Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.
Preservation of Information; Communications to Holders The Trustee shall preserve, in as current a form as is reasonably practicable, the names and addresses of Holders contained in the most recent list furnished to the Trustee as provided in Section 701 and the names and addresses of Holders received by the Trustee in its capacity as Security Registrar. The Trustee may destroy any list furnished to it as provided in Section 701 upon receipt of a new list so furnished. The rights of Holders to communicate with other Holders with respect to their rights under this Indenture or under the Securities, and the corresponding rights and privileges of the Trustee, shall be as provided by the Trust Indenture Act. Every Holder of Securities, by receiving and holding the same, agrees with the Company and the Trustee that neither the Company nor the Trustee nor any agent of either of them shall be held accountable by reason of any disclosure of information as to names and addresses of Holders made pursuant to the Trust Indenture Act.
Accessibility of Information Technology Contractor represents and warrants that any software/ hardware/ communications system/ equipment (collectively “technology”), if any, provided under this Agreement adheres to the standards and/or specifications as may be set forth in the Section 508 of the Rehabilitation Act of 1973 standards guide and is fully compliant with WCAG 2.0 AA standards for accessibility and compliant with any applicable FCC regulations. Technology that will be used on a mobile device must also be navigable with Voiceover on iOS devices in addition to meeting WCAG 2.0 level AA. If portions of the technology or user experience are alleged to be non-compliant or non- accessible at any point, District will provide Contractor with notice of such allegation and Contractor shall use its best efforts to make the technology compliant and accessible. If a state or federal department, office or regulatory agency, or if any other third party administrative agency or organization (“Claimants”), make a claim, allegation, initiates legal or regulatory process, or if a court finds or otherwise determines that technology is non-compliant or non-accessible, Contractor shall indemnify, defend and hold harmless the District from and against any and all such claims, allegations, liabilities, damages, penalties, fees, costs (including but not limited to reasonable attorneys’ fees), arising out of or related to Xxxxxxxxx’ claims. Contractor shall also fully indemnify District for the full cost of any user accommodation that is found to be necessary due to an identifiable lack of accessibility in the Contractor’s technology. If necessary, an independent 3rd party accessibility firm using POUR standards (Perceivable, Operable, Understandable and Robust) may be used to validate the accessibility of the technology.
Confidential Nature of Information Each party agrees that it will treat in confidence all documents, materials and other information which it shall have obtained regarding the other party during the course of the negotiations leading to the consummation of the transactions contemplated hereby (whether obtained before or after the date of this Agreement), the investigation provided for herein and the preparation of this Agreement and other related documents, and, if the transactions contemplated hereby are not consummated, each party will return to the other party all copies of nonpublic documents and materials which have been furnished in connection therewith. Such documents, materials and information shall not be communicated to any third Person (other than, in the case of Buyer, to its counsel, accountants, financial advisors or lenders, and in the case of Seller, to its counsel, accountants or financial advisors). No other party shall use any confidential information in any manner whatsoever except solely for the purpose of evaluating the proposed purchase and sale of the Purchased Assets; provided, however, that after the Closing Buyer may use or disclose any confidential information included in the Purchased Assets or otherwise reasonably related to the Business or the Purchased Assets. The obligation of each party to treat such documents, materials and other information in confidence shall not apply to any information which (i) is or becomes available to such party from a source other than the other party, (ii) is or becomes available to the public other than as a result of disclosure by such party or its agents, (iii) is required to be disclosed under applicable law or judicial process, but only to the extent it must be disclosed, or (iv) such party reasonably deems necessary to disclose to obtain any of the consents or approvals contemplated hereby.
Preservation of Information; Communications to Noteholders (a) The Indenture Trustee shall preserve, in as current a form as is reasonably practicable, the names and addresses of the Holders of Notes contained in the most recent list furnished to the Indenture Trustee as provided in Section 7.1 and the names and addresses of the Holders of Notes received by the Indenture Trustee in its capacity as Note Registrar. The Indenture Trustee may destroy any list furnished to it as provided in Section 7.1 upon receipt of a new list so furnished. (b) Noteholders may communicate pursuant to TIA Section 312(b) with other Noteholders with respect to their rights under this Indenture or under the Notes. (c) The Issuer, the Indenture Trustee and the Note Registrar shall have the protection of TIA Section 312(c).
E5 Freedom of Information The Contractor acknowledges that the Authority is subject to the requirements of the FOIA and the Environmental Information Regulations and shall assist and cooperate with the Authority to enable the Authority to comply with its Information disclosure obligations.
Personal Information security breach Supplier/Service Provider’s Obligations a) The Supplier/Service Provider shall notify the Information Officer of Transnet, in writing as soon as possible after it becomes aware of or suspects any loss, unauthorised access or unlawful use of any personal data and shall, at its own cost, take all necessary remedial steps to mitigate the extent of the loss or compromise of personal data and to restore the integrity of the affected Goods/Services as quickly as is possible. The Supplier/Service Provider shall also be required to provide Transnet with details of the persons affected by the compromise and the nature and extent of the compromise, including details of the identity of the unauthorised person who may have accessed or acquired the personal data. b) The Supplier/Service Provider shall provide on-going updates on its progress in resolving the compromise at reasonable intervals until such time as the compromise is resolved. c) Where required, the Supplier/Service Provider may be required to notify the South African Police Service; and/or the State Security Agency and where applicable, the relevant regulator and/or the affected persons of the security breach. Any such notification shall always include sufficient information to allow the persons to take protective measures against the potential consequences of the compromise. d) The Supplier/Service Provider undertakes to co‑operate in any investigation relating to security which is carried out by or on behalf of Transnet including providing any information or material in its possession or control and implementing new security measures.
Furnishing of Information; Public Information (a) Until the earliest of the time that (i) no Purchaser owns Securities or (ii) the Warrants have expired, the Company covenants to maintain the registration of the Common Stock under Section 12(b) or 12(g) of the Exchange Act and to timely file (or obtain extensions in respect thereof and file within the applicable grace period) all reports required to be filed by the Company after the date hereof pursuant to the Exchange Act even if the Company is not then subject to the reporting requirements of the Exchange Act. (b) At any time during the period commencing from the six (6) month anniversary of the date hereof and ending at such time that all of the Securities may be sold without the requirement for the Company to be in compliance with Rule 144(c)(1) and otherwise without restriction or limitation pursuant to Rule 144, if the Company (i) shall fail for any reason to satisfy the current public information requirement under Rule 144(c) or (ii) has ever been an issuer described in Rule 144(i)(1)(i) or becomes an issuer in the future, and the Company shall fail to satisfy any condition set forth in Rule 144(i)(2) (a “Public Information Failure”) then, in addition to such Purchaser’s other available remedies, the Company shall pay to a Purchaser, in cash, as partial liquidated damages and not as a penalty, by reason of any such delay in or reduction of its ability to sell the Securities, an amount in cash equal to two percent (2.0%) of the aggregate Subscription Amount of such Purchaser’s Securities on the day of a Public Information Failure and on every thirtieth (30th) day (pro rated for periods totaling less than thirty days) thereafter until the earlier of (a) the date such Public Information Failure is cured and (b) such time that such public information is no longer required for the Purchasers to transfer the Shares and Warrant Shares pursuant to Rule 144. The payments to which a Purchaser shall be entitled pursuant to this Section 4.2(b) are referred to herein as “Public Information Failure Payments.” Public Information Failure Payments shall be paid on the earlier of (i) the last day of the calendar month during which such Public Information Failure Payments are incurred and (ii) the third (3rd) Business Day after the event or failure giving rise to the Public Information Failure Payments is cured. In the event the Company fails to make Public Information Failure Payments in a timely manner, such Public Information Failure Payments shall bear interest at the rate of 1.5% per month (prorated for partial months) until paid in full. Nothing herein shall limit such Purchaser’s right to pursue actual damages for the Public Information Failure, and such Purchaser shall have the right to pursue all remedies available to it at law or in equity including, without limitation, a decree of specific performance and/or injunctive relief.
Shareholder Information Services (i) Make information available to shareholder servicing unit and other remote access units regarding trade date, share price, current holdings, yields, and dividend information. (ii) Produce detailed history of transactions through duplicate or special order statements upon request. (iii) Provide mailing labels for distribution of financial reports, prospectuses, proxy statements or marketing material to current shareholders. (iv) Respond as appropriate to all inquiries and communications from shareholders relating to shareholder accounts.
Use of Information Collected ICON may collect and may make use of personal information to assist in the operation of our website and to ensure delivery of the services you need and request. At times, we may find it necessary to use personally identifiable information (PII) as a means to keep you informed of other possible products and/or services that may be available to you from xxxxx://xxxx.xxxx.xxx. ICON may also be in contact with you in regards to completing surveys and/or research questionnaires related to your opinion of current or potential future services that may be offered. ICON does not now, but reserves the right in the future to sell, rent or lease any of our customer lists and/or names to any third party. ICON may deem it necessary to follow websites and/or pages that users may frequent in an effort to glean what types of services and/or products may be the most popular to customers or the public ICON may disclose your personal/organizational information, without prior notice to you, ONLY if required to do so in accordance with applicable laws and/or in a good faith belief that such action is deemed necessary or is required in an effort to: • Remain in compliance with any decrees, laws and/or statutes or in an effort to comply with any process which may be served upon ICON, and/or; • Maintain safeguard and/or preserve all the rights and/or property of ICON, and • Perform under demanding conditions in an effort to safeguard the personal safety of users of xxxxx://xxxx.xxxx.xxx and/or general public. All users and/or visitors to our website have the option to discontinue receiving communication from us and/or reserve the right to discontinue receiving communications by way of email or newsletters. To discontinue or unsubscribe to our website please send an email that you wish to unsubscribe/register to Xxxxxxx@xxxx.xxx. If you wish to unsubscribe/register or opt-out from any third- party websites, you must go to that specific website to unsubscribe and/or opt-out.