional Customer Obligations. A. Network and Device Forensics. In addition to those obligations set out on the Support Website, Customer shall provide to RSA daily scrubbed data activity logs, the case log file and the forensic data logs as further described in the Documentation. RSA will review these logs in order to provide the Maintenance Services hereunder and to improve forensic analysis of future Software Releases of the Product. Customer shall not transmit, send or otherwise provide, directly or indirectly, to EMC any data that is considered personally identifiable under the laws of the jurisdictions applicable to Customer’s installation and use of the Product and Customer’s operations, and shall indemnify EMC for all third party claims arising as a result of Customer’s breach of this obligation. B. Restrictions on use of the Geolocation Service and Information. Customer will not (a) reproduce or distribute the Geo- Location Service in a manner that allows its users to access the Geo-Location Service in any way other than through aggregate reports generated by the Product (as described in the Documentation); or (b) use the Information to create or otherwise support the transmission of unsolicited commercial email. The “SECURED BY RSA” logo has been designed as an indicator that the Bank is using the RSA Adaptive Authentication solution. It is designed for web and print use and is not intended to be a substitute for the corporate logo or for use in locations other than the web pages or promotional material of companies who have licensed or otherwise procured the RSA Adaptive Authentication service. Nor is the “SECURED BY RSA” mark to be used as a substitute for the corporate logo in places where the RSA corporate logo is appropriate. Logo files may be obtained by contacting ▇▇▇▇▇@▇▇▇.▇▇▇. It is to be used at the size indicated below. The logo consists of the RSA corporate logo beneath the words “SECURED BY”. These two components should not to be separated or changed; “SECURED BY” should always appear in the same proportions and relationship to the RSA corporate logo. In the Bank applications, the logo is to be seen only as a third-party mark that indicates the security features of Bank’s web site. Therefore, the following restrictions apply to use: A. The logo may not be enclosed by the Bank’s logo or other artwork so as to appear to be part of the Bank’s logo. B. The logo may be placed adjacent to the Bank’s logo or other artwork as long as there is sufficient empty (white) space between the two logos. Sufficient space is defined as .5 X (as shown in the correct usage diagram above) in any direction from the outer edges of the “SECURED BY RSA” logo.
Appears in 1 contract
Sources: License Agreement
Additional Customer Obligations. A. Network and Device Forensics. In addition to those obligations set out on the Support Website, Customer shall provide to RSA daily scrubbed data activity logs, the case log file and the forensic data logs as further described in the Documentation. RSA will review these logs in order to provide the Maintenance Services hereunder and to improve forensic analysis of future Software Releases of the Product. Customer shall not transmit, send or otherwise provide, directly or indirectly, to EMC any data that is considered personally identifiable under the laws of the jurisdictions applicable to Customer’s installation and use of the Product and Customer’s operations, and shall indemnify EMC for all third party claims arising as a result of Customer’s breach of this obligation.
B. Restrictions on use of the Geolocation Service and Information. Customer will not (a) reproduce or distribute the Geo- Location Service in a manner that allows its users to access the Geo-Location Service in any way other than through aggregate reports generated by the Product (as described in the Documentation); or (b) use the Information to create or otherwise support the transmission of unsolicited commercial email. The “SECURED BY RSA” RSA logo has been designed as an indicator that the Bank customer is using the RSA Adaptive Authentication solution. It is designed for web and print use and is not intended to be a substitute for the corporate logo or for use in locations other than the web pages or promotional material of companies who have licensed or otherwise procured the RSA purchased Adaptive Authentication serviceAuthentication. Nor is the “SECURED BY RSA” RSA mark to be used as a substitute for the corporate logo in places where the RSA Customer corporate logo is appropriate. This logo is not posted. Logo files may be obtained by contacting ▇▇▇▇▇@▇▇▇.▇▇▇the Identity Protection and Verification solutions group at RSA corporate headquarters. It is to be used at the size indicated below. The logo consists of the RSA corporate logo beneath brick and the words “SECURED BY”. These two components should not to be separated or changed; “SECURED BY” BY should always appear in the same proportions and relationship to the RSA corporate logonotched rectangle. In the Bank customer applications, the logo is to be seen only as a third-party mark that indicates the security features of Bankthe customer’s web site. Therefore, Therefore the following restrictions apply to use:
A. (i) The logo may not be enclosed by the BankCustomer’s logo or other artwork so as to appear to be part of the BankCustomer’s logo.
B. (ii) The logo may be placed adjacent to the Bankcustomer’s logo or other artwork as long as there is sufficient empty (white) space between the two logos. Sufficient space online is defined as .5 X (as shown in the correct usage diagram above) 20 pixels in any direction from the outer edges of the “SECURED BY RSA” RSA logo. Sufficient space in print is defined as .5 inches in any direction from the outer edges of the logo.
Appears in 1 contract
Sources: License Agreement
Additional Customer Obligations. A. Network and Device Forensics. In addition to those obligations set out on the Support Website, Customer shall provide to RSA daily scrubbed data activity logs, the case log file and the forensic data logs as further described in the Documentation. RSA will review these logs in order to provide the Maintenance Services hereunder and to improve forensic analysis of future Software Releases of the Product. Customer shall not transmit, send or otherwise provide, directly or indirectly, to EMC any data that is considered personally identifiable under the laws of the jurisdictions applicable to Customer’s installation and use of the Product and Customer’s operations, and shall indemnify EMC for all third party claims arising as a result of Customer’s breach of this obligation.
B. Restrictions on use of the Geolocation Service and Information. Customer will not (a) reproduce or distribute the Geo- Location Service in a manner that allows its users to access the Geo-Location Service in any way other than through aggregate reports generated by the Product (as described in the Documentation); or (b) use the Information to create or otherwise support the transmission of unsolicited commercial email. The “SECURED BY RSA” logo has been designed as an indicator that the Bank is using the RSA Adaptive Authentication solution. It is designed for web and print use and is not intended to be a substitute for the corporate logo or for use in locations other than the web pages or promotional material of companies who have licensed or otherwise procured the RSA Adaptive Authentication service. Nor is the “SECURED BY RSA” mark ▇▇▇▇ to be used as a substitute for the corporate logo in places where the RSA corporate logo is appropriate. Logo files may be obtained by contacting ▇▇▇▇▇@▇▇▇.▇▇▇. It is to be used at the size indicated below. The logo consists of the RSA corporate logo beneath the words “SECURED BY”. These two components should not to be separated or changed; “SECURED BY” should always appear in the same proportions and relationship to the RSA corporate logo. In the Bank applications, the logo is to be seen only as a third-party mark ▇▇▇▇ that indicates the security features of Bank’s web site. Therefore, the following restrictions apply to use:
A. The logo may not be enclosed by the Bank’s logo or other artwork so as to appear to be part of the Bank’s logo.
B. The logo may be placed adjacent to the Bank’s logo or other artwork as long as there is sufficient empty (white) space between the two logos. Sufficient space is defined as .5 X (as shown in the correct usage diagram above) in any direction from the outer edges of the “SECURED BY RSA” logo.
Appears in 1 contract
Sources: License Agreement