Security approaches Sample Clauses

Security approaches. Railway standards do not determine requirements for security, as mentioned earlier. An exception is the standard EN 50159, which defines security requirements only for communication in transmission systems. These security requirements have been extended by further requirements after analysis. The tasks of security should be integrated into all phases of life cycle like tasks of safety. For example, EN 50159 provides a classification scheme for transmission systems. A transmission system is assigned a class according to defined criteria (Pr1, Pr2, Pr3). The standard defines threats and requirements for defences. Each classification of a transmission system has to consider concrete threats and their relation with appropriate defences. Categories and threats are described briefly below: Category 1 – Closed transmission systems, where all essential properties of the system are under the control of the safety-related system designer, and a simplified set of safety requirements can be defined; Category 2 – Open transmission systems where, although the transmission is not fully under the control of the safety-related system designer, the risk of malicious attack can be considered negligible; Category 3 – Open transmission system where there is opportunity for malicious attack, and cryptographic defence measures are required. Table 20 lists relations between threats and defences: Threats Defences Repetition X X Deletion X Insertion X Xa Xb Xb Re-sequence X X Corruption X X Delay X X Masquerade Xb Xb X a Only applicable for source identifier. Will only detect insertion from invalid source. If unique identifiers cannot be determined because of unknown users, cryptographic techniques shall be used. b Application dependent.

Related to Security approaches

  • Intellectual Property Security Agreements Duly executed originals of Trademark Security Agreements, Copyright Security Agreements and Patent Security Agreements, each dated the Closing Date and signed by each Credit Party which owns Trademarks, Copyrights and/or Patents, as applicable, all in form and substance reasonably satisfactory to Agent, together with all instruments, documents and agreements executed pursuant thereto.

  • Intellectual Property Protection The Group Companies shall establish and maintain appropriate intellectual inspection system to protect the Proprietary Rights of the Group Companies. The Group Companies shall, and the Founders shall cause the Group Companies to fully comply with the laws and regulations in respect of the protection of the Proprietary Rights and refrain from infringing the Proprietary Rights of other parties. Ecommerce Company shall, and the other Warrantors shall procure Ecommerce Company to, use its best efforts to obtain as soon as possible and maintain the registration of the core trademarks used in the Business (including without limitation, the marks of “perfect diary”, “完美日记” and the combination of the foregoing) in the appropriate goods and services (including without limitation, cosmetics, cosmetics tools and advertisement). The Group Companies shall take all necessary or desirable actions to protect their trademarks, including initiating trademark petitions against any trademark applications filed by any third party for a trademark identical or similar to the Group Companies’ trademarks.

  • Intellectual Property, etc Each of Holdings and each of its Subsidiaries owns or has the right to use all domestic and foreign patents, trademarks, permits, domain names, service marks, trade names, copyrights, licenses, franchises, inventions, trade secrets, proprietary information and know-how of any type, whether or not written (including, but not limited to, rights in computer programs and databases) and formulas, or other rights with respect to the foregoing, and has obtained assignments of all leases, licenses and other rights of whatever nature, in each case necessary for the conduct of its business, without any known conflict with the rights of others which, or the failure to obtain which, as the case may be, individually or in the aggregate, has had, or could reasonably be expected to have, a Material Adverse Effect.

  • Security Technology When the service is accessed using a supported web browser, Secure Socket Layer (“SSL”), or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall include server authentication and data encryption. Provider shall host data pursuant to the DPA in an environment using a firewall that is periodically updated according to industry standards.

  • Security and Access The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities Information Technology and Access Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Access Resources or other Company property or materials by others.