Content Security Clause Samples

A Content Security clause establishes rules and requirements for protecting the confidentiality, integrity, and proper use of content shared or created under an agreement. It typically outlines measures such as restricting unauthorized access, implementing security protocols, and specifying how content should be stored or transmitted. This clause serves to safeguard sensitive or proprietary information, reducing the risk of data breaches and ensuring that all parties handle content responsibly.
POPULAR SAMPLE Copied 2 times
Content Security. If NVIDIA discovers a security flaw in Content and requests you to correct the flaw, you shall respond to NVIDIA within 24 hours of such request with a resolution or a written resolution plan and the estimated time for delivery of a resolution.
Content Security. Except as otherwise provided in the Terms and Conditions, the Customer is solely responsible for the security of its content, including any access to content that the Customer may provide to its employees, clients, or other third parties, and when such content is in transit to and from the Service. The Customer agrees to implement such security measures as are reasonable for its use of the Service and shall maintain appropriate steps regarding the protection and backup of its content. The Customer is responsible for complying with any laws or regulations that might apply to its content and is responsible for any losses or other consequences arising from its failure to encrypt or back up its content.
Content Security. During the Term of this agreement, MNP will implement and maintain commercially reasonable administrative, physical and technical safeguards and measures to protect against unauthorized access to your data on the Client Portal.
Content Security. Because it is not possible to guarantee data security, you acknowledge that it may be possible for an unauthorized third party to access your Content, and you agree that, in such event, any loss that you may suffer is subject to the limitation of liability section of these Terms.
Content Security a. Licensee shall promptly take all steps reasonably necessary to protect the copyright in the Package (and each Picture) and protect all material manufactured or delivered hereunder to prevent the unauthorized exploitation of the Package or the doing of any act which infringes upon any rights in or to the Package, or any materials manufactured or delivered hereunder. Licensee shall exercise all due care in handling, storing and safe-guarding all such material in order to prevent loss or damage thereto and unauthorized duplication or reproductions of the Package. Violation of this clause with respect to the Package shall constitute cause for termination of any and all rights granted herein to Licensee if such violation is not cured within five (5) days of receipt of notice from FilmBuff specifying the violation. b. Licensee will use industry standard (i.e., approved by at least one major or “mini-major” motion picture studio or major television network, as such terms are commonly understood in the entertainment business in the United States) security measures intended to prevent theft, pirating, unauthorized exhibition, unauthorized copying, or unauthorized duplication of the Package. c. Licensee shall ensure that no Picture is transmitted (and shall ensure that no transmission of the Package “spills over”), or otherwise made available, in any area that is not within the Territory. Licensee shall utilize, and will ensure that all third parties authorized to exhibit, transmit, or distribute the Package in the Territory utilize “IP address look-up” or similar technology that is designed to determine whether a viewer or purchaser’s IP address is within the Territory. If the IP address look-up technology indicates that the viewer’s IP address is not within the Territory, the exhibition or transmission of the Package to such viewer shall not be permitted. Where IP address look-up is not used to determine a viewer’s location, a comparable technology must be used to ensure that the viewer or purchaser is located within the Territory. d. The content security technologies that are applied to the Package in connection with Licensee’s exploitation of the Package, or used by any third party authorized to exhibit the Package in the Territory, shall offer the best available level of protection that is applied to the content of any other party licensor of audiovisual content to Licensee, provided that such measures must at minimum be industry standard (i.e., approved by ...
Content Security. Turbo Flash Publications shall ensure that the content provided by you shall be kept confidential. Neither Turbo Flash Publications nor any third parties associated with Turbo Flash Publications shall involve in any act that would compromise the security of the content before, during and after the work is published.
Content Security. Except as otherwise provided in the Terms and Conditions, the Member is solely responsible for the security of its content, including any access to content that the Member may provide to its employees, clients, or other third parties, and when such content is in transit to and from the Service. The Member agrees to implement such security measures as are reasonable for its use of the Service and shall maintain appropriate steps regarding the protection and backup of its content. The Member is responsible for complying with any laws or regulations that might apply to its content and is responsible for any losses or other consequences arising from its failure to encrypt or back up its content.

Related to Content Security

  • Payment Security To secure all of CAISO’s payment obligations to Owner under this Agreement, CAISO agrees to grant Owner a security interest and lien in the following collateral (collectively, the “Collateral”): (a) all past, present and future accounts and other amounts Responsible Utility owes CAISO at any time pursuant to Section 41 of the CAISO Tariff attributable to invoices submitted by Owner under this Agreement (collectively, the “Accounts”), (b) the RMR Owner Facility Trust Account, all funds in the RMR Owner Facility Trust Account at any time, and all funds paid on account of any Accounts, (c) all proceeds of the Collateral, if any, and (d) all of CAISO’s right, title and interest in the Collateral. CAISO represents and warrants to Owner that (a) CAISO has the authority to grant such security interest, (b) CAISO will have good, marketable and exclusive title to all of the Collateral, (c) such security interest and lien will at all times be a valid, enforceable and first-priority lien on the Collateral, and (d) such security interest will be duly perfected by the filing of a financing statement under the California Uniform Commercial Code describing the Collateral in the office of the Secretary of State of California and the delivery of a written notice of Owner’s security interest to the bank with which the RMR Owner Facility Trust Account is maintained. If CAISO defaults on its obligation to pay under this Agreement, Owner shall be entitled to enforce such securityinterest, to exercise its rights in the Collateral, to collect the Accounts from Responsible Utility, to collect all funds in the RMR Owner Facility Trust Account, and to exercise all other rights and remedies under the California Uniform Commercial Code. CAISO agrees to promptly execute and deliver all financing statements and other documents Owner reasonably requests, including but not limited to a written notice of Owner’s security interest in the Collateral to the bank with which the RMR Owner Facility Trust Account is maintained, in order to maintain, perfect and enforce such security interest.

  • MANAGEMENT SECURITY Section 1. The Federation hereby accepts liability for any damage to or loss of state property that is the proximate cause of action by striking employees of this bargaining unit, provided however, that liability under this section shall be restricted to include any alleged loss of revenue or other incidental or punitive damage sought by the Employer.

  • Employment Security 28.1 The parties to this agreement agree to maximise the continuity of employment for existing and future employees and to ensure that permanent employment opportunities and the opportunity for promotion transfer and re-training or upskilling are not eliminated, reduced or eroded. 28.2 The Employer recognises that the use of subcontractors and labour hire may affect the job security of current and future employees covered by this Agreement. 28.3 As soon as practicable after being awarded a contract and prior to engaging subcontractors to perform work in the classifications covered by this agreement, the employer shall inform the Union Delegate (where applicable) which subcontractors it intends to use for the project. 28.4 The application of this Employment Security clause shall recognise geographical and commercial circumstances. In these circumstances the Employer and the Union may agree to vary the requirements of clause 28 on a project-by-project basis. Negotiations are to be conducted in good faith and agreement will not be unreasonably withheld.

  • Replacement Securities If the Holder of a Security claims that the Security has been mutilated, destroyed, lost or stolen, the Corporation may issue and the Trustee shall authenticate a replacement Security of the same series with identical terms as the Securities exchanged if the requirements of Section 8-405 of the Uniform Commercial Code (or any successor provision) are met. Such Holder shall furnish an indemnity bond sufficient in the judgment of the Corporation and the Trustee to protect the Corporation, the Trustee, the Paying Agent, the Registrar and any co-registrar from any loss that any of them may suffer if a Security is replaced. The Corporation and the Trustee may charge for their expenses in replacing a Security. In case any such mutilated, destroyed, lost or stolen Security has become due and payable, the Corporation in its discretion may, instead of issuing a new Security, pay such Security (without surrender thereof, except in the case of a mutilated Security) if the applicant for such payment shall furnish to the Corporation, the Trustee, the Paying Agent, the Registrar and any co-registrar for such Security such security or indemnity as may be required by them to hold each of them harmless, and in case of destruction, loss or theft, evidence satisfactory to the Corporation, the Trustee, the Paying Agent, the Registrar and any co-registrar, and any agent of any of them, of the destruction, loss or theft of such Security and the ownership thereof. Upon the issuance of any new Security under this Section, the Corporation may require the payment of a sum sufficient to cover any tax or other governmental charge that may be imposed in relation thereto and any other expenses in connection therewith (including all fees and expenses of the Trustee, the Paying Agent, the Registrar and any co-registrar for such Security). Every new Security of any series issued pursuant to this Section in lieu of any destroyed, lost or stolen Security or in exchange for any mutilated Security, shall constitute an original additional obligation of the Corporation, whether or not the destroyed, lost or stolen Security shall be at any time enforceable by anyone, and shall be entitled to all the benefits of this Indenture equally and proportionately with any and all other Securities of the same series. The provisions of this Section are exclusive and shall preclude (to the extent lawful) all other rights and remedies with respect to the replacement or payment of mutilated, destroyed, lost or stolen Securities.

  • Internet Security The Service utilizes a comprehensive security strategy to protect your accounts and transactions conducted over the Internet. Prior to activating your access to the Service, our Internet Banking Department will verify your identity and authorization against information associated with the Eligible Account (s) that you request to be linked to the Service. Access IDs and Passcodes - One of the main security features protecting the Service is the unique combination of your Access Identification Code (Access ID) and Passcode. During the enrollment process, you will be asked to select a unique Access ID, and then choose a Passcode that will be used to gain access to the Service. You determine your own Passcode, which is encrypted in our database. Neither this Institution nor its Service Providers have access to this information. The Service will automatically deactivate your account after three unsuccessful login attempts within a 24-hour time frame. You may reset your passcode online or you may contact this Institution for assistance. Because your Passcode is used to access your accounts, you should treat it as you would any other sensitive personal data. • You should carefully select a Passcode that is hard to guess. • You should not use words based on your name, address or other personal information. • Special characters may be used to increase security. • Do NOT use dictionary words. The “Help” link within the Service will offer tips on choosing a secure Passcode that you can remember. • Keep your Passcode safe. • Memorize your Passcode and do NOT write it down. • You should also change your Passcode occasionally, such as every 90 days. • A Passcode should be changed immediately if you suspect that your Passcode has been compromised. This can be done at any time from the “User Services” menu after you log on to the Service. NEITHER THIS INSTITUTION NOR ITS SERVICE PROVIDERS WILL CONTACT YOU VIA TELEPHONE OR EMAIL REQUESTING PERSONAL INFORMATION, YOUR ACCESS ID, OR YOUR PASSCODE. IF YOU ARE CONTACTED BY ANYONE REQUESTING THIS INFORMATION, PLEASE CONTACT US IMMEDIATELY.