AT&T Contractor Information Security Sample Clauses

AT&T Contractor Information Security. Requirements (CISR) Contractor agrees to comply with the AT&T Contractor Information Security Requirements (CISR) set forth in Appendix M attached hereto and incorporated by reference herein. Contractor agrees to cooperate fully with AT&T, including completing checklists or similar documentation, to ensure that Software and/or computer systems Contractor develops, designs, supports and/or uses under this Agreement comply with the standards and requirements set forth in the CISR. Contractor agrees to indemnify, defend at its expense, and hold AT&T, its Affiliates and its and their agents, employees and customers harmless against any Loss arising from or in connection with, or resulting from, any breach of the terms set forth in the CISR, in accordance with the Section herein entitled “Indemnity.” Proprietary and Confidential This Agreement and information contained therein is not for use or disclosure outside of AT&T, its Affiliates, and third party representatives, and Contractor except under written agreement by the contracting parties. THE COMPANY HAS REQUESTED AN ORDER FROM THE SECURITIES AND EXCHANGE COMMISSION (THE “COMMISSION”) GRANTING CONFIDENTIAL TREATMENT TO SELECTED PORTIONS. ACCORDINGLY, THE CONFIDENTIAL PORTIONS HAVE BEEN OMITTED FROM THIS EXHIBIT, AND HAVE BEEN FILED SEPARATELY WITH THE COMMISSION. OMITTED PORTIONS ARE INDICATED IN THIS EXHIBIT WITH “*****”. CONFIDENTIAL TREATMENT REQUESTED Agreement No. 20131116.001.C
AutoNDA by SimpleDocs
AT&T Contractor Information Security. Requirements (SISR) Contractor agrees to comply with the AT&T Contractor Information Security Requirements (SISR) set forth in Appendix “M” attached hereto and incorporated by reference herein. Contractor agrees to cooperate fully with AT&T, including, without limitation, completing checklists or similar documentation, to ensure that Software and/or computer systems Contractor develops, designs, supports and/or uses under this Agreement comply with the standards and requirements set forth in SISR. Contractor agrees to fully indemnify, defend at its expense, and hold AT&T, its Affiliates and their agents, employees and customers, harmless against any Loss arising out of or resulting from any breach of the terms set forth in SISR, in accordance with the Section herein entitled “Indemnity”.

Related to AT&T Contractor Information Security

  • Information Security 10.1 The Transfer Agent shall maintain reasonable safeguards for maintaining in confidence any and all Fund Confidential Information, including, without limitation, the policies and procedures described in Section 10.2. The Transfer Agent shall not, at any time, use any such Fund Confidential Information for any purpose other than as specifically authorized by this Agreement, or in writing by the Fund.

  • INFORMATION SECURITY SCHEDULE All capitalized terms not defined in this Information Security Schedule (this “Security Schedule”) shall have the meanings ascribed to them in the Transfer Agency and Service Agreement by and between DST and each of the funds listed on Exhibit A thereto (each such fund, or series thereof, severally, and not jointly, the “Fund”) dated March 1, 2022 (the “Agreement”). DST and Fund hereby agree that DST shall maintain and comply with an information security policy (“Security Policy”) that satisfies the requirements set forth below; provided, that, because information security is a highly dynamic space (where laws, regulations and threats are constantly changing), DST reserves the right to make changes to its information security controls at any time and at the sole discretion of DST in a manner that it believes does not materially reduce the protection it applies to Fund Data. From time to time, DST may subcontract services performed under the Agreement (to the extent provided for under the Agreement) or provide access to Fund Data or its network to a subcontractor or other third party; provided, that, such subcontractor or third party implements and maintains security measures DST believes are at least as stringent as those described in this Security Schedule. For the purposes of this Schedule “prevailing industry practices and standards” refers to standards among financial institutions, including mutual funds, and third parties providing financial services to financial institutions.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Privacy of Customer Information Company Customer Information in the possession of the Agent, other than information independently obtained by the Agent and not derived in any manner from or using information obtained under or in connection with this Agreement, is and shall remain confidential and proprietary information of the Companies. Except in accordance with this Section 10.10, the Agent shall not use any Company Customer Information for any purpose, including the marketing of products or services to, or the solicitation of business from, Customers, or disclose any Company Customer Information to any Person, including any of the Agent’s employees, agents or contractors or any third party not affiliated with the Agent. The Agent may use or disclose Company Customer Information only to the extent necessary (i) for examination and audit of the Agent’s activities, books and records by the Agent’s regulatory authorities, (ii) to protect or exercise the Agent’s, the Custodian’s and the Lenders’ rights and privileges or (iii) to carry out the Agent’s, the Custodian’s and the Lenders’ express obligations under this Agreement and the other Facilities Papers (including providing Company Customer Information to Approved Investors), and for no other purpose; provided that the Agent may also use and disclose the Company Customer Information as expressly permitted by the relevant Company in writing, to the extent that such express permission is in accordance with the Privacy Requirements. The Agent shall take commercially reasonable steps to ensure that each Person to which the Agent intends to disclose Company Customer Information, before any such disclosure of information, agrees to keep confidential any such Company Customer Information and to use or disclose such Company Customer Information only to the extent necessary to protect or exercise the Agent’s, the Custodian’s and the Lenders’ rights and privileges, or to carry out the Agent’s, the Custodian’s and the Lenders’ express obligations, under this Agreement and the other Facilities Papers (including providing Company Customer Information to Approved Investors). The Agent agrees to maintain an Information Security Program and to assess, manage and control risks relating to the security and confidentiality of Company Customer Information pursuant to such program in the same manner as the Agent does so in respect of their own customers’ information, and shall implement the standards relating to such risks in the manner set forth in the Interagency Guidelines Establishing Standards for Safeguarding Company Customer Information set forth in 12 CFR Parts 30, 208, 211, 225, 263, 308, 364, 568 and 570. Without limiting the scope of the foregoing sentence, the Agent shall use at least the same physical and other security measures to protect all Company Customer Information in the Agent’s possession or control as the Agent uses for their own customers’ confidential and proprietary information.

  • Customer Information The Dealer Manager will use commercially reasonable efforts to provide the Company with any and all subscriber information that the Company requests in order for the Company to comply with the requirements under Section 5(l) above.

  • Security and Safeguarding Information (a) Confidential Information that contains Non-Public Personal Information about customers is subject to the protections created by the Xxxxx-Xxxxx-Xxxxxx Act of 1999 (the “Act”) and under the standards for safeguarding Confidential Information, 16 CFR Part 314 (2002) adopted by Federal Trade Commission (“FTC”) (the “Safeguards Rule”). Additionally, state specific laws may regulate how certain confidential or personal information is safeguarded. The parties agree with respect to the Non-Public Personal Information to take all appropriate measures in accordance with the Act, and any state specific laws, as are necessary to protect the security of the Non-Public Personal Information and to specifically assure there is no disclosure of the Non-Public Personal Information other than as authorized under the Act, and any state specific laws, and this Agreement. With respect to Confidential Information, including Non-Public Personal Information and Personally Identifiable Financial Information as applicable, each of the parties agrees that:

  • Safeguarding Customer Information The Servicer has implemented and will maintain security measures designed to meet the objectives of the Interagency Guidelines Establishing Standards for Safeguarding Customer Information published in final form on February 1, 2001, 66 Fed. Reg. 8616 and the rules promulgated thereunder, as amended from time to time (the “Guidelines”). The Servicer shall promptly provide the Master Servicer, the Trustee and the NIMS Insurer information reasonably available to it regarding such security measures upon the reasonable request of the Master Servicer, the Trustee and the NIMS Insurer which information shall include, but not be limited to, any Statement on Auditing Standards (SAS) No. 70 report covering the Servicer’s operations, and any other audit reports, summaries of test results or equivalent measures taken by the Servicer with respect to its security measures to the extent reasonably necessary in order for the Seller to satisfy its obligations under the Guidelines.

  • Seller Information The Company may require each seller of Registrable Securities as to which any registration is being effected to furnish, and such seller shall furnish, to the Company such information regarding the distribution of such securities as the Company may from time to time reasonably request in writing.

  • LIFE COMPANY TO PROVIDE DOCUMENTS; INFORMATION ABOUT AVIF (a) LIFE COMPANY will provide to AVIF or its designated agent at least one (1) complete copy of all SEC registration statements, Account Prospectuses, reports, any preliminary and final voting instruction solicitation material, applications for exemptions, requests for no-action letters, and all amendments to any of the above, that relate to each Account or the Contracts, contemporaneously with the filing of such document with the SEC or other regulatory authorities.

  • KYC Information (i) Upon the reasonable request of any Lender made at least five Business Days prior to the Closing Date, Borrower shall have provided to such Lender the documentation and other information so requested in connection with applicable “know your customer” and anti-money-laundering rules and regulations, including the Patriot Act, in each case at least five days prior to the Closing Date.

Time is Money Join Law Insider Premium to draft better contracts faster.