Data and Systems Security Sample Clauses

Data and Systems Security. Member agrees to implement and maintain appropriate security measures to safeguard the security of images and data in Member’s possession or control from unauthorized access or disclosure. In no event shall Member take precautions any less stringent than those employed to protect its own proprietary and confidential information. On request, Member shall provide Credit Union with information regarding Member's internal controls and security procedures. If Credit Union believes that Member's controls, security measures, and procedures are inadequate to safeguard the item images and data maintained by Member, Credit Union may require Member to establish additional controls, security measures, and procedures. Member agrees to indemnify, defend, and hold Credit Union harmless from and against any disclosure of or unauthorized access to any other party’s confidential information (such as checking account number and financial institution) maintained by Member. Member agrees to notify Credit Union of any such disclosure, or of any penetration of Member's systems or information security measures by unauthorized parties.
AutoNDA by SimpleDocs
Data and Systems Security. Xxxxxx has documented information security program policies and procedures for ePHI are in place to guide personnel in the prevention, detection, containment, and correction of security violations. Responsibility for the development and implementation of information security policies and procedures is formally assigned to the compliance officer and the responsibilities of the compliance officer have been defined. • New employee and contractor user access requests for physical and logical access to systems containing ePHI are documented on a standard access request form and require the approval of HR prior to access being granted. Predefined security groups are utilized to assign role-based access privileges and segregate access within the network domain. Access to server rooms that contain systems infrastructure with ePHI data is controlled via biometric and PIN readers, and is restricted to authorized personnel. • Employees are required to complete security awareness training and sign an acknowledgement form, upon hire and on an annual basis thereafter, to confirm their understanding and obligation to comply with company data protection and security policies. • Web and SFTP servers utilize TLS and SSH encryption, respectively, for communication sessions over unsecured public networks. Data containing ePHI is stored in an encrypted format. Security monitoring applications are in place and configured to capture and analyze information system event logs including, but not limited to: o Failed logon events o Network perimeter and intrusion events o System state and configuration modifications
Data and Systems Security. Fiserv shall (1) implement, maintain, and enforce data and systems security in respect of Fiserv Systems; and (2) maintain and enforce in respect of (a) Northern Trust Systems that Fiserv is responsible for as part of Designated Services; and (b) Northern Trust Data, in each case on-line security standards and procedures at least as rigorous as those in effect at Northern Trust Service locations as of the Effective Date.
Data and Systems Security. Depositor agrees to implement and maintain appropriate security measures to safeguard the security of images and data in Depositor’s possession or control from unauthorized access or disclosure. In no event shall Depositor take precautions any less stringent than those employed to protect its own proprietary and confidential information. On request, Depositor shall provide Credit Union with information regarding Depositor's internal controls and security procedures. If Credit Union believes that Depositor's controls, security measures, and procedures are inadequate to safeguard the item images and data maintained by Depositor, Credit Union may require Depositor to establish additional controls, security measures, and procedures. Depositor agrees to indemnify, defend, and hold Credit Union harmless from and against any disclosure of or unauthorized access to any other party’s confidential information (such as checking account number and financial institution) maintained by Depositor. Depositor agrees to notify Credit Union of any such disclosure, or of any penetration of Depositor's systems or information security measures by unauthorized parties.
Data and Systems Security. As part of the Services, CSC agrees that it shall follow the latest steps and security precautions practiced in the software industry designed to prevent or stop the unauthorized access to, or sabotage of, the Services Systems that are used by CSC to perform the Services. CSC shall immediately notify Customer of any unauthorized use of, or unauthorized access to, the Customer Data or Services Systems. CSC agrees to conform to CSC's data and software security policies that are substantially comparable to Customer's Customer Data and System Security Policies set out in Schedule B hereto provide such Schedule B policies are applicable to the Services being provided by CSC for Customer pursuant to a relevant Exhibit or Work Assignment.

Related to Data and Systems Security

  • Data Access Services State Street agrees to make available to the Fund the Data Access Services subject to the terms and conditions of this Addendum and such data access operating standards and procedures as may be issued by State Street from time to time. The Fund shall be able to access the System to (i) originate electronic instructions to State Street in order to (a) effect the transfer or movement of cash or securities held under custody by State Street or (b) transmit accounting or other information (the transactions described in (i)(a) and (i)(b) above are referred to herein as “Client Originated Electronic Financial Instructions”), and (ii) access data for the purpose of reporting and analysis, which shall all be deemed to be Data Access Services for purposes of this Addendum.

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Infrastructure (a) The Borrower has and will maintain a sufficient infrastructure to conduct its business as presently conducted and as contemplated to be conducted following its execution of this Agreement.

  • DTC DIRECT REGISTRATION SYSTEM AND PROFILE MODIFICATION SYSTEM (a) Notwithstanding the provisions of Section 2.4 of the Deposit Agreement, the parties acknowledge that DTC’s Direct Registration System (“DRS”) and Profile Modification System (“Profile”) apply to the American Depositary Shares upon acceptance thereof to DRS by DTC. DRS is the system administered by DTC that facilitates interchange between registered holding of uncertificated securities and holding of security entitlements in those securities through DTC and a DTC participant. Profile is a required feature of DRS that allows a DTC participant, claiming to act on behalf of an Owner of American Depositary Shares, to direct the Depositary to register a transfer of those American Depositary Shares to DTC or its nominee and to deliver those American Depositary Shares to the DTC account of that DTC participant without receipt by the Depositary of prior authorization from the Owner to register that transfer.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Cybersecurity (i)(x) There has been no security breach or other compromise of or relating to any of the Company’s or any Subsidiary’s information technology and computer systems, networks, hardware, software, data (including the data of its respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of it), equipment or technology (collectively, “IT Systems and Data”) and (y) the Company and the Subsidiaries have not been notified of, and has no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to its IT Systems and Data; (ii) the Company and the Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification, except as would not, individually or in the aggregate, have a Material Adverse Effect; (iii) the Company and the Subsidiaries have implemented and maintained commercially reasonable safeguards to maintain and protect its material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and Data; and (iv) the Company and the Subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practices.

  • Information Systems The Official Agency in conjunction with the Authority will meet the relevant requirements of Articles 131 to 136 of Regulation (EU) 2017/625 and Implementing Regulation (EU) 2019/1715 as appropriate to the Official Agency. The Official Agency shall record appropriate data in the Official Agency Premises Inspection database (OAPI), which will be further developed over the life of the contract. Data should be entered into the database on an ongoing basis but shall be entered within one month of the activity taking place, unless otherwise agreed with the Authority.

Time is Money Join Law Insider Premium to draft better contracts faster.