Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.
Security Procedure The Client acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Client from Security Procedures offered by State Street. The Client agrees that the Security Procedures are reasonable and adequate for its wire transfer transactions and agrees to be bound by any payment orders, amendments and cancellations, whether or not authorized, issued in its name and accepted by State Street after being confirmed by any of the selected Security Procedures. The Client also agrees to be bound by any other valid and authorized payment order accepted by State Street. The Client shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated in writing to State Street. The Client must notify State Street immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Client’s authorized personnel. State Street shall verify the authenticity of all instructions according to the Security Procedure.
Safety and Security Procedures Contractor shall maintain and enforce, at the Contractor Work Locations, industry-standard safety and physical security policies and procedures. While at each Court Work Location, Contractor shall comply with the safety and security policies and procedures in effect at such Court Work Location.
Security and Validation Procedures The Scheduling Coordinator shall apply to the Meter Data of the Scheduling Coordinator Metered Entities that it represents the security and validation procedures prescribed by the relevant Local Regulatory Authority. If the relevant Local Regulatory Authority has not prescribed any such procedures, the Scheduling Coordinator shall apply the procedures set forth in the CAISO Tariff. Meter Data submitted by a Scheduling Coordinator for Scheduling Coordinator Metered Entities shall conform to these standards unless the CAISO has, at its discretion, exempted the Scheduling Coordinator from these standards.
WARRANTY PROCEDURES You need proof of purchase for warranty service.
AML/KYC Procedures “AML/KYC Procedures” means the customer due diligence (CDD) procedures of a Reporting Financial Institution pursuant to the anti-money laundering or similar requirements of the jurisdiction concerned to which such Reporting Financial Institution is subject.
SAFETY PROCEDURES The Contractor shall:
CLAIM PROCEDURES Claim forms or claim information as to the subject policy can be obtained by contacting Benmark, Inc. (800-544-6079). When the Named Fiduciary has a claim which may be covered under the provisions described in the insurance policy, they should contact the office named above, and they will either complete a claim form and forward it to an authorized representative of the Insurer or advise the named Fiduciary what further requirements are necessary. The Insurer will evaluate and make a decision as to payment. If the claim is payable, a benefit check will be issued in accordance with the terms of this Agreement. In the event that a claim is not eligible under the policy, the Insurer will notify the Named Fiduciary of the denial pursuant to the requirements under the terms of the policy. If the Named Fiduciary is dissatisfied with the denial of the claim and wishes to contest such claim denial, they should contact the office named above and they will assist in making an inquiry to the Insurer. All objections to the Insurer's actions should be in writing and submitted to the office named above for transmittal to the Insurer.
Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls:
Mitigation Procedures The MCP agrees to coordinate with ODM to determine specific actions that will be required of the Business Associates for mitigation, to the extent practical, of the breach. These actions will include notification to the appropriate individuals, entities, or other authorities. Notification or communication to any media outlet shall be approved, in writing, by ODM prior to any such communication being released. The MCP shall report all of its mitigation activity to ODM and shall preserve all relevant records and evidence.