Authentication Credentials Sample Clauses
The Authentication Credentials clause establishes the requirements and procedures for verifying the identity of parties accessing a system or service. Typically, it outlines the types of credentials that must be used, such as usernames, passwords, or multi-factor authentication, and may specify how these credentials should be managed, stored, and updated. By setting clear standards for authentication, this clause helps protect sensitive information and ensures that only authorized individuals can access certain resources, thereby reducing the risk of unauthorized access or data breaches.
Authentication Credentials. Licensee must monitor and maintain the security and proper use of all Authentication Credentials issued by Licensee or by ▇▇▇▇▇▇ Mae for Licensee’s benefit and is solely responsible for all activities that occur through the use of such Authentication Credentials, whether or not the activities were authorized by Licensee. Authentication Credentials may not be transferred among Authorized Users or other individuals or systems. Licensee must take immediate steps to disable an Authorized User’s Authentication Credential if they cease to be associated with Licensee or no longer needs access to the Licensed Materials, and must immediately notify ▇▇▇▇▇▇ ▇▇▇ if there is any loss, theft or unauthorized disclosure or use of an Authentication Credential. Licensee must periodically review and update its Authorized Users’ access rights. ▇▇▇▇▇▇ Mae is not required to provide access to the Licensed Application to any individual or system, and reserves the right to refuse, change or revoke Authentication Credentials at any time. Licensee must revoke or reset Authentication Credentials as required by ▇▇▇▇▇▇ ▇▇▇, but in no event less than: (a) every ninety calendar days for individuals and
Authentication Credentials. You shall keep accounts and authentication credentials providing access to Products secure and confidential. You must notify Palo Alto Networks without undue delay about any misuse of your accounts or authentication credentials you become aware of.
Authentication Credentials. The User is responsible for maintaining the confidentiality of any non-public authentication credentials associated with its use of the Service.
Authentication Credentials. Company has sole control over access and use by its End Users, and Trend Micro shall not be responsible for any activity (whether authorized or unauthorized) occurring on Company’s Services account hereunder provided that such access does not arise as a result of Trend Micro failing to comply with its obligations under this Agreement. Company is responsible for maintaining the confidentiality of any non-public authentication credentials associated with its use of a Product. Company will ensure that all End Users comply with Company’s obligations under this Agreement and that the terms and conditions of Company’s agreement with each End User are consistent with this Agreement. If Company becomes aware of any breach or non-compliance of Company’s obligations under this Agreement by an End User or other third party, Company will immediately terminate such person’s access to a Product and notify Trend Micro. Further, Company is solely responsible for population, maintenance, security, protection, loss prevention, and backup of Company’s systems and networks, Company Data, and other content, information, and devices.
Authentication Credentials. Notwithstanding the provisions of the Section of the Master Terms entitled "Management of Authentication Credentials," Authentication Credentials that have been issued to Licensee for company-wide use may be shared and used between and among individuals who are employees of Licensee or that are independent or affiliate underwriting and quality control contractors of Licensee to access and use FTP.
Authentication Credentials. You must ensure that each Authentication Credential issued to You is securely maintained and used only by the individual or system to whom it was assigned. You must implement all reasonable and necessary measures to prevent transfers of Authentication Credentials between individuals or systems.
Authentication Credentials. Each Party shall have a user registration and deregistration procedure for systems that access, transmit or store Covered Information of the other Party with user accounts that are assigned to individuals assessing the system or particular work stations, which are only accessible by a limited number of identifiable employees of such Party whose access is strictly controlled and monitored. Each Party shall work in good faith to consider a reasonable procedure to issue individual user accounts for all roles, or implement compensating and reasonable controls to monitor use of shared user accounts. Default manufacturer passwords used in either Party’s products or Services shall be changed upon installation.
Authentication Credentials. The Bank shall not allow more than one person to use the same authentication credentials to access any Electronic Information. The Bank shall allow for separate authentication credentials by each Trust employee who may require access to its web site or system for any purpose related to this Agreement.
Authentication Credentials. Company has sole control over access and use by its End Users of SCC, and is responsible for ALL activity (whether authorized or unauthorized) occurring on Company's SCC account hereunder. Company is responsible for maintaining the confidentiality of any non-public authentication credentials associated with its access to and use of SCC. Company will ensure that all End Users comply with Company's obligations under these Terms of Use and that the terms and conditions of Company's agreement with each End User are consistent with these Terms of Use. If Company becomes aware of any breach or non-compliance of Company's obligations under these Terms of Use by an End User, Company will immediately terminate such End User's access to SCC and notify Cloudnosys. Further, Company is responsible for population, maintenance, security, protection, loss prevention, and backup of Company's systems, Company Data, and other content or information.
Authentication Credentials. The Company has implemented procedures and controls regarding management of authentication credentials such as private keys and means for instructing third-party custodians (“Authentication Credentials”) for cryptocurrencies and other digital tokens, including limitation of access to Authentication Credentials to employees who need to have such access, requiring multiple individuals to sign off on transactions, and regular rotation of keys. Where Authentication Credentials are not held by employees of the Company, such Authentication Credentials are held by reputable third-party custodians or wallet providers whose security procedures have been evaluated by the Company and found to be fit for purpose in all material respects.