Asset Protection. Where we act as your custodian, we have put in place a number of processes and procedures aimed at ensuring that assets held on your behalf will be protected. These processes include but are not limited to: • Maintaining clear and accurate internal records of the assets held on your behalf; • Having security procedures in relation to accepting instructions; • Regularly undertaking internal reconciliation of our records; • Satisfying our auditors that we have maintained systems adequate to protect your assets; • Hiring and training professional and competent staff; and • Using due care and skill in the selection of sub-custodians. Citibank, N.A., London Branch is a member of the Financial Services Compensation Scheme in the United Kingdom. The Financial Services Compensation Scheme is only available to certain types of claimants and claims where such eligible claims are against members of the Financial Services Compensation Scheme. Details of the Financial Services Compensation Scheme and who is eligible to claim are available on request or at the Financial Services Compensation Scheme’s official website at xxx.xxxx.xxx.xx.
Asset Protection. OCWA will be the xxxxxxx of the Facility on behalf of the Client. OCWA will maintain the Facility based on industry standards for similar facilities, normal wear and tear excluded. OCWA will maintain and utilize the Client’s computerized maintenance management system (CMMS; currently incorporated into the CMMS of the Elgin Area Primary Water Supply System) to control and record all maintenance activities, including but not limited to routine, preventative and breakdown maintenance activities. OCWA will provide the Client with immediate and complete access to all available information relating to the Facility as well as regular reporting.
Asset Protection. Xxxxxx agrees that it shall not injure, damage and/or destroy any fences, gates, roads, drainage structures, livestock, timber, or other property of Weyerhaeuser and/or of others on the Leased Property and shall be responsible for and shall reimburse Weyerhaeuser and/or others for any damages which may occur as a result of its activities. Xxxxxx agrees to promptly notify Weyerhaeuser of any injury or damage to the Leased Property.
Asset Protection. The SI shall protect, support and maintain all MTA-Provided Systems and other assets, including all structures (including the Transit System), and any other real property whether owned by the MTA Group or any other person or entity, with their appurtenances and connections as the same may be affected by the SI's performance of the Work. The SI shall promptly reconstruct and restore all structures that are damaged thereby to at least as good a condition as existed before the construction was begun. All such work shall be known as "Miscellaneous and Incidental Work."
Asset Protection. 8.1 The Supplier shall acquire, create, provide, manage and maintain mechanisms to prevent or mitigate destruction, loss, alteration, disclosure or misuse of equipment used within the Services Environment, Data and Controller assets, having regard to Good Industry Practice. This includes annual Penetration testing and the satisfactory completion of remedial actions identified following that testing.
8.2 All Data shall be appropriately backed up and stored in a secure facility which in line with industry practice would be off site.
8.3 The Supplier will ensure adequate business continuity services and disaster recovery services are in place and regularly tested. Evidence of this testing may be required as part of the Controller's due diligence.
8.4 The Supplier shall ensure that no-one, other than properly authorised Supplier Personnel, has physical access to any servers in scope under this Contract or used to deliver the Services, including any servers located at the Supplier's facilities without formal documented approval from the Controller.
8.5 In relation to Supplier 's facilities, the Supplier shall, at a minimum, acquire, create, provide, manage and maintain mechanisms to prevent or mitigate destruction, loss, alteration, disclosure or misuse of Controller systems and/or Data, having regard to Good Industry Practice.
8.6 The Supplier will fully and regularly assess the physical security risk for all premises and ensure reasonable controls are in place to prevent inappropriate access as would be expected for the National Health Service.
8.7 Implement National Cyber Security Centre (NCSC) guidelines (e.g. cyber essentials) as agreed with the Controller so that assets are protected.
Asset Protection. (Yards and Depots)
1. Provide advice on perimeter security, access control, alarms (intruder detection), surveillance, and National Key Points, physical security requirements, asset protection and cable theft; 2. Provide analysis of crime statistics and trends to inform the type of security services required so that crime risk is reduced across PRASA; 3. Ensure early detection of crime across PRASA infrastructure; 4. Effectively respond to and report incidents; 5. Conduct security checks over a specified area; 6. Conduct risk assessments and develop appropriate risk mitigation measures to target identified risks; 7. Ensure adherence to PRASA health and safety policies and procedures; 8. Utilise technology solutions to reduce crime incidents, tonnage losses and interruption of services; 9. Conduct regular aerial patrols to ensure protection of PRASA assets from theft and damage; 10. Conduct and manage surveillance of substations, relay rooms and GSM-R high sites; 11. Conduct and manage surveillance and patrol; 12. Conduct site surveys as and when required; 13. Conduct site profiling for risks.
Asset Protection. 1. Provider shall establish, implement and comply with information security policies, processes and procedures that meet or exceed the standards and controls set forth in ISO/IEC/BS 17799:2005, ISO/IEC 27001:2013 and ISO/IEC 27002:2013. In the absence of such certification, Provider shall provide evidence of policies and protocols similar and deemed reasonably acceptable to Northern.
2. Provider shall encrypt all Northern Confidential Information and Personally Identifiable Information while in transit over non-private networks or when transporting electronic media.
3. Provider shall encrypt the following data while at rest if applicable to the Provider’s Service: (a) Northern Client personal identification numbers (“PINs”); (b) Client PIN block numbers; (c) PIN encryption keys; (d) track data (e.g., primary account numbers, card verification values, and full card track); (e) Northern Confidential Information, Northern Personnel PII and/or Northern Client PII; and (f) and any other data required to be encrypted pursuant to any standard, Law or Regulation.
4. Provider shall implement adequate controls that prevent the transfer (whether intentional or non-intentional) of Malicious Code within or to Northern excluding when the Provider’s services run external to Northern’s network.
Asset Protection. A Beneficial Trust, often referred to as a Beneficiary Trust, is designed to hold assets for the benefit of one or more beneficiaries. Asset protection in the context of a Beneficial Trust works through several mechanisms:
Asset Protection. Approval in principle
3.5.1 As stated above, TW carried out the detailed assessment of CRT bridges following the Highways Agency established TA process. This process includes an initial stage for the Approval in Principle of the assessment methodology and the final stage of reporting on the assessment in an assessment report. AIPs and the associated assessment reports for two CRT bridges have been accepted and signed off by CRT and similar documents for the remaining four CRT bridges have been submitted to CRT for review and sign-off.
3.5.2 Approval in Principle documents have also been prepared for in-river structures and river and canal walls, and these have been submitted alongside the assessment reports for these assets.
3.5.3 Subject to the approval of the long term settlement reports provided by TW to CRT, it has been agreed that TW and CRT will enter into a formal asset protection agreement to cover each of the interfaces between the project and CRT’s assets. TW provided a draft of the asset protection agreement to CRT on 18 May 2013 and a further draft on 11 September 2013. Formal comments are anticipated from CRT shortly.
3.5.4 The asset protection agreement will provide for the submission of TW’s detailed designs, specifications and calculations, technical assessments, risk assessments and method statements to CRT for its approval.
3.5.6 TW will also submit details of its proposed measures to mitigate the risk of any damage to CRT’s assets (including by settlement) caused by the construction of the project. TW will provide condition surveys and inspect and monitor CRT’s assets to identify any impacts of ground movement occurring during or after the completion of construction, the provisions are to be discussed between the parties following receipt of CRT’s comments on the draft agreement.
Asset Protection. Assets held within a beneficial trust are shielded from the beneficiary’s personal liabilities, such as debts or legal claims. This protection is particularly beneficial for safeguarding family wealth from unforeseen risks.