Security and integrity Clause Samples

The 'Security and integrity' clause establishes requirements and standards to protect the confidentiality, availability, and accuracy of data, systems, or services involved in the agreement. It typically obligates parties to implement appropriate technical and organizational measures, such as encryption, access controls, or regular security audits, to prevent unauthorized access, data breaches, or tampering. This clause serves to minimize risks related to cyber threats and data loss, ensuring that sensitive information remains protected and the integrity of operations is maintained throughout the contractual relationship.
POPULAR SAMPLE Copied 1 times
Security and integrity. While We endeavour to adhere to best practice policies and procedures to prevent data loss, We do not guarantee that there will be no loss of data and We expressly exclude liability for any loss of data no matter how caused. You must not violate the security of the Website in any way. We may suspend or cancel Your account or Your access to the Website if We suspect any security violation. We may also inform any law enforcement body of any suspected unauthorised or criminal activity. Examples of security violations include: a) attempting to gain unauthorised access to any part of the Website, servers or system infrastructure You were not intended to have access to; b) interfering with or otherwise circumventing mechanisms in the Website intended to limit your use; c) use the Website in a way that was not intended by Us; d) attempting to reverse engineer the Website or any system or offering provided through it; e) interfering with or disrupting (or attempting to interfere or disrupt) any servers or networks connected to the Website; f) sending or storing any harmful code (including, for example, any computer virus, trojan, worm or other code that is harmful or disabling or which assists in or enables unauthorised access to or corruption of data); or g) using any feature of the Website or any other means to send unsolicited commercial correspondence to other Users.
Security and integrity. Staff members shall not knowingly take any action that would compromise the security of any computer, network, or messaging system. This would include the unauthorized release or sharing of passwords and the intentional disabling of any security features of the system. Staff members shall not knowingly take any actions that may adversely affect the integrity, functionality, or reliability of any computer; they may not install, delete, or remove any hardware or software to individual computers, or to the computer network without consent of the Technology Coordinator. Staff members shall report to the Network Administrators or a School District administrator any actions by students that would violate the security or integrity of any computer or network whenever they know of such actions in the normal course of their work duties. This shall not be construed as creating any liability for staff members for the computer-related misconduct of students. Other examples of inappropriate technology and network behavior will be considered on a case- by-case basis.
Security and integrity. While We endeavour to adhere to best practice policies and procedures to prevent data loss, We do not guarantee that there will be no loss of data and We expressly exclude liability for any loss of data no matter how caused. You must not violate the security of Shake Off in any way. We, or the Administrator, may suspend or cancel Your account or Your access to Shake Off if We suspect any security violation. We may also inform any law enforcement body of any suspected unauthorised or criminal activity. Examples of security violations include: (a) attempting to gain unauthorised access to any part of Shake Off, servers or system infrastructure You were not intended to have access to; (b) use Shake Off in a way that was not intended by Us; (c) attempting to reverse engineer Shake Off or any system or offering provided through it; (d) interfering with or disrupting (or attempting to interfere or disrupt) any servers or networks connected to Shake Off; (e) sending or storing any harmful code (including, for example, any computer virus, trojan, worm or other code that is harmful or disabling or which assists in or enables unauthorised access to or corruption of data); or (f) using any feature of Shake Off or any other means to send unsolicited commercial correspondence to other Users.
Security and integrity. Pivotal represents and warrants to VMware that any improvements to the Products and Documentation made by Pivotal or on its behalf after the 3rd Restatement Date shall be: (i) of Pivotal’s own creation or within the scope of a license granted to Pivotal, directly or indirectly, by the owner or copyright holder; and (ii) unaltered or tampered with by any third party prior to delivery.
Security and integrity. The Group Companies have taken all reasonable precautions to preserve the security and integrity of the Systems and the data and information stored on them and as far as the Sellers are aware there has been no unauthorised access to the Systems or any of the data or information stored on them.
Security and integrity. You must not violate the security of Microba in any way. We may suspend or cancel Your account and Your access to Microba, or otherwise terminate Your participation in any Research Project, if We suspect any security violation. We may also inform any law enforcement body of any suspected unauthorised or criminal activity. Examples of security violations include: • attempting to gain unauthorised access to any part of Our servers or system infrastructure You were not intended to have access to; • use Microba in a way that was not intended by Us; • attempting to reverse engineer Microba or any system or offering provided through it; • interfering with or disrupting (or attempting to interfere or disrupt) any servers or networks connected to Microba; • sending or storing any harmful code (including, for example, any computer virus, trojan, worm or other code that is harmful or disabling or which assists in or enables unauthorised access to or corruption of data); or • using any feature of Microba or any other means to send unsolicited commercial correspondence to other Users. By participating in any Research Project, accessing our Website or otherwise using Microba, to the extent permitted by law You assume all risks associated with such participation, access and use. The Microbiome Services are subject to continuing research, clinical experience, reasonable differences in opinions among authorities, unique aspects of individual situations and the possibility of human error. We cannot promise or guarantee any specific outcomes from Your use of Microba or Your participation in any Research Project. To the extent permitted by law, no representation or warranty (express or implied) is made: • as to the outcomes, currency, completeness, accuracy, reliability, suitability, and/or availability of Microba, any Research Project, the Microbiome Services or Your Microbiome Report (if any); and • that Microba, the Microbiome Services or Your Microbiome Report (if any) will meet your health or medical requirements. To the maximum extent permitted by law (including the Australian Consumer Law), We (and our directors, employees and agents) do not accept any liability for, and You agree to release us from any claim in relation to any loss, howsoever caused, suffered or incurred by you arising from Your use of Microba or Your participation in any Research Project (including without limitation any Consequential Loss or damage and any loss arising through negligence). Without ...
Security and integrity. You must not violate the security of P2PAgri in any way. We may suspend or cancel Your registration or Your access to P2PAgri if We suspect any security violation. We may also inform any law enforcement body of any suspected unauthorised or criminal activity. Examples of security violations include: a) attempting to gain unauthorised access to any part of P2PAgri, servers or system infrastructure You were not intended to have access to; b) using P2PAgri in a way that was not intended by Us; c) attempting to reverse engineer P2PAgri or any system or offering provided through Us; d) interfering with or disrupting (or attempting to interfere or disrupt) any servers or networks connected to P2PAgri; e) sending or storing any Harmful Code (including, for example, any computer virus, trojan, worm or other code that is harmful or disabling or which assists in or enables unauthorised access to or corruption of data) on or through P2PAgri; or f) using any feature of P2PAgri or any other means to send unsolicited commercial correspondence to other Users.
Security and integrity. The Seller has taken all commercially reasonable precautions to preserve the security and integrity of the Systems and the data and information stored on them and as far as the Seller is aware, there has been no unauthorised access to the Systems or any of the data or information stored on them. 8. Employees 8.1
Security and integrity a. All facilities used to store and process Customer’s Data will implement and maintain administrative, physical, technical, and procedural safeguards and industry best practices at a level designed to secure such Data from unauthorized access, destruction, use, modification, or disclosure. Such measures will be no less protective than those used to secure Contractor’s own Data of a similar type, and in no event less than reasonable in view of the type and nature of the Data involved. b. Without limiting the above, Contractor warrants that all Customer Data will be encrypted in transmission, rest, backup or storage at a level equivalent to or stronger than 128-bit level encryption or utilizing other compensating controls meeting applicable industry standards for protection of data such as using data loss prevention technologies, database encryption at rest, perimeter defenses, internal firewalling to limit who can connect to the data, limiting use of root/admin accounts, using “run as” and requiring use of principle of least privilege. Contractor will inform the Department about which industry standards and other compensating controls Contractor utilizes. Contractor and the Department agree that if the Department has concerns, those concerns will be discussed and resolved pursuant to Section 13.0 (Contract Dispute Resolution) of Exhibit 5. c. Contractor shall at all times use industry-standard and up-to-date information security standards, tools, technologies and procedures for: i. Protection against malware; ii. Detection or protection against unauthorized intrusions; iii. Management of user and privileged accounts on all systems containing Customer Data; iv. Secure configuration and management of endpoint operating systems; v. System audit, logging, alerting, notification and reporting; and vi. Secure management of "edge" equipment such as email servers, firewalls, routers, switches, data loss prevention systems, web filtering systems, etc. The prospectuses, policies and/or procedures of certain fund companies require retirement plan providers offering their fund(s) to agree to restrict market timing and/or excessive trading (“prohibited trading”) in their funds. The following procedures describe how we, as your recordkeeper, will comply with fund company instructions designed to prevent or minimize prohibited trading. Various fund companies instruct intermediaries to perform standardized trade monitoring while others perform their own periodic monitorin...
Security and integrity not attempt to undermine the security or integrity of our computing systems or networks (including the Noted System) or, where the Service is hosted by a third party, that third party's computing systems and networks;