Security Parameters Clause Samples

Security Parameters. {Specify the security parameters exchanged between systems to authenticate that the requesting system is the legitimate system and that the class(es) of service requested is approved by the ISA. For example, at the system level, if a new service such as e-mail is requested without prior coordination, it should be detected, refused, and documented as a possible intrusion until the interconnected service is authorized. Also, additional security parameters may be required (e.g., personal accountability) to allow the respondent system to determine whether a requestor is authorized to receive the information and/or services requested and whether all details of the transaction fall with the scope of user services authorized by the ISA. Give the server names/directories and their full location. Examples to include are: encryption being used during transport; whether the data (including passwords) is encrypted in storage; type of connection (e.g. single VPN connection); etc.}
Security Parameters. Interconnections will be used to transmit data between Members and the Network via secured data streams for the purposes specified in this Agreement. If an exchange not covered by this Agreement is detected without prior appropriate approval, it must be refused, and documented as a possible intrusion until the interconnected service is authorized. Also, additional security parameters may be required (e.g., personal accountability) to allow the respondent system to determine whether a requestor is authorized to receive the information and/or services requested and whether all details of the transaction fall within the scope of user services authorized in this Agreement.
Security Parameters. EGS and <<VENDOR SYSTEM>> use RESTful web services over HTTPS using most current NIST and Federal Government recommended versions of TLS to implement its system-to-system interface. The EGS system shall connect to the <<VENDOR SYSTEM>> system using the system- to-system interface.
Security Parameters. Data is exchanged using the latest secure connection protocol. SBA currently supports TLS 1.2 and 1.3.
Security Parameters. [Required for systems that allow users of one system to directly access the other system. Specify the security parameters that are exchanged among/between systems that authenticates that the requesting system is the legitimate system and that the class(es) of service being requested are approved by the ISA. For example, at the system level, if a new service such as E-mail is requested without prior coordination, it should be detected, refused, and documented as a possible intrusion until the interconnected service is authorized. Also, additional security parameters may be required (e.g., personal accountability) to allow the respondent system to determine whether a requestor is authorized to receive the information and/or services requested and whether all details of the transaction fall within the scope of user services authorized in the ISA.]
Security Parameters. All Parties are required to protect NMT’s systems and data in accordance with applicable statutory, regulatory and contractual compliance obligations; Provider shall establish procedures, supporting business processes and implement technical measures to ensure the continuity and availability of operations while operating in other-than-normal conditions; Unless otherwise protected by NMT-defined alternative physical safeguards, Provider must: Implement cryptographic mechanisms to prevent unauthorized disclosure of information;
Security Parameters. Credit card numbers, fixed log-in passwords, and other security parameters that can be used to gain access to goods or services, shall not be sent over the Internet in readable form. The SSL or SET encryption processes are both acceptable Internet encryption standards for the protection of security parameters. Other encryption processes, such as PGP, are permissible if approved by Gateway.
Security Parameters. The following detailed security measures and controls implemented by each organization to protect the confidentiality, integrity, and availability of the connected systems and the information/data that will pass between them are outlined below; [VA Organization 1] implements the following security measures and controls: • Identification and Authentication - User Access control is managed by strong authentication method and must be assigned on the "Least Privilege" Principal. VA utilizes “two-factor authentication” for general users. A separate token and non-mail enabled account is required for users who require elevated privileges on IT systems. • Logical Access Controls - VA accounts are separated into domains and the system administrators only manage those accounts within their domain. Accounts are audited every ninety (90) days. VA policy requires account termination within twenty-four (24) hours of an employee/contractor departure. Accounts are terminated immediately in the event of a hostile termination. • Physical and Environmental Security - Physical and environmental controls are maintained at VA facilities. Badges are required for employees and contract staff. Access to networking closets and computer rooms require authorization from the facility Chief Information Officer (CIO) and a log is maintained. VA computer rooms are environmentally controlled for operation of the equipment is contains. This includes power; network; heating, ventilation, and air conditioning (HVAC); and fire suppression. • Firewall, IDS, and Encryption - Intrusion detection systems (IDS) are in place at gateways and throughout the VA network. The VA’s Network Security Operations Center monitors the VA network 24x7. Suspicious activity is reviewed and determined recommendations are formulated and assigned to the system administrators. FIPS 140-2 validated encryption is required for transmission of sensitive information. [Organization 2] implements the following security measures and controls: • Identification and Authentication - [Detailed description of policy] • Logical Access Controls - [Detailed description of policy] • Physical and Environmental Security - [Detailed description of policy] • Firewall, IDS, and Encryption - [Detailed description of policy as well as confirmation of properly configured firewalls.]

Related to Security Parameters

  • Authorization Required Prior to Parallel Operation 2.2.1 The NYISO, in consultation with the Connecting Transmission Owner, shall use Reasonable Efforts to list applicable parallel Operating Requirements in Attachment 5 of this Agreement. Additionally, the NYISO, in consultation with the Connecting Transmission Owner, shall notify the Interconnection Customer of any changes to these requirements as soon as they are known. The NYISO and Connecting Transmission Owner shall make Reasonable Efforts to cooperate with the Interconnection Customer in meeting requirements necessary for the Interconnection Customer to commence parallel operations by the in-service date. 2.2.2 The Interconnection Customer shall not operate its Small Generating Facility in parallel with the New York State Transmission System or the Distribution System without prior written authorization of the NYISO. The NYISO, in consultation with the Connecting Transmission Owner, will provide such authorization once the NYISO receives notification that the Interconnection Customer has complied with all applicable parallel Operating Requirements. Such authorization shall not be unreasonably withheld, conditioned, or delayed.

  • Registry Interoperability and Continuity Registry Operator shall comply with the Registry Interoperability and Continuity Specifications as set forth in Specification 6 attached hereto (“Specification 6”).

  • Vessels (A) All of the vessels described in the Registration Statement, the General Disclosure Package and the Prospectus, except for the Contracted Vessels (each of which a Subsidiary has contracted to acquire), are owned directly by Subsidiaries); each of the vessels listed on Schedule F-1 (the “Owned Vessels”) hereto has been duly registered as a vessel under the laws and regulations and flag of the jurisdiction set forth opposite its name on Schedule F-1 in the sole ownership of the Subsidiary set forth opposite its name on Schedule F-1 and no other action is necessary to establish and perfect such entity’s title to and interest in such vessel as against any charterer or third party; each such Subsidiary has good title to the applicable Owned Vessel, free and clear of all mortgages, pledges, liens, security interests and claims and all defects of the title of record except for those liens arising under Credit Facilities, each as disclosed in the Registration Statement, the General Disclosure Package and the Prospectus, and such other encumbrances which would not, in the aggregate, result in a Material Adverse Effect; and each such Owned Vessel is in good standing with respect to the payment of past and current taxes, fees and other amounts payable under the laws of the jurisdiction where it is registered as would affect its registry with the ship registry of such jurisdiction except for failures to be in good standing which would not, in the aggregate, result in a Material Adverse Effect. Upon delivery to and acceptance by the relevant Subsidiary under the MoAs and the Newbuilding Contracts described in the Registration Statement, General Disclosure Package and Prospectus, each of the vessels listed on Schedule F-2 hereto and specified as being under contract (the “Contracted Vessels”) for delivery to and acceptance by a Subsidiary will be duly registered as a vessel under the laws of the jurisdiction set forth opposite its name on Schedule F-2, or under the laws of a generally accepted shipping industry flag jurisdiction, in the sole ownership of the Subsidiary set forth opposite its name on Schedule F-2, on such date, each such Subsidiary will have good title to the applicable Contracted Vessel, free and clear of all mortgages, pledges, liens, security interests, claims and all defects of the title of record, except for any mortgages, pledges, liens, security interests or claims arising from any financing arrangement which the Company or Subsidiary may enter to finance the acquisition of the Contracted Vessel and except such encumbrances which would not, in the aggregate, result in a Material Adverse Effect; and each such Contracted Vessel will be in good standing with respect to the payment of past and current taxes, fees and other amounts payable under the laws of the jurisdiction where it is registered as would affect its registry with the ship registry of such jurisdiction. (B) Each Owned Vessel is, and the Company will use reasonable commercial efforts to ensure that each Contracted Vessel will be, operated in compliance with the rules, codes of practice, conventions, protocols, guidelines or similar requirements or restrictions imposed, published or promulgated by any Governmental Authority, classification society or insurer applicable to the respective vessel (collectively, “Maritime Guidelines”) and all applicable international, national, state and local conventions, laws, regulations, orders, Governmental Licenses and other requirements (including, without limitation, all Environmental Laws), except where such failure to be in compliance would not have, individually or in the aggregate, a Material Adverse Effect. The Company and each applicable Subsidiary are, and with respect to the Contracted Vessels will be, qualified to own or lease, as the case may be, and operate such vessels under all applicable international, national, state and local conventions, laws, regulations, orders, Governmental Licenses and other requirements (including, without limitation, all Environmental Laws) and Maritime Guidelines, including the laws, regulations and orders of each such vessel’s flag state, except where such failure to be so qualified would not have, individually or in the aggregate, a Material Adverse Effect. (C) Each Owned Vessel is, and each Contracted Vessel will be, classed by any of Lloyd’s Register of Shipping, American Bureau of Shipping, Det Norske Veritas or a classification society which is a full member of the International Association of Classification Societies and each Owned Vessel is, and the Company will use reasonable commercial efforts to ensure each Contracted Vessel will be, in class with valid class and trading certificates, without any overdue recommendations.

  • Timescale It is recognised that discussions around actual salary increases have a dependency on top level Company decisions. However, it is agreed that more general discussions can start before this point, these will include: The Company providing the latest pay and benefit guidelines/comparators (if updated) By end of January Identify and attempt to agree deviations from information detailed in appendix 4. By 16th March The Company providing information as detailed in Appendix 4 (snapshot as of 1st April) (incorporating any agreed deviations from the standard list) By 10th April Joint team produce cost-model ready for negotiations By end of April Unite Submit and present to the Company negotiating team their annual pay claim By end of April Line Managers completing Appraisals (including Company checking of employees who don’t have a PAC) January – March where possible By end of April in all cases Company provides remainder of appraisal PAC information By 7th May Negotiate non-budget related matters By end May Once the Company decisions referred to above have been made, the pay negotiations can further progress. Steps will be taken earlier where practicable. Stage 1 negotiations Offer voted on by 14th June If required stage 2 negotiations Offer voted on by 30th June If required stage 3 negotiations Offer voted on by 14 th July Guidelines issued to line managers (following discussions between Unite & the Company) By 22nd July Pay planning complete By end July Pay review effective 1st August Company provides UNITE with information, snapshot at 1st August By 10th August Notification of pay review to individuals by managers Before August pay date At the start of the process, UNITE and the company will jointly review the timetable and agree any variations that are required.

  • Prescription Safety Glasses Prescription safety glasses will be furnished by the employer. The employer retains the authority to establish reasonable rules and procedures regarding frequency of issue, replacement of damaged glasses, limits on reimbursement costs and coordination with the employer's vision plan.