Data Security The Provider agrees to utilize administrative, physical, and technical safeguards designed to protect Student Data from unauthorized access, disclosure, acquisition, destruction, use, or modification. The Provider shall adhere to any applicable law relating to data security. The provider shall implement an adequate Cybersecurity Framework based on one of the nationally recognized standards set forth set forth in Exhibit “F”. Exclusions, variations, or exemptions to the identified Cybersecurity Framework must be detailed in an attachment to Exhibit “H”. Additionally, Provider may choose to further detail its security programs and measures that augment or are in addition to the Cybersecurity Framework in Exhibit “F”. Provider shall provide, in the Standard Schedule to the DPA, contact information of an employee who XXX may contact if there are any data security concerns or questions.
Privacy and Data Security (a) In the prior three (3) years, the Company and its Subsidiaries have been in compliance with Privacy Laws, and in all material respects with (i) Contracts (or portions thereof) between the Company or its Subsidiaries and other Persons relating to Personal Data and (ii) applicable written policies, public statements and other public representations relating to the Processing of Personal Data, inclusive of all disclosures required by applicable Privacy Laws (“Privacy and Data Security Policies,” and together with Privacy Laws and such Contracts, “Privacy Commitments”). The execution, delivery and performance by the Company of this Agreement to which the Company is or will be a party, and the consummation of the transactions contemplated hereby or thereby, are not reasonably expected to, directly or indirectly, result in a violation of any Privacy Commitments that would be materially adverse to the Company and its Subsidiaries, taken as a whole. (b) In the prior three (3) years, the Privacy and Data Security Policies have at all times been maintained and made available to individuals in accordance with reasonable industry practices and as required by Privacy Laws, are accurate and complete and are not misleading or deceptive (including by omission). The practices of the Company or its Subsidiaries with respect to the Processing of Personal Data conform in all material respects to the Privacy and Data Security Policies that govern such Personal Data. (c) There is (and in the prior three years there has been) no material Legal Proceeding pending or, to the Company’s knowledge, threatened against or involving the Company or its Subsidiaries initiated by any Person (including (i) the Federal Trade Commission, any state attorney general or similar state official, (ii) any other Governmental authority, foreign or domestic or (iii) any regulatory or self-regulatory entity) alleging that any Processing of Personal Data by or on behalf of the Company or its Subsidiaries is or was in violation of any Privacy Commitments. To the Company’s Knowledge, there are no facts, circumstances or conditions that would reasonably be expected to form the basis for any proceeding for any potential violation of any Privacy Commitments. (d) In the prior three (3) years, (i) there has been no unauthorized access to, or unauthorized use, disclosure, or Processing of Personal Data in the possession or control of the Company or its Subsidiaries or any of its contractors with regard to any Personal Data obtained from or on behalf of the Company or its Subsidiaries (“Security Incident”), (ii) there have been no unauthorized intrusions or breaches of security into any Company IT Systems, and (iii) none of the Company or any of its Subsidiaries has notified or been required to notify any Person of any (A) loss, theft or damage of, or (B) other unauthorized or unlawful access to, or use, disclosure or other Processing of, Personal Data, except, in each case of clauses (i), (ii), and (iii), as would not have a Company Material Adverse Effect. Each of the Company and its Subsidiaries has implemented commercially reasonable administrative, physical and technical safeguards, and ensures that its contractors processing Personal Data take such safeguards to protect the confidentiality, integrity and security of Personal Data against any Security Incident, including taking all reasonable steps to safeguard and back up Personal Data. (e) Each of the Company and its Subsidiaries owns or has a license or other right to use the Company IT Systems as necessary to operate the business of each the Company or its Subsidiaries as currently conducted. All Company IT Systems are (i) free from any defect, bug, virus or programming, design or documentation error and (ii) in sufficiently good working condition to effectively perform all information technology operations necessary for the operation of businesses of the Company and its Subsidiaries (except for ordinary wear and tear), except in each case of clauses (i) and (ii), as is not and would not reasonably be expected to be, individually or in the aggregate, material to the Company and its Subsidiaries, taken as a whole. In the prior three years, there have not been any material failures, breakdowns or continued substandard performance of any Company IT Systems that have caused a material failure or disruption of the Company IT Systems other than routine failures or disruptions that have been remediated in the Ordinary Course of Business. In the past three (3) years, there have been no (except to the extent completely remediated), and to the Company’s Knowledge, there are no material security deficiencies or vulnerabilities in the Company IT Systems.
Credit Card If you choose to pay by credit card, you will be prompted to provide your credit card information and will be presented with a screen that reflects the amount of your subscription, the amount of fees that would be charged by the credit card issuer for the transaction and the total amount payable.
Cash Management System On or prior to the Closing Date and until the Termination Date, Borrower will establish and maintain the cash management system described in Schedule D. All payments in respect of the Collateral shall be made to or deposited in the blocked or lockbox accounts described in Schedule D in accordance with the terms thereof.
Linked Accounts All accounts with the Bank that you enroll in a service will be linked by the tax identification numbers of the persons authorized to access the account. The linked accounts will appear together without regard to the ownership of the accounts. For example, if an authorized user of a linked account accesses the Service, that authorized user will be able to view and access at a single time the following accounts: • the accounts of the business for which that person is an authorized user; • the accounts of any other business for which that person is an authorized user; and • any consumer accounts for which the person is a co-owner or authorized signer.
Cash Management Systems On or prior to the Closing Date, Borrowers will establish and will maintain until the Termination Date, the cash management systems described in Annex C (the “Cash Management Systems”).
Credit Cards About 60% of first-year students reported they have at least one credit card, although just 15% have two or more cards. Among those students who have credit cards, about 88% reported they pay off their balance each month and, as such, their current credit card balance is zero; however, when asked what their current credit card balance is, just 7% said it is zero. Among those with an unpaid balance, the average credit card debt students have is $1,549. Group 1 students tend to carry a higher balance on their credit cards than Group 2 and Group 3 students. None 40% 42% 45% 32% 42% One 45% 42% 42% 50% 47% Two 7% 6% 6% 8% 5% Three or more 8% 10% 7% 9% 7% Average number 1.8 2.8 1.2 2.2 1.4 Yes 88% 83% 88% 89% 88% Zero 7% 2% 14% 2% 7% $500 or less 83% 83% 79% 87% 79% $501 to $1,000 5% 7% 4% 6% 6% Over $1,000 5% 8% 4% 6% 7% Average (all with credit card) $487 $652 $352 $564 $2,208 Average (those with unpaid balance) $1,549 $1,954 $1,249 $1,648 $4,801 * Total credit card balance and payment of the balance were asked of those who had at least one credit card.
Visa Debit Card If approved, you may use your Visa® card to purchase goods and services from participating merchants. However, you may not use your card to initiate any type of gambling transaction. If you wish to pay for goods or services over the Internet, you may be required to provide card number security information before you will be permitted to complete the transaction. You agree that you will not use your card for any transaction that is illegal under applicable federal, state, or local law. Funds to cover your card purchases will be deducted from your share draft account. For ATM and one-time debit card transactions, you must consent to the Credit Union’s overdraft protection plan in order for the transaction amount to be covered under the plan. Without your consent, the Credit Union may not authorize and pay an overdraft resulting from these types of transactions. Services and fees for overdrafts are shown in the document the Credit Union uses to capture the member’s opt-in choice for overdraft protection and the Schedule of Fees and Charges.
Debit Card If approved, you may use your Visa® card to purchase goods and services from participating merchants. However, you may not use your card to initiate any type of gambling transaction. If you wish to pay for goods or services over the Internet, you may be required to provide card number security information before you will be permitted to complete the transaction. You agree that you will not use your card for any transaction that is illegal under applicable federal, state, or local law. Funds to cover your card purchases will be deducted from your share draft account. For ATM and one-time debit card transactions, you must consent to the Credit Union’s overdraft protection plan in order for the transaction amount to be covered under the plan. Without your consent, the Credit Union may not authorize and pay an overdraft resulting from these types of transactions. Services and fees for overdrafts are shown in the document the Credit Union uses to capture the member’s opt-in choice for overdraft protection and the Schedule of Fees and Charges.
Designated Accounts The Collection Account, the Note Distribution Account and the Reserve Account, collectively. Determination Date: The tenth day of each calendar month, or if such tenth day is not a Business Day, the next succeeding Business Day. Discount Rate: 0.00% per annum.