Cybersecurity Program Sample Clauses

Cybersecurity Program. Broker-Dealer represents, warrants and covenants that it has implemented and maintains, and shall continue to maintain, a cybersecurity program that includes administrative, technical and physical safeguards designed to protect the confidentiality, integrity and availability of Nonpublic Information and Broker-Dealer’s Information Systems. Broker-Dealer’s cybersecurity program is, and shall remain, designed to: (a) identify and assess internal and external cybersecurity risks that may threaten the security or integrity of Nonpublic Information stored on Broker-Dealer’s Information Systems; (b) use defensive infrastructure and implement policies and procedures to protect Broker-Dealer’s Information Systems, and Nonpublic Information stored on such Information Systems, from unauthorized access, use or other malicious acts and minimize the likelihood of harm to any individual; (c) detect Cybersecurity Events; (d) respond to identified or detected Cybersecurity Events to mitigate any negative effects; (e) recover from Cybersecurity Events and restore normal operations and services; (f) fulfill applicable regulatory reporting obligations; and (g) define and periodically reevaluate a schedule for retention of Nonpublic Information and a mechanism for its destruction when no longer needed.
AutoNDA by SimpleDocs
Cybersecurity Program. Broker-Dealer represents, warrants and covenants that it has implemented and maintains, and shall continue to maintain, a cybersecurity program that includes administrative, technical and physical safeguards designed to protect the confidentiality, integrity and availability of Nonpublic Information and Broker-Dealer’s VARIABLE BDSA_5-2021 BD V only(Notice) Information Systems. Broker-Dealer’s cybersecurity program is, and shall remain, designed to: (a) identify and assess internal and external cybersecurity risks that may threaten the security or integrity of Nonpublic Information stored on Broker-Dealer’s Information Systems; (b) use defensive infrastructure and implement policies and procedures to protect Broker-Dealer’s Information Systems, and Nonpublic Information stored on such Information Systems, from unauthorized access, use or other malicious acts and minimize the likelihood of harm to any individual; (c) detect Cybersecurity Events; (d) respond to identified or detected Cybersecurity Events to mitigate any negative effects; (e) recover from Cybersecurity Events and restore normal operations and services; (f) fulfill applicable regulatory reporting obligations; and (g) define and periodically reevaluate a schedule for retention of Nonpublic Information and a mechanism for its destruction when no longer needed.
Cybersecurity Program. Without limiting any other obligations hereunder, Investment Adviser has implemented and will maintain an information security program that includes reasonable and appropriate physical, technical and administrative measures to safeguard information it obtains under this Agreement, including but not limited to: (i) Written information security policies and procedures; (ii) Industry standard access controls to limit access to the information and systems containing the information only to those who need such access to perform the services hereunder, including requiring the use of multi-factor authentication for any remote access to the information or systems with access to the information; (iii) User identification and password standards, including length and configuration attributes (character composition, expiration term, no sharing of accounts, separate privileged user accounts from non-privileged user accounts, etc.); (iv) Industry accepted methods of secure encryption of the information in transit over public networks and, where applicable to Investment Adviser’s services, of data storage and backups of information at rest;
Cybersecurity Program. Subscriber Organization shall establish and maintain a continuous cybersecurity program (i.e., aligned with the intent of NERC CIP-003-6) that enables the Subscriber Organization (or its designated third party) to:
Cybersecurity Program. Seller shall establish and maintain a continuous cybersecurity program (i.e., aligned with the intent of NERC CIP-003-6) that enables the Seller (or its designated third party) to:

Related to Cybersecurity Program

  • Security Program Contractor will develop and implement an effective security program for the Project Site, which program shall require the Contractor and subcontractors to take measures for the protection of their tools, materials, equipment, and structures. As between Contractor and Owner, Contractor shall be solely responsible for security against theft of and damage of all tools and equipment of every kind and nature and used in connection with the Work, regardless of by whom owned.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks. (2) The Information Security Program shall require encryption of any Personal Information in electronic format while in transit or in storage, and enhanced controls and standards for transport and disposal of physical media containing Personal Information. DTI shall, and shall require its agents, contractors and subcontractors who access or use Personal Information or Confidential Information to, regularly test key controls, systems and procedures relating to the Information Security Program ("ISP Tests"). DTI shall advise the Funds of any material issues identified in the ISP Tests potentially affecting the Information Security Program. (3) DTI shall comply with its Information Security Program.

  • Security Procedure The Client acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Client from Security Procedures offered by State Street. The Client agrees that the Security Procedures are reasonable and adequate for its wire transfer transactions and agrees to be bound by any payment orders, amendments and cancellations, whether or not authorized, issued in its name and accepted by State Street after being confirmed by any of the selected Security Procedures. The Client also agrees to be bound by any other valid and authorized payment order accepted by State Street. The Client shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated in writing to State Street. The Client must notify State Street immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Client’s authorized personnel. State Street shall verify the authenticity of all instructions according to the Security Procedure.

  • NIST Cybersecurity Framework The U.S. Department of Commerce National Institute for Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity Version 1.1.

  • Security Plan The Business Continuity Plan and the Disaster Recovery Plan may be combined into one document. Additionally, at the beginning of each State Fiscal Year, if the MCO modifies the following documents, it must submit the revised documents and corresponding checklists for HHSC’s review and approval:

  • Safety Program The Contractor shall design a specific safety program for the Work for the site(s). The Contractor shall establish and require all Subcontractors to establish reasonable safety programs. The Contractor shall also submit its standard monthly safety reports to the Owner and Design Professional. No imposition of responsibility on the Contractor for safety under this Contract shall relieve any subcontractor of its responsibility for safety of persons or property on or near the Project Site. The Contractor shall include in his plant he names of the person in charge of Safety.

  • Cybersecurity (i)(x) There has been no security breach or other compromise of or relating to any of the Company’s or any Subsidiary’s information technology and computer systems, networks, hardware, software, data (including the data of its respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of it), equipment or technology (collectively, “IT Systems and Data”) and (y) the Company and the Subsidiaries have not been notified of, and has no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to its IT Systems and Data; (ii) the Company and the Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification, except as would not, individually or in the aggregate, have a Material Adverse Effect; (iii) the Company and the Subsidiaries have implemented and maintained commercially reasonable safeguards to maintain and protect its material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and Data; and (iv) the Company and the Subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practices.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!