Asset Management Sample Clauses
Asset Management. Supplier will: i) maintain an asset inventory of all media and equipment where Accenture Data is stored. Access to such media and equipment will be restricted to authorized Personnel; ii) classify Accenture Data so that it is properly identified and access to it is appropriately restricted; iii) maintain an acceptable use policy with restrictions on printing Accenture Data and procedures for appropriately disposing of printed materials that contain Accenture Data when such data is no longer needed under the Agreement; iv) maintain an appropriate approval process whereby Supplier’s approval is required prior to its Personnel storing Accenture Data on portable devices, remotely accessing Accenture Data, or processing such data outside of Supplier facilities. If remote access is approved, Personnel will use multi-factor authentication, which may include the use of smart cards with certificates, One Time Password (OTP) tokens, and biometrics.
Asset Management a. Data Sensitivity - DST acknowledges that it understands the sensitivity of Fund Data.
Asset Management a. Data Sensitivity - Transfer Agent acknowledges that it understands the sensitivity of Fund Data.
Asset Management. BNY Mellon will maintain an inventory of its system components, hardware and software used to provide the services, and will review and update such inventory in accordance with the ISP.
Asset Management. Supplier will: i) maintain an asset inventory of all media and equipment where Accenture Data is stored. Access to such media and equipment will be restricted to authorized Personnel; ii) classify Accenture Data so that it is properly identified and access to it is appropriately restricted;
Asset Management. The Manager shall:
2.4.1. Engage the services of such consultants, accountants, lenders, technical managers, attorneys, corporate fiduciaries, escrow agents, depositaries, custodians, transfer agents, agents for collection, insurers, insurance agents, developers, construction companies and other third parties the Manager believes necessary or appropriate for the conduct of the business of the Company;
2.4.2. Monitor the value of the investments of the Company;
2.4.3. Monitor and evaluate the performance of the investments of the Company;
2.4.4. Formulate and oversee the implementation of strategies for the administration, promotion, management, operation, maintenance, improvement, financing and refinancing, marketing, leasing and disposition of investments on an overall portfolio basis; and
2.4.5. Coordinate and manage relationships between the Company and any joint venture partners.
Asset Management a. Contractor has identified, inventoried, assigned ownership and established rules for acceptable use for information and associated assets; and
b. Contractor has a process in place to classify information in terms of its value, legal requirements, sensitivity and criticality to Contractor.
Asset Management. The Foundation shall receive, hold, manage, invest, and disperse contributions of cash, securities, and other forms of property, including current and deferred gifts that are contributed in the form of planned and deferred-gift instruments.
Asset Management. BNYM will maintain an inventory of its system components, hardware and software used to provide the Services, and will review and update such inventory in accordance with the ISP.
Asset Management. Supplier will: i) maintain an asset inventory of all media and equipment where IT One Data is stored. Access to such media and equipment will be restricted to authorized Personnel; ii) classify IT One Data so that it is properly identified and access to it is appropriately restricted; iii) maintain an acceptable use policy with restrictions on printing IT One Data and procedures for appropriately disposing of printed materials that contain IT One Data when such data is no longer needed under the Agreement; iv) maintain an appropriate approval process whereby Supplier’s approval is required prior to its Personnel storing IT One Data on portable devices, remotely accessing IT One Data, or processing such data outside of Supplier facilities. If remote access is approved, Personnel will use multi-factor authentication, which may include the use of smart cards with certificates, One Time Password (OTP) tokens, and biometrics.