Compliance and Security Sample Clauses

Compliance and Security. CenturyLink has adopted and implemented, and will maintain, a corporate information security program designed to protect data transmitted or processed by CenturyLink from loss, misuse and unauthorized access or disclosure. Such program includes formal information security policies and procedures. The CenturyLink information security program is subject to reasonable changes by CenturyLink from time to time. Customer will ensure that all Customer data transmitted or processed via the Service complies with applicable law and reasonable information security practices, including those involving encryption.
AutoNDA by SimpleDocs
Compliance and Security. All applicants must comply fully with all local, state, and federal laws, as well as with the County’s policies and procedures for use of the Butler County Park system. • Xxxxxx County Park system security is under control of the County, and events are subject to inspection by County officials at any time. • Permission for use of Xxxxxx County Park system may be revoked by the County in an emergency, due to weather conditions, interference with County business, disruption of local business, misuse of facilities, or violation of policies and procedures. In no event shall the County be liable for loss or damage under any circumstance that may arise out of the County’s revocation of permission to use the park. • Permit holders are expected to use due caution and avoid reckless or irresponsible behavior while in the Xxxxxx County Park system. The following are park policies:
Compliance and Security. Azure Government clouds cater to specific compliance and security needs, especially suitable for government agencies and contractors. • Global Reach and Local Presence: Azure's global infrastructure ensures worldwide reach, while also offering data residency and compliance specific to local requirements. Hybrid Cloud Solutions (Azure + On-Premises): In hybrid scenarios, we blend Azure cloud services with on-premises infrastructure to deliver: • Flexibility and Balance: Optimal balance between cloud and on-premises resources, tailored to your unique business and operational needs. • Scalability and Innovation: Leverage Azure's scalability and innovation while maintaining certain workloads on-premises for compliance or latency reasons. • Integrated Management and Security: Unified security and management across cloud and on-premises environments, ensuring a secure and cohesive IT ecosystem. In summary, our approach is to leverage Azure's comprehensive suite of cloud services in alignment with your specific deployment needs, whether through Azure Stack for a private cloud, Azure Public and Government clouds, or a hybrid model combining Azure with your on-premises infrastructure. We prioritize creating a solution that is not only technically sound but also strategically aligned with your business objectives. Table 17A: Category 3 - Depth and Breadth of Offered Equipment Products and Services Indicate below if the listed types or classes of equipment, products, and services are offered within your proposal. Provide additional comments in the text box provided, as necessary. Line Item Category or Type Offered * Comments 95 IT Asset Management Services, including hardware and software asset management, software as a service management, audit management, maturity assessments, sustainability solutions, and repair and maintenance; Yes No Please reference a copy of Connection's Professional Services Hourly Rates. This information is Proprietary/Trade Secret. 96 IT datacenter decommissioning, including planning and valuation, data shredding, de- racking, de-cabling, de-powering, and packing; and, Yes No Please reference a copy of Connection's Professional Services Hourly Rates. This information is Proprietary/Trade Secret. 97 IT Asset Disposal and Retirement Services, including secure data destruction, serialization, asset value recovery, recycling, remarketing, refurbishing, onsite collection, and ESG reporting. Yes No Please reference a copy of Connection's Professi...
Compliance and Security. Each party shall comply with all laws and regulations applicable to the provision (in the case of Savvis) and use (in the case of Customer) of the Services provided hereunder. Savvis has adopted and implemented, and shall maintain throughout the Term, a formal documented corporate information security program designed to comply with applicable laws and protect Customer Data (defined below) from loss, misuse and unauthorized access or disclosure. Such program includes reasonable administrative, physical and technical safeguards, annual employee security awareness training and formal information security policies and/or procedures. To the extent that background checks ·do not violate the laws of the jurisdiction governing this Agreement, for Savvis employees that will have physical access to Customer equipment and Customer Data, Savvis will at the point in time a Canadian employee is hired by Savvis background check such employee. The background check will include a screening to identify individuals with a criminal record containing a felony conviction and will consist of (i) a Canadian Police Information Centre (CPIC) screening, (ii) an International Employment Verification and (iii) an International Education Verification. Savvis will not relocate Customer equipment containing Customer Data/Assets outside Canada. The Savvis information security program is subject to reasonable changes by Savvis from time to time provided, if such change(s) result in any substantive downgrade of the Savvis security program in existence as of the Effective Date of this Agreement, then Customer may upon thirty (30) days written notice to Savvis, terminate the Agreement without incurring early termination charges; provided the notice will specify the reason for such termination. Customer will ensure that all Customer Data stored or transmitted via the Service complies with all applicable laws and reasonable information security practices, including without limitation those relating to the encryption of data.
Compliance and Security. 12. Ownership Rights
Compliance and Security. (1) Interhost may carry out any search or enquiry (whether as routine check or otherwise) into compliance by the Customer with the terms of this Agreement.

Related to Compliance and Security

  • Compliance Reporting a. Provide reports to the Securities and Exchange Commission, the National Association of Securities Dealers and the States in which the Fund is registered.

  • Compliance Reports The Subadvisor at its expense will provide the Advisor with such compliance reports relating to its duties under this Agreement as may be agreed upon by such parties from time to time.

  • Money Market Fund Compliance Testing and Reporting Services Subject to the authorization and direction of the Trust and, in each case where appropriate, the review and comment by the Trust’s independent accountants and legal counsel, and in accordance with procedures that may be established from time to time between the Trust and the Administrator, the Administrator will:

Time is Money Join Law Insider Premium to draft better contracts faster.