Security and authentication Sample Clauses

The Security and Authentication clause establishes the requirements and procedures for protecting access to systems, data, or services and verifying the identities of users or entities. It typically outlines the types of security measures to be implemented, such as password policies, multi-factor authentication, or encryption standards, and may specify responsibilities for both parties in maintaining these safeguards. By setting clear expectations for security protocols and authentication processes, this clause helps prevent unauthorized access, data breaches, and ensures that only authorized individuals can interact with sensitive resources.
Security and authentication. (a) The Software may be accessed by one of two ways: (i) Cloud authentication; or (ii) Dongle authentication. (b) For Cloud authentication, the Licensee agrees and acknowledges that the Software will be inoperable unless the computer on which the Software is installed can access the Cloud service to authenticate the Software. (c) For Dongle authentication, the Licensee agrees and acknowledges that the Software will be inoperable unless a Dongle provided by the Licensor is attached to the computer on which the Software is to be installed. (d) The Dongle remains the property of the Licensor at all times. (e) The Licensee agrees: (i) to comply with the Software Security Policy found at [▇▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇▇.▇▇▇/licensing/]; and (ii) that use of the Software is subject to that Software Security Policy.
Security and authentication. Company shall deploy, manage, operate and upgrade (as appropriate) all security and authentication measures for use of the WiFi Service and the WiFi Hot Spot(s). Customer acknowledges that anonymous users will not be permitted to use the WiFi Service. Company may administer registration or other appropriate procedures sufficient to enable Company to identify the WiFi End Users as necessary to address service or abuse of service issues and to comply with applicable law. Customer shall reasonably cooperate with Company to address service or abuse of services issues on the Property or to identify WiFi End Users or others attempting to use the WiFi Service on the Property.
Security and authentication. Upon the commencement of this agreement, the Client’s username and password will be activated and will be sent via e-mail to the Client. The Client’s username and password will be the only identifiers by which Stouf will identify the Client whilst using the messaging service(s). It is the Client’s responsibility to ensure that the username and password are handled with care and not used negligently. The Client indemnifies STOUF against any claims, actions or damages as a result of the fraudulent or unauthorized use of the Client’s username and password or loss thereof.
Security and authentication. State shall assign a user ID and password to each Authorized User. State shall maintain or cause to be maintained the confidentiality of all such user IDs and passwords, including implementing and enforcing such policies and procedures as State deems appropriate thereto and State shall maintain adequate technical, physical, and procedural access controls and system security requirements and devices to ensure that access to the System by or through State is limited to duly authorized persons. State shall be solely responsible for all use or misuse of its user IDs, and Contractor shall have no obligation to monitor for or report any use or attempted use of State’s user IDs. All such user IDs and passwords are deemed to be Confidential Information of State, and State shall take reasonable steps to ensure that its personnel not share user IDs or passwords and not attempt to access the System except as duly authorized. Contractor shall not be liable to State for any loss or damage arising out of or relating to State’s failure to maintain its obligations set forth in this Section.
Security and authentication. Technical Requirement Number Requirement Description
Security and authentication. 5.1 We give you a 365 PIN number which is unique to you (the "365 PIN"). You will need to use it whenever you use a service. 5.2 We may also give you a unique 365 online user identification code ("User ID"). If we ask you for this code, you must give it to us. 5.3 We may ask you to answer security questions, or to use another security device, before allowing you use a service. 5.4 You must keep the 365 PIN, User ID and any other security device secret. You must not write down or record any of them in a way that would let someone else use any of them against your will 5.5 If you know or suspect your 365 PIN, User ID or other security device is known by someone who should not know it, you must tell us straight away. Phone us at ▇▇▇▇ ▇▇▇ ▇▇▇.
Security and authentication. The Software may be accessed by Cloud authentication. For Cloud authentication, the Licensee agrees and acknowledges that the Software will be inoperable unless the computer on which the Software is installed can access the Cloud service to authenticate the Software.
Security and authentication. The Software may be accessed by Cloud authentication.
Security and authentication. A separate detailed set of guidelines have to be developed for the users, including information relevant to strong security and authentications including different user levels for accessing the system.
Security and authentication. In order to access the Aquarius Services through your Aquarius Account, you will be required to create or will be given security details, including a username and password. Aquarius offers two-factor authentication via a user’s mobile device (Short Message Service (“SMS”) or a supported Time-based One Time Password application. A verified phone number is required to enable two-factor authentication via SMS. You agree and/or acknowledge that: (a) you are responsible for keeping the electronic device through which you access your Aquarius Account, the Aquarius Trade Platform and the Aquarius Services safe and maintaining adequate security and control of any and all security details that you use to access your Aquarius Account, the Aquarius Trade platform and the Aquarius Services. This includes taking all reasonable steps to avoid the loss, theft or misuse of such electronic device and ensuring that such electronic device is both encrypted and password protected. (b) any loss or compromise of your electronic device or your security details may result in unauthorized access to your Aquarius Account by third parties and the loss or theft of any funds held in your Aquarius Account and any associated accounts, including your linked bank account(s) and credit card(s). You must keep your security details safe at all times. For example, you should not write them down or otherwise make them visible to others; (c) you should never allow remote access or share your computer and/or computer screen with someone else when you are logged on to the Aquarius Trade Platform and using your Aquarius Account. Aquarius will never under any circumstances ask you for your IDs, passwords, or two-factor authentication codes or to screen share or otherwise seek to access your computer or account; (d) you should not provide your details to any third party for the purposes of remotely accessing your account unless specifically authorized in accordance with Section 2.1(b). Always log into your Aquarius Account through the Aquarius Site or Aquarius Trade Platform to review any transactions or required actions if you have any uncertainty regarding the authenticity of any communication or notice; and (e) we assume no responsibility for any loss that you may sustain due to compromise of account login credentials due to no fault of Aquarius and/or failure to follow the requirements set out in this Section 16.1 or follow or act on any notices or alerts that we may send to you.