ACH Security Framework Sample Clauses

ACH Security Framework. The NACHA Rules require that each non-consumer Originator must establish, implement, and update, as appropriate, policies, procedures, and systems with respect to the initiation, processing, and storage of Entries that are designed to: (a) protect the confidentiality and integrity of Protected Information until its destruction; (b) protect against anticipated threats or hazards to the security or integrity of Protected Information until its destruction; (c) protect against unauthorized use of Protected Information that could result in substantial harm to a natural person.
AutoNDA by SimpleDocs
ACH Security Framework. You are bound by the NACHA established minimum data security regulations: to protect sensitive non-public data of their customer or employees. This includes confidential and personal data such as: Health information, Social Security Numbers, Driver’s License Numbers, Bank, and account number information. Monitoring access controls against unauthorized use to systems with sensitive ACH data. Create, verify, or update security policies, procedures and controls related to the initiation, processing, and storage of ACH entries. Storage and safekeeping procedures for voided checks and ACH Authorization agreements.
ACH Security Framework. You acknowledge that you must establish, implement, and update, as appropriate, policies, procedures, and systems with respect to the initiation, processing, and storage of Entries that are designed to: (i) protect the confidentiality and integrity of Protected Information until its destruction, (ii) protect against anticipated threats or hazards to the security or integrity of Protected Information until its destruction, and (iii) protect against unauthorized use of Protected Information that could result in substantial harm to a natural person. “Protected Information” for this purpose means the non-public personal information, including financial information, of a natural person used to create, or contained within, an Entry and any related addenda record.
ACH Security Framework. The ACH Security Framework establishes minimum data security obligations for ACH Network participants to protect ACH data. The NACHA Rule implementation includes three sets of rules, two of which apply to you: (15.a) Protection of Sensitive Data and Access Controls; and (15.b) Self-Assessment. As a customer of the Bank using the ACH Services, both you and the Bank are required to operate under the NACHA Rules.

Related to ACH Security Framework

  • NIST Cybersecurity Framework The U.S. Department of Commerce National Institute for Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity Version 1.1.

  • Financial Framework 1. In accordance with Article 2.1 of Protocol 38c, the total amount of the financial contribution is € 1548.1 million in annual tranches of € 221.16 million over the period running from 1 May 2014 to 30 April 2021, inclusive.

  • Legal Framework 1. This programme agreement shall be read in conjunction with the following documents which, together with this programme agreement, constitute the legal framework of the EEA Financial Mechanism 2014-2021:

  • Security Cameras Security cameras have been installed throughout the Facility; however, they will not routinely be used in areas where there is an expectation of privacy, such as restrooms or patient care areas.

  • Contractor Security Clearance Customers may designate certain duties and/or positions as positions of “special trust” because they involve special trust responsibilities, are located in sensitive locations, or have key capabilities with access to sensitive or confidential information. The designation of a special trust position or duties is at the sole discretion of the Customer. Contractor or Contractor’s employees and Staff who, in the performance of this Contract, will be assigned to work in positions determined by the Customer to be positions of special trust, may be required to submit to background screening and be approved by the Customer to work on this Contract.

  • Instructional Framework The District and the Association have agreed to the adopted research-based instructional framework developed by Xxxxxxxxx Xxxxxxxxx and approved by OSPI. The Association and District have also agreed to Xxxxxxxxx Xxxxxxxxx’x frameworks for specialists for use with other certificated educators.

  • Data Security Requirements A. Data Transport. When transporting Confidential Information electronically, including via email, the data will be protected by:

  • Framework This Agreement establishes a framework that will enable Red Hat to provide Software and Services to Client. “Software” means Red Hat Enterprise Linux, JBoss Enterprise Middleware and other software programs branded by Red Hat, its Affiliates and/or third parties including all modifications, additions or further enhancements delivered by Red Hat. The specific services (the “Services”) and/or Software that Red Hat will provide to Client will be described in an Order Form, signed by the parties or otherwise accepted by Red Hat, which may consist of (a) one or more mutually agreed order forms, statements of work, work orders or similar transaction documents, or (b) an order placed by Client through Red Hat's online store accessible from a Red Hat website. The parties agree that the terms of this Agreement will govern all purchases and use by Client of Software and Services unless otherwise agreed by the parties in writing.

  • Security Badging Any Company employee, or any employee of its contractors or agents, that require unescorted access to the Security Identification Display Area (SIDA) to perform work under this Agreement will be badged with an Airport identification badge (hereinafter referred to as "Badge") provided by Authority’s ID Badging Department and will be subject to an FBI fingerprint-based criminal history records check (CHRC) and an annual Security Threat Assessment (STA). A new or renewed Badge will not be issued to an individual until the results of the CHRC and the STA are completed and indicate that the applicant has not been convicted of a disqualifying criminal offense. If the CHRC or STA discloses a disqualifying criminal offense, the individual’s new or renewed badge application will be rejected. The costs of the CHRC and the annual STA will be paid by Company. These costs are subject to change without notice, and Company will be responsible for paying any increase in the costs. All badged employees of Company and its contractors or agents will comply with Authority's regulations regarding the use and display of Badges. Company will be assessed a fine for each Badge that is lost, stolen, unaccounted for or not returned to Authority at the time of Badge expiration, employee termination, termination of the Agreement, or upon written request by Authority. This fine will be paid by Company within 15 days from the date of invoice. The fine is subject to change without notice, and Company will be responsible for paying any increase in the fine. If any Company employee is terminated or leaves Company’s employment, Authority must be notified immediately, and the Badge must be returned to Authority promptly.

  • Security Standards The Provider shall implement and maintain commercially reasonable security procedures and practices that otherwise meet or exceed industry standards designed to protect Student Data from unauthorized access, destruction, use, modification, or disclosure, including but not limited to the unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of the Student Data (a "Security Breach"). For purposes of the DPA and this Exhibit G, "Security Breach" does not include the good faith acquisition of Student Data by an employee or agent of the Provider or LEA for a legitimate educational or administrative purpose of the Provider or LEA, so long as the Student Data is used solely for purposes permitted by SOPPA and other applicable law, and so long as the Student Data is restricted from further unauthorized disclosure.

Time is Money Join Law Insider Premium to draft better contracts faster.