Compliance with Information Security requirements Sample Clauses

Compliance with Information Security requirements. 1. The Eurosystem shall in accordance with and as described in Schedule 10 (Information Security): (a) implement the Information Security framework for T2S; (b) implement a process to manage Information Security in T2S by: (i) regularly re- viewing the implementation, and (ii) regularly updating the T2S Security Require- ments to keep them in line with technical developments; (c) maintain the T2S Threat Catalogue; (d) perform all activities related to Information Security in accordance with the provi- sions set out in Schedule 10 (Information Security); (e) report the results of Information Security reviews to the Contracting CSD; (f) report Information Security incidents to the Contracting CSD in accordance with the provisions set out in Schedule 10 (Information Security); (g) provide all other relevant information to the Contracting CSD to allow it to fulfil its own risk management obligations. 2. In view of ensuring Information Security for T2S, the Contracting CSD shall: (a) ensure its own compliance with Information Security requirements according to its internal standards, Legal and Regulatory Requirements and/or best practices; (b) report Information Security incidents to the Eurosystem, if T2S or other T2S Actors might be impacted by such incidents; (c) report to the Eurosystem newly identified threats or detected gaps that might threat- en T2S Information Security. 3. The parties shall cooperate according to the following provisions: (a) The Eurosystem shall at least on a yearly basis deliver for review to the Contracting CSD the T2S Information Security Risk Evaluation Table and the T2S Information Security Risk Treatment Plan, as further specified in section 4.2 of Schedule 10 (In- formation Security); (b) The Eurosystem shall maintain a consolidated action plan for all risks appearing in a T2S Information Security Risk Treatment plan, which require follow-up, and shall deliver for review to the Contracting CSD an updated version of the action plan at least on an annual basis, as further specified in section 4.2.2 of Schedule 10 (Infor- mation Security); (c) The Eurosystem shall set up a multilateral coordination substructure, in accordance with the Governance, for the coordination and monitoring of the T2S Information Security Risk Management activities, as further specified in section 4.3 of Schedule 10 (Information Security); (d) If a disagreement arises in the substructure, each Party shall be entitled to escalate the issue to the Steering L...
AutoNDA by SimpleDocs

Related to Compliance with Information Security requirements

  • Compliance with Safeguarding Customer Information Requirements The Servicer has implemented and will maintain security measures designed to meet the objectives of the Interagency Guidelines Establishing Standards for Safeguarding Customer Information published in final form on February 1, 2001, 66 Fed. Reg. 8616, and the rules promulgated thereunder, as amended from time to time (the “Guidelines”). The Servicer shall promptly provide the Seller information regarding the implementation of such security measures upon the reasonable request of the Seller.

  • Compliance with Information Requests Notwithstanding any other provision of the Deposit Agreement, the Articles of Association and applicable law, each Holder and Beneficial Owner agrees to (a) provide such information as the Company or the Depositary may request pursuant to law (including, without limitation, relevant Cayman Islands law, any applicable law of the United States, the Memorandum and Articles of Association, any resolutions of the Company’s Board of Directors adopted pursuant to the Memorandum and Articles of Association, the requirements of any markets or exchanges upon which the Shares, ADSs or Receipts are listed or traded, or to any requirements of any electronic book-entry system by which the ADSs or Receipts may be transferred), (b) be bound by and subject to applicable provisions of the laws of the Cayman Islands, the Memorandum and Articles of Association and the requirements of any markets or exchanges upon which the ADSs, Receipts or Shares are listed or traded, or pursuant to any requirements of any electronic book-entry system by which the ADSs, Receipts or Shares may be transferred, to the same extent as if such Holder and Beneficial Owner held Shares directly, in each case irrespective of whether or not they are Holders or Beneficial Owners at the time such request is made and, without limiting the generality of the foregoing, (c) comply with all applicable provisions of Cayman Islands law, the rules and requirements of any stock exchange on which the Shares are, or will be registered, traded or listed and the Articles of Association regarding any such Holder or Beneficial Owner’s interest in Shares (including the aggregate of ADSs and Shares held by each such Holder or Beneficial Owner) and/or the disclosure of interests therein, whether or not the same may be enforceable against such Holder or Beneficial Owner. The Depositary agrees to use its reasonable efforts to forward upon the request of the Company, and at the Company’s expense, any such request from the Company to the Holders and to forward to the Company any such responses to such requests received by the Depositary.

  • Compliance with Reporting Requirements The Company is subject to and in full compliance with the reporting requirements of Section 13 or Section 15(d) of the Exchange Act.

  • Compliance with USA Patriot Act In accordance with the requirements of the USA Patriot Act (Title III of Pub. L. 107-56 (signed into law October 26, 2001)), the Underwriters are required to obtain, verify and record information that identifies their respective clients, including the Company, which information may include the name and address of their respective clients, as well as other information that will allow the Underwriters to properly identify their respective clients.

  • Compliance with OFAC None of the Company and its Subsidiaries or, to the Company’s knowledge, any director, officer, agent, employee or affiliate of the Company and its Subsidiaries or any other person acting on behalf of the Company and its Subsidiaries, is currently subject to any U.S. sanctions administered by the Office of Foreign Assets Control of the U.S. Department of the Treasury (“OFAC”), and the Company will not, directly or indirectly, use the proceeds of the Offering hereunder, or lend, contribute or otherwise make available such proceeds to any subsidiary, joint venture partner or other person or entity, for the purpose of financing the activities of any person currently subject to any U.S. sanctions administered by OFAC.

  • Compliance with Obligations Buyer must have performed and complied with all its covenants and obligations required by this Agreement to be performed or complied with at or prior to Closing (singularly and in the aggregate) in all material respects.

  • Compliance with Instructions We will only Process Personal Data for the purposes described in this DPA or as otherwise agreed within the scope of your lawful Instructions, except where and to the extent otherwise required by applicable law. We are not responsible for compliance with any Data Protection Laws applicable to you or your industry that are not generally applicable to us.

  • Compliance with Patriot Act In order to comply with laws, rules, regulations and executive orders in effect from time to time applicable to banking institutions, including those relating to the funding of terrorist activities and money laundering (“Applicable Law”), the Owner Trustee is required to obtain, verify and record certain information relating to individuals and entities which maintain a business relationship with the Owner Trustee. Accordingly, the Seller shall cause to be provided to the Owner Trustee upon its reasonable request from time to time such identifying information and documentation as may be available to the Seller in order to enable the Owner Trustee to comply with Applicable Law.

  • Compliance with FCPA Each of the Credit Parties and their Subsidiaries is in compliance with the Foreign Corrupt Practices Act, 15 U.S.C. §§ 78dd-1, et seq., and any foreign counterpart thereto. None of the Credit Parties or their Subsidiaries has made a payment, offering, or promise to pay, or authorized the payment of, money or anything of value (a) in order to assist in obtaining or retaining business for or with, or directing business to, any foreign official, foreign political party, party official or candidate for foreign political office, (b) to a foreign official, foreign political party or party official or any candidate for foreign political office, and (c) with the intent to induce the recipient to misuse his or her official position to direct business wrongfully to such Credit Party or its Subsidiary or to any other Person, in violation of the Foreign Corrupt Practices Act, 15 U.S.C. §§ 78dd-1, et seq.

  • Compliance with Privacy Laws NCPS represents and warrants that its collection, access, use, storage, disposal and disclosure of Personal Data does and will comply with all applicable federal and state privacy and data protection laws, as well as all other applicable regulations. Without limiting the foregoing, NCPS shall implement administrative, physical and technical safeguards to protect Personal Data that are no less rigorous than accepted industry, and shall ensure that all such safeguards, including the manner in which Personal Data is collected, accessed, used, stored, processed, disposed of and disclosed, comply with applicable data protection and privacy laws, as well as the terms and conditions of this Escrow Agreement. NCPS shall use and disclose Personal Data solely and exclusively for the purposes for which the Personal Data, or access to it, is provided pursuant to the terms and conditions of this Escrow Agreement, and not use, sell, rent, transfer, distribute, or otherwise disclose or make available Personal Data for NCPS’s own purposes or for the benefit of any party other than Issuer. For purposes of this section, “Personal Data” shall mean information provided to NCPS by or at the direction of the Issuer, or to which access was provided to NCPS by or at the direction of the Issuer, in the course of NCPS’s performance under this Escrow Agreement that: (i) identifies or can be used to identify an individual (also known as a “data subject”) (including, without limitation, names, signatures, addresses, telephone numbers, e-mail addresses and other unique identifiers); or (ii) can be used to authenticate an individual (including, without limitation, employee identification numbers, government-issued identification numbers, passwords or PINs, financial account numbers, credit report information, biometric or health data, answers to security questions and other personal identifiers), including the identifying information on individuals described in Section 12.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!