Information Security 10.1 The Transfer Agent shall maintain reasonable safeguards for maintaining in confidence any and all Fund Confidential Information, including, without limitation, the policies and procedures described in Section 10.2. The Transfer Agent shall not, at any time, use any such Fund Confidential Information for any purpose other than as specifically authorized by this Agreement, or in writing by the Fund.
INFORMATION SECURITY SCHEDULE All capitalized terms not defined in this Information Security Schedule (this “Security Schedule”) shall have the meanings ascribed to them in the Transfer Agency and Service Agreement by and between DST and each of the funds listed on Exhibit A thereto (each such fund, or series thereof, severally, and not jointly, the “Fund”) dated March 1, 2022 (the “Agreement”). DST and Fund hereby agree that DST shall maintain and comply with an information security policy (“Security Policy”) that satisfies the requirements set forth below; provided, that, because information security is a highly dynamic space (where laws, regulations and threats are constantly changing), DST reserves the right to make changes to its information security controls at any time and at the sole discretion of DST in a manner that it believes does not materially reduce the protection it applies to Fund Data. From time to time, DST may subcontract services performed under the Agreement (to the extent provided for under the Agreement) or provide access to Fund Data or its network to a subcontractor or other third party; provided, that, such subcontractor or third party implements and maintains security measures DST believes are at least as stringent as those described in this Security Schedule. For the purposes of this Schedule “prevailing industry practices and standards” refers to standards among financial institutions, including mutual funds, and third parties providing financial services to financial institutions.
Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.
UNION SECURITY (a) The Company agrees that as a condition of employment all employees in the bargaining unit shall become members of the Union after the thirtieth day of their employment or thirty (30) days after the execution date of this AGREEMENT, whichever is later. All employees who become members of the Union shall remain members of the Union in good standing by proper tender of dues and initiation fees during the term of this AGREEMENT.
Custodian to Deliver Security and Transaction Information On each Business Day that the Federal Reserve Bank is open, the Custodian shall furnish the Trust with a detailed statement of monies held for the Fund under this Agreement and with confirmations and a summary of all transfers to or from the account of the Fund. At least monthly and from time to time, the Custodian shall furnish the Trust with a detailed statement of the Securities held for the Fund under this Agreement. Where Securities are transferred to the account of the Fund without physical delivery, the Custodian shall also identify as belonging to the Fund a quantity of Securities in a fungible bulk of Securities registered in the name of the Custodian (or its nominee) or shown on the Custodian's account on the books of the Book-Entry System or the Depository. With respect to information provided by this section, it shall not be necessary for the Custodian to provide notice as described by Article XI Section F. Notices to Trust; it shall be sufficient to communicate by such means as shall be mutually agreeable to the Trust and the Custodian.
Transaction Security Each Security Document to which it is a party validly creates the Security which is expressed to be created by that Security Document and evidences the Security it is expressed to evidence and is enforceable in accordance with its terms.
Cyber Security; Data Protection The Company’s and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted and are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with their businesses, and there have been no material breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any material incidents under internal review or investigations relating to the same. The Company and its subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification (“Data Protection Requirements”), in each case, except for such failures as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect. To ensure compliance with the Data Protection Requirements, the Company and its subsidiaries have in place, comply with, and take appropriate steps reasonably designed to ensure compliance in all material respects with their policies and procedures relating to data privacy and security and the collection, storage, use, disclosure, handling, and analysis of Personal Data (the “Policies”). The Company and its subsidiaries have at all times made all disclosures to users or customers required by applicable laws and regulatory rules or requirements, and none of such disclosures made or contained in any Policy have, to the knowledge of the Company, been inaccurate or in violation of any applicable laws and regulatory rules or requirements in any material respect. The Company further certifies that neither it nor any subsidiary: (i) has received notice of any actual or potential liability under or relating to, or actual or potential violation of, any of the Data Protection Requirements, and has no knowledge of any event or condition that would reasonably be expected to result in any such notice; (ii) is currently conducting or paying for, in whole or in part, any investigation, remediation, or other corrective action pursuant to any Data Protection Requirement; or (iii) is a party to any order, decree, or agreement that imposes any obligation or liability by any governmental authority under any Data Protection Requirement, in each case except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect.
Collateral and Security Section 10.01
Collateral The Collateral for this Note includes the Funding Agreement and the Guarantee specified on the face hereof.
Collateral Account and Security Interest At any time when Fund’s assets are below $15 million, the Advisor, for value received, hereby pledges, assigns, sets over and grants to the Trust a continuing security interest in and to an account to be established and maintained by the Advisor with the Securities Intermediary and designated as a collateral account (the “Collateral Account”), including any replacement account established with any successor, together with all dividends, interest, stock-splits, distributions, profits and all cash and non-cash proceeds thereof and any and all other rights as may now or hereafter derive or accrue therefrom (collectively, the “Collateral”) to secure the payment of any required Fund Reimbursement Payment or Liquidation Expenses (as defined in Paragraph 5 of this Agreement). For so long as this Agreement is in effect, any transfers or conveyances of Collateral to any party shall require the approval of the Board of Trustees of the Trust (the “Board”), except as specified in Section 7(a)(ii) of this Agreement, below. In addition, the Trust will not issue entitlement orders, redeem or otherwise take any action with respect to the Collateral or Collateral Account unless a Collateral Event (defined below under Section 5 of this Agreement) has occurred or is continuing.