Access and Security Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.
Password Security You are responsible for maintaining adequate security and control of any and all User IDs, Passwords, hints, personal identification numbers (PINs), or any other codes that you use to access the Account. Do not discuss, compare, or share information about your account number or password unless you are willing to give them full use of your money. Any loss or compromise of the foregoing information and/or your personal information may result in unauthorized access to your Account by third-parties and the loss or theft of any funds held in your Account and any associated accounts, including your Account. Checks and electronic withdrawals are processed by automated methods, and anyone who obtains your account number or access device could use it to withdraw money from your account, with or without your permission. You are responsible for keeping your email address and telephone number up to date in order to receive any notices or alerts that we may send you. We assume no responsibility for any loss that you may sustain due to compromise of your account login credentials due to no fault of ours and/or your failure to follow or act on any notices or alerts that we may send to you. If you believe your Account information has been compromised, or that someone has transferred or may transfer money from your account without your permission, contact us immediately, through Synapse, at xxxx@xxxxxxxxx.xxx or call at +0(000) 000-0000. You agree to promptly review all Account and transaction records and other Communications that we make available to you and to promptly report any discrepancy to us.
Server Security Servers containing unencrypted PHI COUNTY discloses to 4 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 5 must have sufficient administrative, physical, and technical controls in place to protect that data, based 6 upon a risk assessment/system security review.
PROTECTION OF LENDER'S SECURITY (a) If Borrower fails to perform any of its obligations under this Instrument or any other Loan Document, or if any action or proceeding is commenced which purports to affect the Mortgaged Property, Lender's security or Lender's rights under this Instrument, including eminent domain, insolvency, code enforcement, civil or criminal forfeiture, enforcement of Hazardous Materials Laws, fraudulent conveyance or reorganizations or proceedings involving a bankrupt or decedent, then Lender at Lender's option may make such appearances, disburse such sums and take such actions as Lender reasonably deems necessary to perform such obligations of Borrower and to protect Lender's interest, including (1) payment of fees and out-of-pocket expenses of attorneys, accountants, inspectors and consultants, (2) entry upon the Mortgaged Property to make repairs or secure the Mortgaged Property, (3) procurement of the insurance required by Section 19, and (4) payment of amounts which Borrower has failed to pay under Sections 15 and 17. (b) Any amounts disbursed by Lender under this Section 12, or under any other provision of this Instrument that treats such disbursement as being made under this Section 12, shall be added to, and become part of, the principal component of the Indebtedness, shall be immediately due and payable and shall bear interest from the date of disbursement until paid at the "Default Rate", as defined in the Note. (c) Nothing in this Section 12 shall require Lender to incur any expense or take any action.
Replacement of Note 2.1 In the event that this Note is mutilated, destroyed, lost or stolen, Payor shall, at its sole expense, execute, register and deliver a new Note, in exchange and substitution for this Note, if mutilated, or in lieu of and substitution for this Note, if destroyed, lost or stolen. In the case of destruction, loss or theft, Payee shall furnish to Payor indemnity reasonably satisfactory to Payor, and in any such case, and in the case of mutilation, Payee shall also furnish to Payor evidence to its reasonable satisfaction of the mutilation, destruction, loss or theft of this Note and of the ownership thereof. Any replacement Note so issued shall be in the same outstanding principal amount as this Note and dated the date to which interest shall have been paid on this Note or, if no interest shall have yet been paid, dated the date of this Note. 2.2 Every Note issued pursuant to the provisions of Section 2.1 above in substitution for this Note shall constitute an additional contractual obligation of the Payor, whether or not this Note shall be found at any time or be enforceable by anyone.
Premises Security 10.1 Security of premises and control of access.
Data Security The Provider agrees to utilize administrative, physical, and technical safeguards designed to protect Student Data from unauthorized access, disclosure, acquisition, destruction, use, or modification. The Provider shall adhere to any applicable law relating to data security. The provider shall implement an adequate Cybersecurity Framework based on one of the nationally recognized standards set forth set forth in Exhibit “F”. Exclusions, variations, or exemptions to the identified Cybersecurity Framework must be detailed in an attachment to Exhibit “H”. Additionally, Provider may choose to further detail its security programs and measures that augment or are in addition to the Cybersecurity Framework in Exhibit “F”. Provider shall provide, in the Standard Schedule to the DPA, contact information of an employee who XXX may contact if there are any data security concerns or questions.
System Security (a) If any party hereto is given access to the other party’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party given access (the “Availed Party”) shall comply with all of the other party’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other party. The Availed Party shall access and use only those Systems of the other party for which it has been granted the right to access and use. (b) Each party hereto shall use commercially reasonable efforts to ensure that only those of its personnel who are specifically authorized to have access to the Systems of the other party gain such access, and use commercially reasonable efforts to prevent unauthorized access, use, destruction, alteration or loss of information contained therein, including notifying its personnel of the restrictions set forth in this Agreement and of the Security Regulations. (c) If, at any time, the Availed Party determines that any of its personnel has sought to circumvent, or has circumvented, the Security Regulations, that any unauthorized Availed Party personnel has accessed the Systems, or that any of its personnel has engaged in activities that may lead to the unauthorized access, use, destruction, alteration or loss of data, information or software of the other party hereto, the Availed Party shall promptly terminate any such person’s access to the Systems and immediately notify the other party hereto. In addition, such other party hereto shall have the right to deny personnel of the Availed Party access to its Systems upon notice to the Availed Party in the event that the other party hereto reasonably believes that such personnel have engaged in any of the activities set forth above in this Section 9.2(c) or otherwise pose a security concern. The Availed Party shall use commercially reasonable efforts to cooperate with the other party hereto in investigating any apparent unauthorized access to such other party’s Systems.
E7 Security The Authority shall be responsible for maintaining the security of the Authority premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority premises, and shall ensure that all Staff comply with such requirements.
Holding and Using Posted Collateral (i) Eligibility to Hold Posted Collateral; Custodians. Counterparty and its Custodian will be entitled to hold Posted Collateral pursuant to Paragraph 6(b); provided that the following conditions applicable to it are satisfied: (1) Counterparty is not a Defaulting Party; and (2) Posted Collateral may be held only in the following jurisdictions: New York State or such other state in the United States in which the Counterparty is located; and (3) the account is segregated from all other accounts held by the Counterparty and its Custodian. (4) Party B may appoint as Custodian (A) the entity then serving as Trustee under the Pooling Agreement or (B) any other entity if such entity (or, to the extent applicable, the parent company or credit support provider) shall have a long-term senior unsecured debt rating by S&P of at least “A” or a short-term senior unsecured debt rating of at least “A-1” by S&P. Initially, the Custodian for Counterparty is: None