CHS’ Information Security Incident Response Procedure Sample Clauses

CHS’ Information Security Incident Response Procedure outlines what CHS will do when an information security incident has been reported, and a copy can be obtained by contacting CHS.
AutoNDA by SimpleDocs

Related to CHS’ Information Security Incident Response Procedure

  • Security Incident Response Upon becoming aware of a Security Incident, MailChimp shall notify Customer without undue delay and shall provide timely information relating to the Security Incident as it becomes known or as is reasonably requested by Customer.

  • Personal Information security breach Supplier/Service Provider’s Obligations a) The Supplier/Service Provider shall notify the Information Officer of Transnet, in writing as soon as possible after it becomes aware of or suspects any loss, unauthorised access or unlawful use of any personal data and shall, at its own cost, take all necessary remedial steps to mitigate the extent of the loss or compromise of personal data and to restore the integrity of the affected Goods/Services as quickly as is possible. The Supplier/Service Provider shall also be required to provide Transnet with details of the persons affected by the compromise and the nature and extent of the compromise, including details of the identity of the unauthorised person who may have accessed or acquired the personal data. b) The Supplier/Service Provider shall provide on-going updates on its progress in resolving the compromise at reasonable intervals until such time as the compromise is resolved. c) Where required, the Supplier/Service Provider may be required to notify the South African Police Service; and/or the State Security Agency and where applicable, the relevant regulator and/or the affected persons of the security breach. Any such notification shall always include sufficient information to allow the persons to take protective measures against the potential consequences of the compromise. d) The Supplier/Service Provider undertakes to co‑operate in any investigation relating to security which is carried out by or on behalf of Transnet including providing any information or material in its possession or control and implementing new security measures.

  • Statement of Additional Information The Manager shall determine from time to time what securities and other investments will be purchased (including, as permitted in accordance with this paragraph, swap agreements, options and futures), retained, sold or exchanged by the Fund and what portion of the assets of the Funds portfolio will be held in the various securities and other investments in which the Fund invests, and shall implement those decisions (including the execution of investment documentation), all subject to the provisions of the Trusts Declaration of Trust and By-Laws (collectively, the Governing Documents), the 1940 Act, and the applicable rules and regulations promulgated thereunder by the Securities and Exchange Commission (the SEC) and interpretive guidance issued thereunder by the SEC staff and any other applicable federal and state law, as well as the investment objectives, policies and restrictions of the Fund referred to above, and any other specific policies adopted by the Board and disclosed to the Manager. The Manager is authorized as the agent of the Trust to give instructions to the custodian of the Fund as to deliveries of securities and other investments and payments of cash for the account of the Fund. Subject to applicable provisions of the 1940 Act and direction from the Board, the investment program to be provided hereunder may entail the investment of all or substantially all of the assets of the Fund in one or more investment companies. The Manager will place orders pursuant to its investment determinations for the Fund either directly with the issuer or with any broker or dealer, foreign currency dealer, futures commission merchant or others selected by it. In connection with the selection of such brokers or dealers and the placing of such orders, subject to applicable law, brokers or dealers may be selected who also provide brokerage and research services (as those terms are defined in Section 28(e) of the Securities Exchange Act of 1934, as amended (the Exchange Act)) to the Funds and/or the other accounts over which the Manager or its affiliates exercise investment discretion. The Manager is authorized to pay a broker or dealer who provides such brokerage and research services a commission for executing a portfolio transaction for the Fund which is in excess of the amount of commission another broker or dealer would have charged for effecting that transaction if the Manager determines in good faith that such amount of commission is reasonable in relation to the value of the brokerage and research services provided by such broker or dealer. This determination may be viewed in terms of either that particular transaction or the overall responsibilities which the Manager and its affiliates have with respect to accounts over which they exercise investment discretion. The Board may adopt policies and procedures that modify and restrict the Managers authority regarding the execution of the Funds portfolio transactions provided herein. The Manager shall also provide advice and recommendations with respect to other aspects of the business and affairs of the Fund, shall exercise voting rights, rights to consent to corporate action and any other rights pertaining to the Fund's portfolio securities subject to such direction as the Board may provide, and shall perform such other functions of investment management and supervision as may be directed by the Board. The Manager may execute on behalf of the Fund certain agreements, instruments and documents in connection with the services performed by it under this Agreement. These may include, without limitation, brokerage agreements, clearing agreements, account documentation, futures and option agreements, swap agreements, other investment related agreements, and any other agreements, documents or instruments the Manager believes are appropriate or desirable in performing its duties under this Agreement.

  • Dissemination of Research Findings and Acknowledgement of Controlled-Access Datasets Subject to the NIH GDS Policy

  • Notice Information Notice identifier/version: 557b600a-d52f-4303-8110-b3d46b2b781b - 01 Form type: Competition Notice type: Contract or concession notice – standard regime Notice dispatch date: 26/07/2024 10:09 +01:00 Languages in which this notice is officially available: English

  • Vendor Logo (Supplemental Vendor Information Only) No response Optional. If Vendor desires that their logo be displayed on their public TIPS profile for TIPS and TIPS Member viewing, Vendor may upload that logo at this location. These supplemental documents shall not be considered part of the TIPS Contract. Rather, they are Vendor Supplemental Information for marketing and informational purposes only. Some participating public entities are required to seek Disadvantaged/Minority/Women Business & Federal HUBZone ("D/M/WBE/Federal HUBZone") vendors. Does Vendor certify that their entity is a D/M/WBE/Federal HUBZone vendor? If you respond "Yes," you must upload current certification proof in the appropriate "Response Attachments" location. NO Some participating public entities are required to seek Historically Underutilized Business (HUB) vendors as defined by the Texas Comptroller of Public Accounts Statewide HUB Program. Does Vendor certify that their entity is a HUB vendor? If you respond "Yes," you must upload current certification proof in the appropriate "Response Attachments" location. No Can the Vendor provide its proposed goods and services to all 50 US States? Yes

  • COMPLIANCE WITH NEW YORK STATE INFORMATION SECURITY BREACH AND NOTIFICATION ACT Contractor shall comply with the provisions of the New York State Information Security Breach and Notification Act (General Business Law Section 899-aa; State Technology Law Section 208).

  • Security Incident Reporting A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.

  • Supplemental Vendor Information Only) No response Optional. If Vendor desires that their logo be displayed on their public TIPS profile for TIPS and TIPS Member viewing, Vendor may upload that logo at this location. These supplemental documents shall not be considered part of the TIPS Contract. Rather, they are Vendor Supplemental Information for marketing and informational purposes only. Some participating public entities are required to seek Disadvantaged/Minority/Women Business & Federal HUBZone ("D/M/WBE/Federal HUBZone") vendors. Does Vendor certify that their entity is a D/M/WBE/Federal HUBZone vendor? If you respond "Yes," you must upload current certification proof in the appropriate "Response Attachments" location. NO Some participating public entities are required to seek Historically Underutilized Business (HUB) vendors as defined by the Texas Comptroller of Public Accounts Statewide HUB Program. Does Vendor certify that their entity is a HUB vendor? If you respond "Yes," you must upload current certification proof in the appropriate "Response Attachments" location. No Can the Vendor provide its proposed goods and services to all 50 US States? No

  • Handling Sensitive Personal Information and Breach Notification A. As part of its contract with HHSC Contractor may receive or create sensitive personal information, as section 521.002 of the Business and Commerce Code defines that phrase. Contractor must use appropriate safeguards to protect this sensitive personal information. These safeguards must include maintaining the sensitive personal information in a form that is unusable, unreadable, or indecipherable to unauthorized persons. Contractor may consult the “Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals” issued by the U.S. Department of Health and Human Services to determine ways to meet this standard. B. Contractor must notify HHSC of any confirmed or suspected unauthorized acquisition, access, use or disclosure of sensitive personal information related to this Contract, including any breach of system security, as section 521.053 of the Business and Commerce Code defines that phrase. Contractor must submit a written report to HHSC as soon as possible but no later than 10 business days after discovering the unauthorized acquisition, access, use or disclosure. The written report must identify everyone whose sensitive personal information has been or is reasonably believed to have been compromised. C. Contractor must either disclose the unauthorized acquisition, access, use or disclosure to everyone whose sensitive personal information has been or is reasonably believed to have been compromised or pay the expenses associated with HHSC doing the disclosure if: 1. Contractor experiences a breach of system security involving information owned by HHSC for which disclosure or notification is required under section 521.053 of the Business and Commerce Code; or 2. Contractor experiences a breach of unsecured protected health information, as 45 C.F.R. §164.402 defines that phrase, and HHSC becomes responsible for doing the notification required by 45 C.F.R. §164.404. HHSC may, at its discretion, waive Contractor's payment of expenses associated with HHSC doing the disclosure.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!