Platform Security Clause Samples

The Platform Security clause establishes the requirements and standards for safeguarding the digital platform and its associated data. It typically outlines the technical and organizational measures that must be implemented, such as encryption, access controls, regular security assessments, and incident response protocols. By setting clear expectations for how security is managed, this clause helps protect sensitive information, prevent unauthorized access, and mitigate the risk of data breaches or cyberattacks.
POPULAR SAMPLE Copied 3 times
Platform Security. Securitize shall use commercially reasonable efforts consistent with industry standards to protect the physical security and electronic security of the Platform and other systems utilized to provide the Securitize Services, including but not limited to using up-to-date anti-virus, security and firewall technology commonly used in the industry. Issuer agrees that it, and shall ensure that its Affiliates and Authorized Participants, will not take actions that negatively affect the confidentiality, integrity, and availability of Securitize’s systems and information assets.
Platform Security i. The Digital Property data repository and analytics engine are secured by Stantec. The Digital Property can only be accessed by authorized users who have the correct permissions and privileges. ii. All content on, and use of, the Digital Property falls under the umbrella of Stantec’s information technology security practices, as modified from time to time, backup procedures, and disaster recovery protocols. iii. The Digital Property, all dependent interfaces, and user interface access is secured by an industry standard security model implementing two factor authentication (2FA) where required, or equivalent or improved security measures that Stantec may implement in the future.
Platform Security. 10.1 Moorepay will implement technologies and procedures to minimise the risk of unauthorised access to Customer Data. 10.2 Moorepay will use all reasonable endeavours to ensure that Moorepay systems used in the delivery of Services have resilience that ensures system availability in the event of component failure, (N+1 redundancy) in order to continue operation in the event of component failure. 10.3 Development and test platforms will be segregated from the operational platforms used in providing the Services. 10.4 Development tools such as compilers, assemblers, editors and other general purpose utilities within the production environment will not be permitted unless expressly required for the delivery of the Services, in which case access is restricted. 10.5 Software and hardware used in the delivery of the Services will be updated in line with good industry practice, vendor support and security guidelines.
Platform Security. Full Frame implements safeguards and security based on industry standards to protect Client Content. Aside from such industry standard safeguards, Full Frame can make no guarantees regarding any Platform security or any Client Content secured.
Platform Security. IPTechView implements administrative, physical, and technical safeguards for protection of the security, confidentiality and integrity of your information and all User Content. Those safeguards used or based on industry standards. Aside from such industry standard safeguards, IPTechView can make no guarantees regarding any Platform security or any User Content secured.
Platform Security. You must not violate or attempt to violate the security of the Platforms, including, without limitation, by (a) accessing data not intended for you or logging onto a server or an account, which you are not authorized to access; (b) attempting to probe, scan or test the vulnerability of a system, network or breach security or authentication measures without proper authorization; (c) attempting to interfere with service to any other user, host or network, including, without limitation, via means of submitting a virus to the site, overloading, and "flooding," "spamming," "mail bombing" or "crashing."; (d) sending unsolicited emails, including promotions and/or advertising;
Platform Security. 7.1. If you are a Customer you acknowledge and agree that the provisions in your Terms and Conditions that apply to online payment system security apply to your use of the Platform and are incorporated herein by reference. 7.2. If you are a User you acknowledge and agree that: (i) the security of your access to the Platform, including but not limited to the security and secrecy of your Access Methods, will at all times be your sole responsibility; (ii) you have taken appropriate security measures to protect your Access Methods, computer systems and mobile devices; (iii) your Access Methods are not the same as passwords that you use for other websites, applications or services or based on guessable information such as personal telephone number, birthday or other personal information. 7.3. In addition you agree that you will at all times maintain, appropriate protection against malicious software, including viruses, trojan horses, spyware, or any other computer code, files or programs, designed to disrupt, interrupt, disable, damage, destroy, limit the functionality of, infiltrate, or illicitly extract information from any device, software, system or telecommunications equipment.
Platform Security. Secure Sockets Layer (SSL) is the standard security technology for creating an encrypted link between a web server and a browser. This link ensures that all data passed between the web server and browser remains private and integral. SSL is an industry standard and is used by millions of websites in the protection of their online transactions with their customers. WE employs SSL to protect all data transmitted between browser and web server. This technology protects confidential information (e.g., passwords, bid data, customer data) from being viewed or tampered with by unauthorized parties thus ensuring the integrity of our auction events. WORLD ENERGY SOLUTIONS PROPRIETORY INFORMATION WORLD ENERGY SOLUTIONS (GRAPHIC) FIGURE 11: WORLD ENERGY'S SSL CERTIFICATE SSL works by using a public key to encrypt data that's transferred over the SSL connection. WE utilizes strong encryption also known as 128-bit encryption. 128-bit encryption provides a significantly greater amount of cryptographic protection than 40-bit encryption. In order to be able to generate an SSL link, a web server requires an SSL Certificate. WE's platform utilizes Comodo's SSL Certificate and is depicted in Figure 11. To provide maximum uptime system availability, WE's platform is hosted in a multi-tiered, highly secure, highly reliable fault tolerant environment. This environment includes a universal power supply (UPS) and diesel generator for fully redundant backup power to computer equipment. The environment also includes climate control as well as physical security to building and data center. To provide highest level of availability to the internet, the data center utilizes connections to multiple Tier 1 internet backbone providers. To minimize risk of server downtime due to hard-drive failure, our platform server features a hot swappable RAID 1 disk array. In the event of major system component failure such as the motherboard, a spare server is readily available and can be brought online. To minimize risk of interruption due to outside attacks on our platform, we employ a fully integrated security approach located at the network edge. Using deep packet inspection engines, which are currently capable of recognizing 1800+ attack and vulnerabilities signatures, we are able to defend network resources from Trojans, worms, DoS/DDos attacks, and blended threats including sophisticated polymorphic attacks. Our backup cycle includes nightly incremental backups and a weekly image backup. The n...
Platform Security. You are prohibited from violating or attempting to violate the security of the Platform or any other associate Platform of TechMomentum , including, without limitation, (a) accessing data not intended for such user or logging onto a server or an account that the user is not authorised to access; (b) attempting to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without proper authorisation; (c) attempting to interfere with service to any user, host or network, including, without limitation, via means of submitting a virus to the Platform, overloading, "flooding," "spamming," "mailbombing" or "crashing;"
Platform Security. Enterprise, including its Affiliates and Authorized Users, shall follow all protocols for protecting the security of the Platform. Authorized Users shall be required to use multi-factor authentication. Authorized Users not using the Enterprise’s domain email may be required to obtain confirmation at login by the Enterprise Administrator. Enterprise must notify WRI immediately of any unauthorized access to or use of Enterprise Account, the GFW Pro Content or Platform or other security threats or breaches for which Enterprise becomes aware. Security breach notices must be sent to ▇▇▇@▇▇▇.▇▇▇.