Comply with Financial Security Standards when handling data Sample Clauses

Comply with Financial Security Standards when handling data. EmbassyCard does not expose any Customer identifiable data during transactions. However, you should take measures to comply with the applicable provisions of the Card Industry Data Security Standard (PCI-DSS) during the duration of these terms ("PCI Compliance"). Information about the PCI-DSS is available on the website of the PCI Council, xxxx://xxxxxxxxxxxxxxxxxxxx.xxx.
AutoNDA by SimpleDocs
Comply with Financial Security Standards when handling data. EmbassyCard does not expose any Customer identifiable data during transactions and we are not classified as EMV compatible. However, we aim to follow the industry practice where it can be applied to EmbassyCard Prepaid so you should take measures to comply with the applicable provisions of the Card Industry Data Security Standard (PCI-DSS) during the duration of these terms ("PCI Compliance"). Information about the PCI-DSS is available on the website of the PCI Council, xxxxx://xxxxxxxxxxxxxxxxxxxx.xxx.

Related to Comply with Financial Security Standards when handling data

  • Child Abuse Reporting Requirements A. Grantees shall comply with child abuse and neglect reporting requirements in Texas Family Code Chapter 261. This section is in addition to and does not supersede any other legal obligation of the Grantee to report child abuse. B. Grantee shall use the Texas Abuse Hotline Website located at xxxxx://xxx.xxxxxxxxxxxxxx.xxx/Login/Default.aspx as required by the System Agency. Grantee shall retain reporting documentation on site and make it available for inspection by the System Agency.

  • Child Abuse Reporting Requirement Grantee will: a. comply with child abuse and neglect reporting requirements in Texas Family Code Chapter 261. This section is in addition to and does not supersede any other legal obligation of the Grantee to report child abuse. b. develop, implement and enforce a written policy that includes at a minimum the System Agency’s Child Abuse Screening, Documenting, and Reporting Policy for Grantees/Providers and train all staff on reporting requirements. c. use the System Agency Child Abuse Reporting Form located at xxxxx://xxx.xxxx.xxxxx.xx.xx/Contact Us/report abuse.asp as required by the System Agency. d. retain reporting documentation on site and make it available for inspection by the System Agency.

  • CHILD ABUSE REPORTING CONTRACTOR hereby agrees to annually train all staff members, including volunteers, so that they are familiar with and agree to adhere to its own child and dependent adult abuse reporting obligations and procedures as specified in California Penal Code section 11164 et seq. and Education Code 44691. To protect the privacy rights of all parties involved (i.e., reporter, child and alleged abuser), reports will remain confidential as required by law and professional ethical mandates. A written statement acknowledging the legal requirements of such reporting and verification of staff adherence to such reporting shall be submitted to the LEA.

  • Federal Medicaid System Security Requirements Compliance Party shall provide a security plan, risk assessment, and security controls review document within three months of the start date of this Agreement (and update it annually thereafter) in order to support audit compliance with 45 CFR 95.621 subpart F, ADP System Security Requirements and Review Process.

  • Failure to Comply with the 1934 Act So long as the Buyer beneficially owns the Note, the Company shall comply with the reporting requirements of the 1934 Act; and the Company shall continue to be subject to the reporting requirements of the 1934 Act.

  • Joint Funded Project with the Ohio Department of Transportation In the event that the Recipient does not have contracting authority over project engineering, construction, or right-of-way, the Recipient and the OPWC hereby assign certain responsibilities to the Ohio Department of Transportation, an authorized representative of the State of Ohio. Notwithstanding Sections 4, 6(a), 6(b), 6(c), and 7 of the Project Agreement, Recipient hereby acknowledges that upon notification by the Ohio Department of Transportation, all payments for eligible project costs will be disbursed by the Grantor directly to the Ohio Department of Transportation. A Memorandum of Funds issued by the Ohio Department of Transportation shall be used to certify the estimated project costs. Upon receipt of a Memorandum of Funds from the Ohio Department of Transportation, the OPWC shall transfer funds directly to the Ohio Department of Transportation via an Intra- State Transfer Voucher. The amount or amounts transferred shall be determined by applying the Participation Percentages defined in Appendix D to those eligible project costs within the Memorandum of Funds. In the event that the Project Scope is for right-of-way only, notwithstanding Appendix D, the OPWC shall pay for 100% of the right-of-way costs not to exceed the total financial assistance provided in Appendix C.

  • Enterprise Information Management Standards Grantee shall conform to HHS standards for data management as described by the policies of the HHS Office of Data, Analytics, and Performance. These include, but are not limited to, standards for documentation and communication of data models, metadata, and other data definition methods that are required by HHS for ongoing data governance, strategic portfolio analysis, interoperability planning, and valuation of HHS System data assets.

  • Transfer to Comply with the Securities Act This Warrant, and the Warrant Shares, have not been registered under the 1933 Act. This Warrant, the Warrant Shares and any other security issued or issuable upon exercise of this Warrant may only be sold, transferred, pledged or hypothecated (other than to an Affiliate) if (a) there exists an effective registration statement under the 1933 Act relating to such security or (b) the Company has received an opinion of counsel reasonably satisfactory to the Company that registration is not required under the 1933 Act. Until such time as registration has occurred under the 1933 Act, each certificate for this Warrant, the Warrant Shares and any other security issued or issuable upon exercise of this Warrant shall contain a legend, in form and substance satisfactory to counsel for the Company, setting forth the restrictions on transfer contained in this Section 7. Any such transfer shall be accompanied by a transferor assignment substantially in the form attached to this Warrant as Exhibit B (the “Transferor Assignment”), executed by the transferor and the transferee and submitted to the Company. Upon receipt of the duly executed Transferor Assignment, the Company shall register the transferee thereon as the new Holder on the books and records of the Company and such transferee shall be deemed a “registered holder” or “registered assign” for all purposes hereunder, and shall have all the rights of the Holder.

  • Conformity with TIA Each amendment of this Indenture executed under this Article IX will conform to the requirements of the TIA as then in effect so long as this Indenture is qualified under the TIA.

  • Compliance with Texas Privacy Laws and Regulations In performing their respective obligations under the Agreement, the LEA and the Provider shall comply with all Texas laws and regulations pertaining to LEA data privacy and confidentiality, including but not limited to the Texas Education Code Chapter 32, and Texas Government Code Chapter 560.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!