ah Information Security Sample Clauses

ah Information Security. Except as would not reasonably be expected, either individually or in the aggregate, to have a Material Adverse Effect on Lone Star, to the Knowledge of Lone Star, no third party has gained unauthorized access to any information technology networks controlled by and material to the operation of the business of Lone Star.
AutoNDA by SimpleDocs

Related to ah Information Security

  • Information Security 10.1 The Transfer Agent shall maintain reasonable safeguards for maintaining in confidence any and all Fund Confidential Information, including, without limitation, the policies and procedures described in Section 10.2. The Transfer Agent shall not, at any time, use any such Fund Confidential Information for any purpose other than as specifically authorized by this Agreement, or in writing by the Fund.

  • INFORMATION SECURITY SCHEDULE All capitalized terms not defined in this Information Security Schedule (this “Security Schedule”) shall have the meanings ascribed to them in the Transfer Agency and Service Agreement by and between DST and each of the funds listed on Exhibit A thereto (each such fund, or series thereof, severally, and not jointly, the “Fund”) dated March 1, 2022 (the “Agreement”). DST and Fund hereby agree that DST shall maintain and comply with an information security policy (“Security Policy”) that satisfies the requirements set forth below; provided, that, because information security is a highly dynamic space (where laws, regulations and threats are constantly changing), DST reserves the right to make changes to its information security controls at any time and at the sole discretion of DST in a manner that it believes does not materially reduce the protection it applies to Fund Data. From time to time, DST may subcontract services performed under the Agreement (to the extent provided for under the Agreement) or provide access to Fund Data or its network to a subcontractor or other third party; provided, that, such subcontractor or third party implements and maintains security measures DST believes are at least as stringent as those described in this Security Schedule. For the purposes of this Schedule “prevailing industry practices and standards” refers to standards among financial institutions, including mutual funds, and third parties providing financial services to financial institutions.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Furnish Information It shall be a condition precedent to the obligations of the Company to take any action pursuant to this Section 2 with respect to the Registrable Securities of any selling Holder that such Holder shall furnish to the Company such information regarding itself, the Registrable Securities held by it, and the intended method of disposition of such securities as is reasonably required to effect the registration of such Holder’s Registrable Securities.

  • Holder Information Each Holder agrees, if requested in writing, to represent to the Company the total number of Registrable Securities held by such Holder in order for the Company to make determinations hereunder.

  • Seller Information The Company may require each seller of Registrable Securities as to which any registration is being effected to furnish, and such seller shall furnish, to the Company such information regarding the distribution of such securities as the Company may from time to time reasonably request in writing.

  • Rule 144 Information With a view to making available the benefits of certain rules and regulations of the SEC which may at any time permit the sale of the Registrable Securities to the public without registration, the Company agrees to:

  • Information Regarding Collateral All information supplied to Administrative Agent by or on behalf of any Loan Party with respect to any of the Collateral (in each case taken as a whole with respect to any particular Collateral) is accurate and complete in all material respects.

  • KYC Information (i) Upon the reasonable request of any Lender made at least five Business Days prior to the Closing Date, Borrower shall have provided to such Lender the documentation and other information so requested in connection with applicable “know your customer” and anti-money-laundering rules and regulations, including the Patriot Act, in each case at least five days prior to the Closing Date.

  • Buyer Information True and complete copies of all documents listed in the Buyer Disclosure Schedule have been made available or provided to Seller. The books of account, stock record books and other financial and corporate records of Buyer and the Buyer Subsidiaries, all of which have been made available to Seller, are complete and correct in all material respects.

Time is Money Join Law Insider Premium to draft better contracts faster.