Corporate Information Security Program Sample Clauses

Corporate Information Security Program. The Custodian shall be subject at all times during the term of this Agreement to a corporate information security program (the “CIS Program”) established and maintained by State Street Corporation. The CIS Program shall, at a minimum, be reasonably designed to provide physical and electronic information security safeguards against the loss, theft, damage, compromise and unauthorized disclosure of Fund data in the possession of the Custodian. Upon a Fund’s reasonable request, which in no event shall be more than once annually, the Custodian shall furnish to the Fund a summary description of the CIS Program and arrange for staff to be available to the Fund to discuss the CIS Program. In the event that the Custodian does not provide a description of the CIS Program upon the Fund’s reasonable request, this may be considered a material breach of a material provision of this Agreement for the purposes of terminating the Agreement.”
AutoNDA by SimpleDocs
Corporate Information Security Program. The Custodian shall be subject at all times during the term of this Agreement to a corporate information security program (the “CIS Program”) established and maintained by State Street Corporation. The CIS Program shall, at a minimum, be reasonably designed to provide physical and electronic information security safeguards against the loss, theft, damage, compromise and unauthorized disclosure of Fund data in the possession of the Custodian. Upon a Fund’s reasonable request, which in no event shall be more than once annually, the Custodian shall furnish to the Fund a summary description of the CIS Program and arrange for staff to be available to the Fund to discuss the CIS Program.

Related to Corporate Information Security Program

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Information Security 10.1 The Transfer Agent shall maintain reasonable safeguards for maintaining in confidence any and all Fund Confidential Information, including, without limitation, the policies and procedures described in Section 10.2. The Transfer Agent shall not, at any time, use any such Fund Confidential Information for any purpose other than as specifically authorized by this Agreement, or in writing by the Fund.

  • INFORMATION SECURITY SCHEDULE All capitalized terms not defined in this Information Security Schedule (this “Security Schedule”) shall have the meanings ascribed to them in the Transfer Agency and Service Agreement by and between DST and each of the funds listed on Exhibit A thereto (each such fund, or series thereof, severally, and not jointly, the “Fund”) dated March 1, 2022 (the “Agreement”). DST and Fund hereby agree that DST shall maintain and comply with an information security policy (“Security Policy”) that satisfies the requirements set forth below; provided, that, because information security is a highly dynamic space (where laws, regulations and threats are constantly changing), DST reserves the right to make changes to its information security controls at any time and at the sole discretion of DST in a manner that it believes does not materially reduce the protection it applies to Fund Data. From time to time, DST may subcontract services performed under the Agreement (to the extent provided for under the Agreement) or provide access to Fund Data or its network to a subcontractor or other third party; provided, that, such subcontractor or third party implements and maintains security measures DST believes are at least as stringent as those described in this Security Schedule. For the purposes of this Schedule “prevailing industry practices and standards” refers to standards among financial institutions, including mutual funds, and third parties providing financial services to financial institutions.

  • Financial Information; Books and Records (a) The Seller SEC Documents include (i) the audited consolidated balance sheet of the Seller for each of the three fiscal years ended as of December 31, 2005, December 31, 2006 and December 31, 2007, and the related audited consolidated statements of operations, cash flows, and shareholders’ equity and comprehensive income of the Seller, together with all related notes and schedules thereto, accompanied by the reports thereon of the Seller’s independent accountants (collectively referred to herein as the “Seller Financial Statements”) and (ii) the unaudited condensed consolidated balance sheet of the Seller as of September 30, 2008, and the related unaudited consolidated statements of operations and cash flows of the Seller, together with all related notes and schedules thereto (the “Seller Interim Financial Statements”). The Seller has provided to the Purchaser copies of the unaudited consolidated balance sheet of the Business as of September 30, 2008, and the related unaudited consolidated statement of income, copies of which appear in Section 3.09 of the Seller Disclosure Schedule (collectively referred to herein as the “Business Financial Statements”). The Seller Financial Statements, the Seller Interim Financial Statements and the Business Financial Statements (I) were prepared in accordance with the books of account and other financial records of the Seller, its subsidiaries, the Companies, the Subsidiaries and the Group Companies, (II) present fairly in all material respects the consolidated financial condition and results of operations of the Seller, its subsidiaries, the Companies, the Subsidiaries and the Group Companies as of the dates thereof or for the periods covered thereby, except in the case of the Seller Interim Financial Statements and the Business Financial Statements for the absence of notes thereto and subject to normal and recurring year-end adjustments, and (III) have been prepared in accordance with GAAP applied on a basis consistent with the past practices of the Seller, its subsidiaries, the Companies, the Subsidiaries and the Group Companies.

  • Security and Safeguarding Information (a) Confidential Information that contains Non-Public Personal Information about customers is subject to the protections created by the Xxxxx-Xxxxx-Xxxxxx Act of 1999 (the “Act”) and under the standards for safeguarding Confidential Information, 16 CFR Part 314 (2002) adopted by Federal Trade Commission (“FTC”) (the “Safeguards Rule”). Additionally, state specific laws may regulate how certain confidential or personal information is safeguarded. The parties agree with respect to the Non-Public Personal Information to take all appropriate measures in accordance with the Act, and any state specific laws, as are necessary to protect the security of the Non-Public Personal Information and to specifically assure there is no disclosure of the Non-Public Personal Information other than as authorized under the Act, and any state specific laws, and this Agreement. With respect to Confidential Information, including Non-Public Personal Information and Personally Identifiable Financial Information as applicable, each of the parties agrees that:

  • Financial Information, etc The Administrative Agent shall have received:

  • DEALER MANAGER INFORMATION Prior to the initial Effective Date, the parties will expressly acknowledge and agree as to the information furnished to the Company by the Dealer Manager expressly for use in the Registration Statement.

  • Complete Information The Disclosure Information (as defined in Section 11.16) provided by WTC for inclusion in the Prospectus and the Preliminary Prospectus is true and accurate in all material respects. As of the Preliminary Prospectus Date and the Prospectus Date (a) there are no legal proceedings pending or known to be contemplated by governmental authorities against WTC or against any property of WTC, that would be material to the Noteholders, (b) WTC is not affiliated with any of the Affiliation Parties, and (c) there is no business relationship, agreement, arrangement, transaction or understanding between the Trustee and any of the Affiliation Parties that is entered into outside the ordinary course of business or is on terms other than would be obtained in an arm’s length transaction with an unrelated third party, apart from this transaction, that currently exists or that existed during the past two years and that is material to an investor’s understanding of the Notes.

  • Security / Passwords 2.1. A digital certificate and/or an encryption key may be required to access certain Services. You may apply for a digital certificate and/or an encryption key by following the procedures set forth at xxxx://xxx.xxx.xxx/certs/. You also will need an identification code (ID) and password(s) (Password) to access the Services.

  • LIFE COMPANY TO PROVIDE DOCUMENTS; INFORMATION ABOUT AVIF (a) LIFE COMPANY will provide to AVIF or its designated agent at least one (1) complete copy of all SEC registration statements, Account Prospectuses, reports, any preliminary and final voting instruction solicitation material, applications for exemptions, requests for no-action letters, and all amendments to any of the above, that relate to each Account or the Contracts, contemporaneously with the filing of such document with the SEC or other regulatory authorities.

Time is Money Join Law Insider Premium to draft better contracts faster.