Web Site Security Sample Clauses

Web Site Security. You are prohibited from violating or attempting to violate the security of this Web Site, including, but not limited to the following activities: (1) accessing data not intended for you or obtaining personal information about any Check ‘n Go Web Site user or customer; (2) attempting to probe, test, or scan the vulnerability of a system or network or to breach security or authentication measures without proper authorization; (3) attempting to interfere with service to any user, host or network, or otherwise disrupt Check ‘n Go business, including, without limitation, by submitting a virus to the Web Site, overloading, "flooding," "spamming," "mailbombing" or "crashing;", or sending unsolicited email, including promotions and/or advertising of products or services.
Web Site Security. The Internet web site provided to Customer by FDR shall include multiple hardware firewalls. FDR's stored value system will at all times utilize a minimum encryption level of 128 bits, and information and system protection may be enhanced to the extent offered by any exchange of additional software based security certificates between Customer and FDR. Regularly scheduled maintenance services will employ virus detection and diagnostic software.
Web Site Security. You are prohibited from violating or attempting to violate the security of the Web Site, including, without limitation, (a) accessing data not intended for your viewing or logging into a server or account which you are not authorized to access, (b) attempting to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without proper authorization or (c) attempting to interfere with service to any user, host or network. Violations of system or network security may result in civil or criminal liability. Chassix will investigate occurrences which may involve such violations and may involve, and cooperate with, law enforcement authorities in prosecuting users who are involved in such violations. Chassix makes no representation that content provided is applicable or appropriate for use in all locations. These terms and conditions are governed and interpreted pursuant to the laws of the State of Michigan, United States of America, notwithstanding any principles of conflicts of law. If you take legal action relating to these terms, you agree to file such action only in the state and federal courts located in the State of Michigan. If any part of these terms and conditions is unlawful, void or unenforceable, that part will be deemed severable and will not affect the validity and enforceability of remaining provisions.
Web Site Security. While Angil Design will do all due diligence to ensure that critical data is encrypted and that best practices are followed both in coding and system security, no warranty, expressed or implied is made in regards to unauthorized access. Customer expressly (i) grants to Angil Design, Inc. a license to cache the entirety of Customer’s Web Site, including content supplied by third parties, hosted by Angil Design, Inc. under this Agreement and (ii) agree that such caching is not an infringement of any of Customer’s intellectual property rights or any third party's intellectual property rights.

Related to Web Site Security

  • Site Security While providing services at a DSHS location, the Contractor, its agents, employees, or Subcontractors shall conform in all respects with physical, fire, or other security regulations specific to the DSHS location.

  • STATE SECURITY 4.01 Nothing in this Agreement shall be construed as requiring the Employer to do or refrain from doing anything contrary to any instruction, direction or regulations given or made by or on behalf of the Government of Canada in the interest of the safety or security of Canada or any state allied or associated with Canada.

  • SOFTWARE SECURITY If applicable, BA warrants that software security features will be compatible with the CE’s HIPAA compliance requirements. This HIPAA Business Associate Agreement-Addendum shall supersede any prior HIPAA Business Associate Agreements between CE and BA.

  • Network Security The AWS Network will be electronically accessible to employees, contractors and any other person as necessary to provide the Services. AWS will maintain access controls and policies to manage what access is allowed to the AWS Network from each network connection and user, including the use of firewalls or functionally equivalent technology and authentication controls. AWS will maintain corrective action and incident response plans to respond to potential security threats.

  • Adequate security The Contractor shall provide adequate security for all covered defense information on all covered contractor information systems that support the performance of work under this contract. To provide adequate security, the Contractor shall—