Security Instructions Clause Samples

The Security Instructions clause sets out specific requirements and protocols that parties must follow to protect sensitive information, assets, or premises. It typically details the standards for physical and digital security, such as access controls, data encryption, or procedures for reporting security breaches. By clearly outlining these obligations, the clause helps prevent unauthorized access or data loss, ensuring that both parties understand and adhere to agreed-upon security measures.
Security Instructions. Cochin Shipyard Limited is an ISPS code compliant Port Facility and is required to maintain the security level declared by the Government of India form time to time. The premises of Cochin Shipyard Limited is a ‘Prohibited Area ‘under the official secrets Act. All contractor and their personnel are bound to comply with security instructions/orders of the Shipyard issued from time to time.
Security Instructions. A password linked to the certificate’s private key must always be used to protect the certificate when it is used for digital signing. Certificates and their private keys must only be kept in the hands of their proper owners so prevent the inappropriate use of the certificate. Orders made with the customer’s certificate are always considered having been made by the customer, so the certificate and the computer together with the software in which the certificate is saved must be properly and securely protected at all times. A customer is identified, and the user authorisation verified, only on the basis of the certificate.
Security Instructions. 10.1 Both the Customer and Nordea are responsible for ensuring adequate data security in their respective computer systems and for ensuring that the systems are protected against unauthorised use. 10.2 The Customer undertakes to comply with the security instructions provided from time to time by Nordea regarding the use of e-Markets (through e-Markets or otherwise) and the security instructions provided from time to time by the provider of the Means of Identification. The Customer shall ensure that each authorised Administrator or User at all times comply with such security instructions. 10.3 The Customer shall immediately inform Nordea of any malfunction in the access to and in e-Markets itself.
Security Instructions. The Supplier/Partner shall prepare and apply security instructions designed to ensure compliance with information security requirements, cf. Section 6-4 of the Emergency Preparedness Regulation.
Security Instructions. The security specifications for Card acceptance, currently consisting of the Payment Card Industry Data Security Standards (PCI-DSS), as well as any standards or security instructions notified to the Merchant from time to time by ▇▇▇▇, in the dedicated space of its webpage ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇/el/oroi-kai-proypotheseis. Any changes to the Security Instructions are also uploaded to the same space, and the Merchant is notified of the changes in accordance with article 15 of the Agreement or in any other suitable manner in accordance with article 24 of the Agreement. The Security Instructions, as may be from time to time, constitute an integral part of the Agreement as of the Merchant’s notification to the Merchant in accordance with the above, and shall be strictly applied by the Merchant.
Security Instructions. 8.6.1. The Supplier shall comply and strictly follow the IAA's instructions regarding security, data protection and confidentiality, as specified in Annex "G". 8.6.2. The Supplier acknowledges and agrees that certain aspects of the Project, including the design, installation, testing and acceptance of the System as well as its operation and service and maintenance may be subject to approvals and/or instructions of the Israel Police, the Israel Security Agency, Israel National Information Security Authority and the IAA's security authorities (the "Security Authorities"), as may be required by the IAA from time to time. The Supplier undertakes to fully comply with any such instructions and to carry it out, at its expense. Any changes compared to the Approved Design Documents and/or adjustments required to be made as a result of the instructions of the Security Authorities shall be deemed as a Variation, subject to the provisions of section 21.3. 8.6.3. The Supplier is aware that the decisions of the Security Authorities may be provided without explanations, reasoning or documentation. The Supplier reserves the right to claim Variation in accordance and subject to section 21 with respect to any loss or damage whatsoever suffered by the Supplier due to the instructions of the Security Authorities.
Security Instructions. 13.6.1. The Supplier shall comply and strictly follow the IAA's instructions regarding security, data protection and confidentiality, as specified in Annex "H".
Security Instructions. Placed at Annexure 2 to Part II of this GeM Bid.
Security Instructions. 17.1 The Merchant shall apply the Security Instructions to its systems, including but not limited to POS Devices and Payment Gateway, and strictly comply with the Security Instructions and shall exercise systematic supervision and control, in order to monitor and detect any electronic security breach or attempted electronic security breach of the Transactions made by Cardholders, as well as any unauthorized access to the data of Cardholders and Cards in order to prevent, among others, theft of personalised security credentials which can be used to commit fraud (“Sensitive Payment Data”). 17.2 The Merchant shall ensure that any third-party service provider who, by virtue of a relevant contract with the Merchant, processes Cardholders’ Transactions or has access to the data of Cards and/or Cardholders, fully complies with the applicable Security Instructions throughout the term of the Agreement and the Merchant shall be liable in any case. 17.3 Nexi reserves the right to verify the Merchant’s compliance with the applicable Security Instructions. To this end, it may visit the Merchant’s premises at any time and the Merchant shall allow free access to ▇▇▇▇’s representatives (including third parties specially authorized by Nexi) to the electronic systems and devices used by the Merchant, including but not limited to POS Devices and Payment Gateway, in the context of the Agreement, for the performansce of such verification.

Related to Security Instructions

  • Security Instruments (i) The Administrative Agent shall fail to have an Acceptable Security Interest in any portion of the Collateral or (ii) any Security Instrument shall at any time and for any reason cease to create the Lien on the Property purported to be subject to such agreement in accordance with the terms of such agreement, or cease to be in full force and effect, or shall be contested by the Borrower, any Guarantor or any of their respective Subsidiaries;

  • Proper Instructions and Special Instructions “Proper Instructions,” which may also be standing instructions, as such term is used throughout this Agreement shall mean instructions received by the Custodian from a Fund, a Fund’s duly authorized investment manager or investment adviser, or a person or entity duly authorized by either of them. Such instructions may be in writing signed by the authorized person or persons or may be in a tested communication or in a communication utilizing access codes effected between electro-mechanical or electronic devices or may be by such other means and utilizing such intermediary systems and utilities as may be agreed from time to time by the Custodian and the person(s) or entity giving such instruction, provided that the Fund has followed any security procedures agreed to from time to time by the applicable Fund and the Custodian including, but not limited to, the security procedures selected by the Fund via the form of Funds Transfer Addendum hereto, the terms of which are hereby agreed to. Oral instructions will be considered Proper Instructions if the Custodian reasonably believes them to have been given by a person authorized to provide such instructions with respect to the transaction involved; the Fund shall cause all oral instructions to be confirmed in writing. For purposes of this Section, Proper Instructions shall include instructions received by the Custodian pursuant to any multi-party agreement which requires a segregated asset account in accordance with Section 2.9 hereof.

  • Security Instrument Borrower will execute the Security Instrument dated of even date with this Loan Agreement. The Security Instrument will be recorded in the applicable land records in the Property Jurisdiction.

  • Actions of Custodian Based on Proper Instructions and Special Instructions So long as and to the extent that the Custodian acts in accordance with (a) Proper Instructions or Special Instructions, as the case may be, and (b) the terms of this Agreement, the Custodian shall not be responsible for the title, validity or genuineness of any property, or evidence of title thereof, received by it or delivered by it pursuant to this Agreement.

  • Form instructions This form does not mandate the use of a specific font size or style but the font must be legible.