Additional Cloud Services Security Controls Sample Clauses

Additional Cloud Services Security Controls. Area Control(s) Data Protection (Availability Control, Transmission Control, Data Deletion) Failover Procedures. Citrix implements mechanisms designed to address loss of availability of Customer Content, including storing copies of Customer Content in a different place from where the primary computer equipment processing the Customer Content is located. Data Beyond Boundaries. Citrix encrypts or enables Customer to encrypt Customer Content that is transmitted over public networks that are part of a Service. Retention. Citrix may retain Customer Content following the Service period and archiving for customer access where required for legal purposes. Citrix will comply with the requirements of this Exhibit until such Customer Content has been permanently deleted. Subject to Return directly below, Citrix is under no obligation to retain Customer Content following termination of the Service. Return. Subject to availability and the applicable Services Description, Customer has thirty (30) days to download Customer Content after expiration. Data Deletion. Citrix will securely delete Customer Content when no longer needed for a legitimate purpose. Secure Operations Event Logging. In certain Services, Citrix collects Logs. Logs may include access ID, time, authorization granted or denied, diagnostic data such as trace and crash files, and other relevant activity. Logs are used (i) for providing, securing, managing, measuring and improving the Services and associated analytics, (ii) as directed or instructed by Customer and its Users, and/or (iii) for compliance with Citrix policies, applicable law, regulation, or governmental request. This may include monitoring the performance, stability, usage and security of the Services and related components. Customer may not block or interfere with this monitoring. Citrix may supplement Logs with information collected from third parties for the purposes specified above. Logs may be used for purposes not specified in this Exhibit only in aggregate form. Area Control(s) Business Continuity and Disaster Recovery Back-ups. Except where otherwise noted in the respective Services Description, Services are maintained in high availability, active-active clusters spanning multiple physical sites. Systems not maintained in an active-active configuration are backed up according to the specific Service’s Service Level Goals.
AutoNDA by SimpleDocs
Additional Cloud Services Security Controls. Area Control(s) Data Protection (Availability Control, Transmission Control, Data Deletion) Failover Procedures. Citrix implements mechanisms designed to address loss of availability of Partner Personal Data, including storing copies of Partner Personal Data in a different place from where the primary computer equipment processing the Partner Personal Data is located. Data Beyond Boundaries. Citrix encrypts or enables Partner to encrypt Partner Personal Data that is transmitted over public networks that are part of a Service. Retention. Citrix may retain Partner Personal Data following the Service period and archiving for Partner access where required for legal purposes. Citrix will comply with the requirements of this Exhibit until such Partner Personal Data has been permanently deleted. Subject to Return directly below, Citrix is under no obligation to retain Partner Personal Data following termination of the Service. Return. Subject to availability and the applicable Services Description, Partner has thirty (30) days to download Partner Personal Data after expiration. Area Control(s) Data Deletion. Citrix will securely delete Partner Personal Data when no longer needed for a legitimate purpose. Secure operations Event Logging. In certain Services, Citrix collects Logs. Logs may include access ID, time, authorization granted or denied, diagnostic data such as trace and crash files, and other relevant activity. Logs are used (i) for providing, securing, managing, measuring and improving the Services and associated analytics, (ii) as directed or instructed by Partner and its Users, and/or (iii) for compliance with Citrix policies, applicable law, regulation, or governmental request. This may include monitoring the performance, stability, usage and security of the Services and related components. Partner may not block or interfere with this monitoring. Citrix may supplement Logs with information collected from third parties for the purposes specified above. Logs may be used for purposes not specified in this Exhibit only in aggregate form. Business Continuity and Disaster Recovery Back-ups. Except where otherwise noted in the respective Services Description, Services are maintained in high availability, active-active clusters spanning multiple physical sites. Systems not maintained in an active-active configuration are backed up according to the specific Service’s Service Level Goals.

Related to Additional Cloud Services Security Controls

  • Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

  • Security Controls Annually, upon Fund’s reasonable request, DST shall provide Fund’s Chief Information Security Officer or his or her designee with a summary of its corporate information security policy and an opportunity to discuss DST’s information security measures, and a high level and non-confidential summary of any penetration testing related to the provision of in-scope services . DST shall review its Security Policy annually.

  • Financing Services The Manager shall: (i) identify and evaluate potential financing and refinancing sources, engaging a third party broker if necessary; (ii) negotiate terms of, arrange and execute financing agreements; (iii) manage relationships between the Company and its lenders, if any; and (iv) monitor and oversee the service of the Company’s debt facilities and other financings, if any.

  • Compliance Control Services (1) Support reporting to regulatory bodies and support financial statement preparation by making the Fund's accounting records available to the Trust, the Securities and Exchange Commission (the “SEC”), and the independent accountants. (2) Maintain accounting records according to the 1940 Act and regulations provided thereunder. (3) Perform its duties hereunder in compliance with all applicable laws and regulations and provide any sub-certifications reasonably requested by the Trust in connection with any certification required of the Trust pursuant to the Xxxxxxxx-Xxxxx Act of 2002 (the “SOX Act”) or any rules or regulations promulgated by the SEC thereunder, provided the same shall not be deemed to change USBFS’s standard of care as set forth herein. (4) Cooperate with the Trust’s independent accountants and take all reasonable action in the performance of its obligations under this Agreement to ensure that the necessary information is made available to such accountants for the expression of their opinion on the Fund’s financial statements without any qualification as to the scope of their examination.

  • Operator’s Security Contact Information Xxxxxxx X. Xxxxxxx Named Security Contact xxxxxxxx@xxxxxxxxx.xxx Email of Security Contact (000) 000-0000 Phone Number of Security Contact

  • Audit Controls a. System Security Review. CONTRACTOR must ensure audit control mechanisms that record and examine system activity are in place. All systems processing and/or storing PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have at least an annual system risk assessment/security review which provides assurance that administrative, physical, and technical controls are functioning effectively and providing adequate levels of protection. Reviews should include vulnerability scanning tools.

  • Covenant to Provide Financial Information and Maintain Sufficient Capital The Administrator shall obtain and maintain the necessary capital to fulfill its obligations under this Agreement and shall remain solvent. The Administrator will report to the Issuer on a semi-annual basis its current and total assets, current and total liabilities, and total equity and the Company intends to include such amounts in its SEC reports.

  • Monitoring Services IDT staff shall, using methods that include face-to-face and other contacts with the member, monitor the services a member receives. This monitoring shall ensure that: a. The member receives the services and supports authorized, arranged for and coordinated by the IDT staff; b. The services and supports identified in the MCP as being provided by natural and community supports are being provided; and c. The quality of the services and supports received is adequate and still necessary to continue to meet the needs and preferences of the member and support the member’s outcomes identified in the MCP.

  • Mobile Banking Services Mobile Banking is a personal financial information management service that allows you to access account information and conduct transactions using compatible and supported mobile phones and/or other compatible and supported wireless devices (including phones, "Wireless Devices"). We reserve the right to modify the scope of the Mobile Banking services at any time. We reserve the right to refuse to make any transaction you request through Mobile Banking. You agree and understand that Mobile Banking may not be accessible or may have limited utility over some mobile telephone networks, such as while roaming.

  • Management and Control Systems Grantee will: 1. maintain an appropriate contract administration system to ensure that all terms, conditions, and specifications are met during the term of the contract through the completion of the closeout procedures. 2. develop, implement, and maintain financial management and control systems that meet or exceed the requirements of Uniform Statewide Accounting System (UGMS). Those requirements and procedures include, at a minimum, the following: i. Financial planning, including the development of budgets that adequately reflect all functions and resources necessary to carry out authorized activities and the adequate determination of costs; ii. Financial management systems that include accurate accounting records that are accessible and identify the source and application of funds provided under each Contract of this Contract, and original source documentation substantiating that costs are specifically and solely allocable to a Contract and its Contract and are traceable from the transaction to the general ledger; iii. Effective internal and budgetary controls; iv. Comparison of actual costs to budget; determination of reasonableness, allowableness, and allocability of costs; v. Timely and appropriate audits and resolution of any findings; vi. Billing and collection policies; and vii. Mechanism capable of billing and making reasonable efforts to collect from clients and third parties.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!