Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.
Personal Information security breach Supplier/Service Provider’s Obligations a) The Supplier/Service Provider shall notify the Information Officer of Transnet, in writing as soon as possible after it becomes aware of or suspects any loss, unauthorised access or unlawful use of any personal data and shall, at its own cost, take all necessary remedial steps to mitigate the extent of the loss or compromise of personal data and to restore the integrity of the affected Goods/Services as quickly as is possible. The Supplier/Service Provider shall also be required to provide Transnet with details of the persons affected by the compromise and the nature and extent of the compromise, including details of the identity of the unauthorised person who may have accessed or acquired the personal data. b) The Supplier/Service Provider shall provide on-going updates on its progress in resolving the compromise at reasonable intervals until such time as the compromise is resolved. c) Where required, the Supplier/Service Provider may be required to notify the South African Police Service; and/or the State Security Agency and where applicable, the relevant regulator and/or the affected persons of the security breach. Any such notification shall always include sufficient information to allow the persons to take protective measures against the potential consequences of the compromise. d) The Supplier/Service Provider undertakes to co‑operate in any investigation relating to security which is carried out by or on behalf of Transnet including providing any information or material in its possession or control and implementing new security measures.
Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks. (2) The Information Security Program shall require encryption of any Personal Information in electronic format while in transit or in storage, and enhanced controls and standards for transport and disposal of physical media containing Personal Information. DTI shall, and shall require its agents, contractors and subcontractors who access or use Personal Information or Confidential Information to, regularly test key controls, systems and procedures relating to the Information Security Program ("ISP Tests"). DTI shall advise the Funds of any material issues identified in the ISP Tests potentially affecting the Information Security Program. (3) DTI shall comply with its Information Security Program.
ARTICLE UNION SECURITY It is agreed that all employees covered by this Agree- ment shall become and remain members of the Union in good standing as a condition of employment. New employees shall make application for membership in the Union at the time of their hiring and shall become and remain members of the Union in good standing, as a condition of employment. The Employer agrees that it will inform all new employees prior to or at the time of hiring of the Union security provisions of the Agree- ment. The Employer or designate will during the first three (3) weeks of each individual’s employment make known to the new employee the names and work locations of union stewards in the store. The Employer shall, during the term of this Agreement, as a condition of employment, deduct from members of the bargaining unit the regular weekly Union Dues and such Dues shall be remitted to the Union prior to the 15th day of the month following the month in which such deduction is made. The Employer shall notify the Union of new full-time employees’ classifications and rates of pay in addition to ter- minations, on a monthly basis. Deduction statements shall be documented by location, containing the full name of the employee and his starting date and social insurance number subject to the employee consenting to the use of his or her social insurance number. The Employer agrees to record the annual Union Dues deductions for each employee on his Form. Employers shall provide dues information to the Union in an electronic format acceptable to both parties. In the event that such weekly Dues are changed during the term of the Agreement, such change must be given to the Employer by notice properly authorized by Union Officials and shall become effective within one month following the date the notice is received. New employees shall be documented and documents for- warded to the Union Office within two (2) weeks of hiring. The first sixty (60) days worked at each store shall be con- sidered a probationary period. It is understood between the Employer and the Union that a probationary employee shall be considered an employee for all purposes of the Agree- ment save that a probationary employee may be dismissed at any time during the probationary period.
Aviation Security 1. In accordance with their rights and obligations under international law, the Parties reaffirm that their obligation to each other to protect the security of civil aviation against acts of unlawful interference forms an integral part of this Agreement. Without limiting the generality of their rights and obligations under international law, the Parties shall in particular act in conformity with the provisions of the Convention on Offenses and Certain Other Acts Committed on Board Aircraft, done at Tokyo September 14, 1963, the Convention for the Suppression of Unlawful Seizure of Aircraft, done at The Hague December 16, 1970, the Convention for the Suppression of Unlawful Acts against the Safety of Civil Aviation, done at Montreal September 23, 1971, and the Protocol for the Suppression of Unlawful Acts of Violence at Airports Serving International Civil Aviation, done at Montreal February 24, 1988. 2. The Parties shall provide upon request all necessary assistance to each other to prevent acts of unlawful seizure of civil aircraft and other unlawful acts against the safety of such aircraft, of their passengers and crew, and of airports and air navigation facilities, and to address any other threat to the security of civil air navigation. 3. The Parties shall, in their mutual relations, act in conformity with the aviation security standards and appropriate recommended practices established by the International Civil Aviation Organization and designated as Annexes to the Convention; they shall require that operators of aircraft of their registry, operators of aircraft who have their principal place of business or permanent residence in their territory, and the operators of airports in their territory act in conformity with such aviation security provisions. 4. Each Party agrees to observe the security provisions required by the other Party for entry into, for departure from, and while within the territory of that other Party and to take adequate measures to protect aircraft and to inspect passengers, crew, and their baggage and carry-on items, as well as cargo and aircraft stores, prior to and during boarding or loading. Each Party shall also give positive consideration to any request from the other Party for special security measures to meet a particular threat. 5. When an incident or threat of an incident of unlawful seizure of aircraft or other unlawful acts against the safety of passengers, crew, aircraft, airports or air navigation facilities occurs, the Parties shall assist each other by facilitating communications and other appropriate measures intended to terminate rapidly and safely such incident or threat. 6. When a Party has reasonable grounds to believe that the other Party has departed from the aviation security provisions of this Article, the aeronautical authorities of that Party may request immediate consultations with the aeronautical authorities of the other Party. Failure to reach a satisfactory agreement within 15 days from the date of such request shall constitute grounds to withhold, revoke, limit, or impose conditions on the operating authorization and technical permissions of an airline or airlines of that Party. When required by an emergency, a Party may take interim action prior to the expiry of 15 days.
Application Security The ISP will require that in-house application development be governed by a documented secure software development life cycle methodology, which will include deployment rules for new applications and changes to existing applications in live production environments.
UNION SECURITY 7.01 The Employer shall deduct monthly from the pay due to each employee who is covered by this Agreement a sum equal to the monthly Union dues of each such employee. Where an employee has no earnings during the first payroll period, the deduction shall be made in the next payroll period where the employee has earnings, within that month. The Union shall notify the employer in writing of the amount of such dues from time to time. The Employer will send to the Union its cheque for the dues so deducted in the month following the month in which the dues are deducted. When arrears or adjustments are submitted retroactively, the dues month and an explanation will accompany any such dues. 7.02 The Employer shall provide the Union with a list showing the first and last names and Social Insurance Numbers of all employees from whom deductions have been made. The report will identify the name of the facility and the month from which the dues are remitted. The Employer will also identify job classification (where the bargaining unit includes classifications, employees paid less than RNs) and status (i.e. full-time, part-time) of the employees, all terminations, newly hired employees (including start date, where the existing system allows for the information without cost), and employees on Leaves of Absence. On a quarterly basis, the Home will also provide the members’ current addresses and phone numbers, shown on the Employer’s personnel records. The Employer will endeavour to provide information in electronic format if the Employer has the technology. The Union may forward any questions with respect to individual employees in writing (or e-mail) to the Administrator (or designate). The employer will respond to such requests with any information it has which is readily available, within two weeks. 7.03 The Employer shall provide each employee with a T4 Supplementary slip showing the dues deducted in the previous year for income tax purposes where such information is or becomes readily available through the employer's payroll system. 7.04 The Union shall indemnify and save the Employer harmless with respect to dues so deducted and remitted.
Transaction Security Each of the Parties agrees that the Transaction Security shall rank and secure the Credit Facility Liabilities, the Hedging Liabilities and the Pari Passu Debt Liabilities (subject to the terms of this Agreement) pari passu and without any preference between them (but only to the extent that such Transaction Security is expressed to secure those Liabilities).
Collateral and Security Section 10.01.
Collateral Subject to the terms of the applicable Collateral Documents, to secure the payment and performance of the Obligations hereunder, pursuant to a Collateral Account Pledge, a Security Agreement, the related financing statements and the other related documents, the Guarantor shall grant, and shall pledge and/or assign by way of security, to the Administrative Agent, for the benefit of each of the Secured Parties, as applicable, a first priority, security interest and Xxxx in and on its interests in the following, whether now owned or hereafter acquired or arising: (i) any and all Unfunded Capital Commitments of the Investors, whether now or hereafter committed, including but not limited to the right to draw down Investor Capital Contributions on such Unfunded Capital Commitments from such Investors and to issue Investor Capital Calls with respect thereto; (ii) to the extent relating to the Unfunded Capital Commitments of the Investors constituting Collateral in clause (i) above, (x) the Constituent Documents, (y) the Subscription Agreements and Side Letters, if any, of such Investors and (z) any and all guaranties of such Investors’ obligations under the Constituent Documents and Subscription Agreements including but not limited to, in each case of clauses (x), (y) and (z), any and all representations, warranties, covenants and other agreements of such Investors or guarantors contained therein, any and all duties and obligations of such Investors or guarantors thereunder and any and all rights to compel performance and enforce the provisions thereof against such Investors or guarantors and otherwise pursue remedies against such Investors or guarantors with respect thereto; (iii) any and all agreements, instruments and other documents of every kind or description to the extent evidencing or supporting obligations under any of the foregoing Collateral and any and all security and other property with respect to such Collateral; (iv) each Collateral Account, including but not limited to any and all funds and financial assets on deposit therein or credited thereto; and (v) any and all proceeds of any of the foregoing Collateral including, without limitation, all of the records of the Guarantor concerning any of the foregoing Collateral; excluding (A) any funds properly withdrawn from a Collateral Account (or that could be withdrawn pursuant to the Credit Agreement if deposited or credited to a Collateral Account) to the extent used, pursuant to the terms of the Guarantor’s Governing Documents, to purchase Portfolio Investments (other than Permitted Investments deposited in or credited to any such account), to make payments or distributions to Investors in accordance with the terms hereof or for any other purpose permitted under the Guarantor’s Governing Documents and this Credit Agreement, and (B) the proceeds of such withdrawn funds (the items in (A) and (B), collectively “Excluded Proceeds”). Notwithstanding the foregoing or anything to the contrary in this Credit Agreement or any other Loan Document (i) the term “Collateral” shall not include the Unfunded Capital Commitments of the SOX Insiders, including but not limited to the right to draw down Investor Capital Contributions on such Unfunded Capital Commitments, or any other interests of the SOX Insiders, if any, unless so elected by the Guarantor in its discretion, (ii) the term “Collateral” shall not include any Portfolio Investment, any Portfolio Assets or any Excluded Proceeds, (iii) the term “Collateral” shall not include any collateral posted or received in connection with the Swap Agreements, (iv) the Collateral may be subject to Permitted Liens, (v) a Borrower or the Guarantor may maintain other bank accounts or securities accounts in addition to the Collateral Accounts that will not be considered “Collateral” and such other accounts shall not be subject to control agreements or other restrictions and (vi) the Administrative Agent and the Secured Parties shall not have any Lien on any property that is not “Collateral”, except in connection with any Swap Agreement, as provided therein.