Compliance With Data Security Requirements Sample Clauses

Compliance With Data Security Requirements. To the Knowledge of the Company, in connection with its collection, storage, transfer (including without limitation, any transfer across national borders) and/or use of any information or Protected Data, the Company and its Subsidiaries are and have been, in material compliance with all applicable Privacy and Security Requirements. The Company and its Subsidiaries have commercially reasonable physical, technical, organizational and administrative security measures and policies in place to protect the confidentiality, integrity and availability of all systems, information and Protected Data maintained and collected by the Company or its Subsidiaries or on their behalf. Except as set forth in the Commission Documents, none of the Company or any of its Subsidiaries has experienced any security incident that has compromised the integrity or availability of the Company’s or its Subsidiaries’ network, systems, data or information. The Company and its Subsidiaries are and have been, to the Company’s Knowledge, in compliance in all material respects with all Privacy and Security Requirements relating to data loss, theft and breach of security notification obligations. None of the Company or its Subsidiaries has received, or provided, any written notice of any claims, actions, investigations, inquiries or alleged violations of Privacy and Security Requirements or any other security incidents.
AutoNDA by SimpleDocs
Compliance With Data Security Requirements. The Company and its Subsidiaries has at all times during the past three (3) years complied in all material respects with (i) all applicable Privacy Laws, (ii) all of the Company’s externally facing, publicly posted written privacy policies and notices (“Privacy Policies”) governing Data Treatment, and (iii) all of the Company’s legally-binding contractual obligations governing Data Treatment by or on behalf of the Company or any of its Subsidiaries (collectively, the “Data Security Requirements”). As required by applicable Privacy Laws, the Company and its Subsidiaries have in place commercially reasonable policies and procedures for receiving and responding to requests from individuals to exercise their rights under Data Security Requirements concerning their Personal Information. At all times during the past three (3) years, neither the Company’s nor any of its Subsidiaries’ Privacy Policies contain any material omissions or are misleading or deceptive in any material respect. At all times during the past three (3) years, the Company and its Subsidiaries have in place reasonable technical and organizational safeguards designed to protect Personal Information against loss, theft, misuse, or unauthorized access, use, modification, alteration, destruction or disclosure. During the past three (3) years (A) except as would not reasonably be expected to result in material liability to the Company or any of its Subsidiaries, to the Company’s Knowledge, there have been no actual or alleged breaches of, security incidents involving, misuse of or unauthorized access to the IT Systems, which has resulted in the unauthorized acquisition, destruction, damage, loss, corruption, alteration, use or disclosure of any Personal Information; and (B) neither the Company nor any of its Subsidiaries has received in writing any notices of any claims of, or investigations or inquiries related to, or to the Company’s Knowledge, has been charged with, the violation of, any Data Security Requirements.
Compliance With Data Security Requirements i. You are fully responsible for the security of data on your website or otherwise in your possession. Your company will: a. Comply with all then-current legal obligations and guidelines, including without limitation those issued by associations associated with the collection, security and dissemination of data on Merchant’s website, and expressly including the Visa Cardholder Information Security Program (CISP) and MasterCard's Site Data Protection (SDP) Program. These programs include without limitation requirements that Your company: maintain a network firewall, keep security patches up-to-date, encrypt stored data, maintain updated anti-virus software, restrict access to data (including physical access), maintain unique user identification, user tracking and password requirements, conduct regular testing of security systems and procedures, maintain a security information policy for employees and contractors. For details of these programs log onto xxx.xxxx.xxx/xxxx or xxx.xxxxxxxxxx.xxx/xxx; b. Conspicuously post on Your company’s website a privacy policy that meets all applicable legal and association requirements and is consistent with good business practices with respect to the collection and use of customerspersonally identifiable information; and c. Notify Us of any agent, including any gateway, shopping cart, or other third party provider, that has access to Cardholder data and ensure that such agent is compliant with all then-current legal obligations associated with the collection, security and dissemination of data; and notify Us immediately of any security breaches to Merchant's data records or system as it relates to the Services. If Merchant fails to comply with the requirements or We have indication of an actual or potential security breach, the Bank may suspend the provision of the Internet Services hereunder immediately upon written notice
Compliance With Data Security Requirements. To the Knowledge of the Company, in connection with its collection, storage, transfer (including without limitation, any transfer across national borders) and/or use of any information or Protected Data, the Company and its Subsidiaries are and have been, in material compliance with all Privacy and Security

Related to Compliance With Data Security Requirements

  • Data Security Requirements Without limiting Contractor’s obligation of confidentiality as further described in this Contract, Contractor must establish, maintain, and enforce a data privacy program and an information and cyber security program, including safety, physical, and technical security and resiliency policies and procedures, that comply with the requirements set forth in this Contract and, to the extent such programs are consistent with and not less protective than the requirements set forth in this Contract and are at least equal to applicable best industry practices and standards (NIST 800-53).

  • Compliance With Insurance Requirements Borrower will comply with all Insurance requirements and will not permit any condition to exist on the Mortgaged Property that would invalidate any part of any Insurance coverage required under this Loan Agreement.

  • Compliance with TIA Every amendment, waiver or supplement of this Indenture or the Securities shall comply with the TIA as then in effect.

  • Compliance with Safeguarding Customer Information Requirements The Servicer has implemented and will maintain security measures designed to meet the objectives of the Interagency Guidelines Establishing Standards for Safeguarding Customer Information published in final form on February 1, 2001, 66 Fed. Reg. 8616, and the rules promulgated thereunder, as amended from time to time (the “Guidelines”). The Servicer shall promptly provide the Seller information regarding the implementation of such security measures upon the reasonable request of the Seller.

  • Compliance with OFAC None of the Company and its Subsidiaries or, to the Company’s knowledge, any director, officer, agent, employee or affiliate of the Company and its Subsidiaries or any other person acting on behalf of the Company and its Subsidiaries, is currently subject to any U.S. sanctions administered by the Office of Foreign Assets Control of the U.S. Department of the Treasury (“OFAC”), and the Company will not, directly or indirectly, use the proceeds of the Offering hereunder, or lend, contribute or otherwise make available such proceeds to any subsidiary, joint venture partner or other person or entity, for the purpose of financing the activities of any person currently subject to any U.S. sanctions administered by OFAC.

  • Compliance with Requirements Any investment program furnished, and any activities performed, by the Manager or by a Sub-Adviser under this Section shall at all times conform to, and be in accordance with, any requirements imposed by: (1) the Act and any rules or regulations in force thereunder; (2) any other applicable laws, rules and regulations; (3) the Declaration of Trust and By-Laws of the Fund as amended from time to time; (4) any policies and determinations of the Board of Trustees of the Fund; and (5) the fundamental policies of the Fund, as reflected in its Registration Statement under the Act or as amended by the shareholders of the Fund.

  • Compliance with Applicable Requirements In carrying out its obligations under this Agreement, the Sub-Adviser shall at all times comply with: (a) all applicable provisions of the 1940 Act, and any rules and regulations adopted thereunder; (b) the provisions of the registration statement of the Trust, as it may be amended or supplemented from time to time, under the Securities Act and the 1940 Act; (c) the provisions of the Declaration of Trust of the Trust, as it may be amended or supplemented from time to time; (d) the provisions of any By-laws of the Trust, if adopted and as it may be amended from time to time, or resolutions of the Board as may be adopted from time to time; (e) the provisions of the Internal Revenue Code of 1986, as amended, applicable to the Trust or the Funds; (f) any other applicable provisions of state or federal law; and In addition, any code of ethics adopted by the Sub-Adviser must comply with Rule 17j-1 under the 1940 Act, as it may be amended from time to time, and any broadly accepted industry practices, if requested by the Trust or the Adviser.

  • Compliance with Data Protection Laws 2.1 bookinglab shall comply with its obligations under the Data Protection Laws as they apply to it as a Data Processor of the Customer Personal Data. 2.2 The Customer shall comply with its obligations under the Data Protection Laws as they apply to it as a Data Controller of the Customer Personal Data.

  • Compliance with FCPA Each of the Credit Parties and their Subsidiaries is in compliance with the Foreign Corrupt Practices Act, 15 U.S.C. §§ 78dd-1, et seq., and any foreign counterpart thereto. None of the Credit Parties or their Subsidiaries has made a payment, offering, or promise to pay, or authorized the payment of, money or anything of value (a) in order to assist in obtaining or retaining business for or with, or directing business to, any foreign official, foreign political party, party official or candidate for foreign political office, (b) to a foreign official, foreign political party or party official or any candidate for foreign political office, and (c) with the intent to induce the recipient to misuse his or her official position to direct business wrongfully to such Credit Party or its Subsidiary or to any other Person, in violation of the Foreign Corrupt Practices Act, 15 U.S.C. §§ 78dd-1, et seq.

  • Compliance with Accessibility Standards All parties to this Agreement shall ensure that the plans for and the construction of all projects subject to this Agreement are in compliance with standards issued or approved by the Texas Department of Licensing and Regulation (TDLR) as meeting or consistent with minimum accessibility requirements of the Americans with Disabilities Act (P.L. 101-336) (ADA).

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!