Data and Systems Security Sample Clauses

Data and Systems Security. Member agrees to implement and maintain appropriate security measures to safeguard the security of images and data in Member’s possession or control from unauthorized access or disclosure. In no event shall Member take precautions any less stringent than those employed to protect its own proprietary and confidential information. On request, Member shall provide Credit Union with information regarding Member's internal controls and security procedures. If Credit Union believes that Member's controls, security measures, and procedures are inadequate to safeguard the item images and data maintained by Member, Credit Union may require Member to establish additional controls, security measures, and procedures. Member agrees to indemnify, defend, and hold Credit Union harmless from and against any disclosure of or unauthorized access to any other party’s confidential information (such as checking account number and financial institution) maintained by Member. Member agrees to notify Credit Union of any such disclosure, or of any penetration of Member's systems or information security measures by unauthorized parties.
AutoNDA by SimpleDocs
Data and Systems Security. Xxxxxx has documented information security program policies and procedures for ePHI are in place to guide personnel in the prevention, detection, containment, and correction of security violations. Responsibility for the development and implementation of information security policies and procedures is formally assigned to the compliance officer and the responsibilities of the compliance officer have been defined. • New employee and contractor user access requests for physical and logical access to systems containing ePHI are documented on a standard access request form and require the approval of HR prior to access being granted. Predefined security groups are utilized to assign role-based access privileges and segregate access within the network domain. Access to server rooms that contain systems infrastructure with ePHI data is controlled via biometric and PIN readers, and is restricted to authorized personnel. • Employees are required to complete security awareness training and sign an acknowledgement form, upon hire and on an annual basis thereafter, to confirm their understanding and obligation to comply with company data protection and security policies. • Web and SFTP servers utilize TLS and SSH encryption, respectively, for communication sessions over unsecured public networks. Data containing ePHI is stored in an encrypted format. Security monitoring applications are in place and configured to capture and analyze information system event logs including, but not limited to: o Failed logon events o Network perimeter and intrusion events o System state and configuration modifications
Data and Systems Security. Depositor agrees to implement and maintain appropriate security measures to safeguard the security of images and data in Depositor’s possession or control from unauthorized access or disclosure. In no event shall Depositor take precautions any less stringent than those employed to protect its own proprietary and confidential information. On request, Depositor shall provide Credit Union with information regarding Depositor's internal controls and security procedures. If Credit Union believes that Depositor's controls, security measures, and procedures are inadequate to safeguard the item images and data maintained by Depositor, Credit Union may require Depositor to establish additional controls, security measures, and procedures. Depositor agrees to indemnify, defend, and hold Credit Union harmless from and against any disclosure of or unauthorized access to any other party’s confidential information (such as checking account number and financial institution) maintained by Depositor. Depositor agrees to notify Credit Union of any such disclosure, or of any penetration of Depositor's systems or information security measures by unauthorized parties.
Data and Systems Security. (a) Fiserv shall (1) implement, maintain, and enforce data and systems security in respect of Fiserv Systems; and (2) maintain and enforce in respect of (a) any Northern Trust Systems that Fiserv is responsible for as part of Designated Services; and (b) any Northern Trust Data, in each case on-line security standards and procedures at least as rigorous as those in effect at the Original Service Location as of the Effective Date. (b) In the event Northern Trust Data is transmitted over an unsecured electronic network, the information must be either (1) encrypted using a commercially reasonable security technology that, at a minimum, is equivalent to 128-bit RC4 encryption technology (or its equivalent at the time) or (2) transmitted via a secure session that utilizes a commercially reasonable security technology that provides a level of security that, at a minimum, is equivalent to 128-bit RC4 encryption technology. (c) Fiserv shall encrypt any Northern Trust Data on portable media, including without limitation laptop computers, CD-ROMs, and thumb drives, in the event that such media is used or sent out of any Fiserv Service Location. The obligation set forth in the immediately preceding sentence applies to portable media used by any Fiserv Agent. Fiserv shall also notify the Northern Trust Relationship Manager promptly of any security breach or acquisition of Northern Trust Data by an unauthorized person. (d) In addition to the requirements set forth in Section 17.2 of this Agreement, Fiserv shall maintain the confidentiality of any nonpublic personal information obtained from Northern Trust in connection with the provision of the Services according to the standards established by 15 U.S.C. Section 6802 and any regulations issued in accordance thereto, subject to any statutory and regulatory exceptions. Fiserv shall also maintain appropriate measures designed to meet the objectives of the guidelines establishing information security standards as adopted by federal bank regulatory agencies, as well as any standards established by the Securities and Exchange Commission. Fiserv acknowledges that such standards currently require that reasonable measures be implemented to (1) ensure the security and confidentiality of any Northern Trust’s consumer customer information in Fiserv’s possession or control; (2) protect against any anticipated threat or hazards to the security or integrity of Northern Trust’s consumer customer information; (3) protect against unauth...
Data and Systems Security. As part of the Services, CSC agrees that it shall follow the latest steps and security precautions practiced in the software industry designed to prevent or stop the unauthorized access to, or sabotage of, the Services Systems that are used by CSC to perform the Services. CSC shall immediately notify Customer of any unauthorized use of, or unauthorized access to, the Customer Data or Services Systems. CSC agrees to conform to CSC's data and software security policies that are substantially comparable to Customer's Customer Data and System Security Policies set out in Schedule B hereto provide such Schedule B policies are applicable to the Services being provided by CSC for Customer pursuant to a relevant Exhibit or Work Assignment.
Data and Systems Security. Fiserv shall (1) implement, maintain, and enforce data and systems security in respect of Fiserv Systems; and (2) maintain and enforce in respect of (a) Northern Trust Systems that Fiserv is responsible for as part of Designated Services; and (b) Northern Trust Data, in each case on-line security standards and procedures at least as rigorous as those in effect at Northern Trust Service locations as of the Effective Date.

Related to Data and Systems Security

  • System and Data Access Services a. System. Subject to the terms and conditions of this Addendum and solely for the purpose of providing access to Fund Data as set forth herein, State Street hereby agrees to provide the Fund, or certain third parties approved by State Street that serve as the Fund`s investment advisors, investment managers or fund accountants (the "Fund Accountants") or as the Fund`s independent auditors (the "Auditor"), with access to State Street`s Multicurrency HORIZONR Accounting System and the other information systems described in Attachment A (collectively, the "System") on a remote basis solely on the computer hardware, system software and telecommunication links described in Attachment B (the "Designated Configuration") or on any designated substitute or back-up equipment configuration consented to in writing by State Street, such consent not to be unreasonably withheld.

  • Data Access Services State Street agrees to make available to the Fund the Data Access Services subject to the terms and conditions of this Addendum and such data access operating standards and procedures as may be issued by State Street from time to time. The Fund shall be able to access the System to (i) originate electronic instructions to State Street in order to (a) effect the transfer or movement of cash or securities held under custody by State Street or (b) transmit accounting or other information (the transactions described in (i)(a) and (i)(b) above are referred to herein as “Client Originated Electronic Financial Instructions”), and (ii) access data for the purpose of reporting and analysis, which shall all be deemed to be Data Access Services for purposes of this Addendum.

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Security Systems The Service may not be compatible with security systems. You may be required to maintain a telephone connection through your local exchange carrier in order to use any alarm monitoring functions for any security system installed in your home or business. You are responsible for contacting the alarm monitoring company to test the compatibility of any alarm monitoring or security system with the Service.

  • Data Access Access to Contract and State Data The Contractor shall provide to the Client Agency access to any data, as defined in Conn. Gen Stat. Sec. 4e-1, concerning the Contract and the Client Agency that are in the possession or control of the Contractor upon demand and shall provide the data to the Client Agency in a format prescribed by the Client Agency and the State Auditors of Public Accounts at no additional cost.

  • Network Services Local Access Services In lieu of any other rates and discounts, Customer will pay fixed monthly recurring local loop charges ranging from $1,200 to $2,000 for TDM-based DS-3 Network Services Local Access Services at 2 CLLI codes mutually agreed upon by Customer and Company.

  • Network Security The AWS Network will be electronically accessible to employees, contractors and any other person as necessary to provide the Services. AWS will maintain access controls and policies to manage what access is allowed to the AWS Network from each network connection and user, including the use of firewalls or functionally equivalent technology and authentication controls. AWS will maintain corrective action and incident response plans to respond to potential security threats.

  • Infrastructure Infrastructure serves as the foundation and building blocks of an integrated IT solution. It is the hardware which supports Application Services (C.3.2) and IT Management Services (C.3.3); the software and services which enable that hardware to function; and the hardware, software, and services which allow for secure communication and interoperability between all business and application service components. Infrastructure services facilitate the development and maintenance of critical IT infrastructures required to support Federal government business operations. This section includes the technical framework components that make up integrated IT solutions. One or any combination of these components may be used to deliver IT solutions intended to perform a wide array of functions which allow agencies to deliver services to their customers (or users), whether internal or external, in an efficient and effective manner. Infrastructure includes hardware, software, licensing, technical support, and warranty services from third party sources, as well as technological refreshment and enhancements for that hardware and software. This section is aligned with the FEA/DoDEA Technical Reference Model (TRM) which describes these components using a vocabulary that is common throughout the entire Federal government. A detailed review of the TRM is provided in Section J, Attachment 5. Infrastructure includes complete life cycle support for all hardware, software, and services represented above, including planning, analysis, research and development, design, development, integration and testing, implementation, operations and maintenance, information assurance, and final disposition of these components. The services also include administration and help desk functions necessary to support the IT infrastructure (e.g., desktop support, network administration). Infrastructure components of an integrated IT solution can be categorized as follows:

  • Contract Database Metadata Elements Title: Great Neck Union Free School District and Great Neck Paraprofessionals Association (2011) Employer Name: Great Neck Union Free School District Union: Great Neck Paraprofessionals Association Local: Effective Date: 07/01/2011 Expiration Date: 06/30/2015 PERB ID Number: 5132 Unit Size: Number of Pages: 28 For additional research information and assistance, please visit the Research page of the Catherwood website - xxxx://xxx.xxx.xxxxxxx.xxx/library/research/ For additional information on the ILR School - xxxx://xxx.xxx.xxxxxxx.xxx/ ARTICLE# TITLE PAGE# Preamble 2 Article 1 Association Rights 2 Article 2 Board-Administration-Association Relationship and Procedures 4 Article 3 Exchange of Proposals 6 Article 4 Professionals Duties and Responsibilities of Paraprofessionals 7 Article 5 Work Assignments 8 Article 6 Annual Appointment 10 Article 7 Selection and Promotion 10 Article 8 Evaluations and Standards 11 Article 9 Procedures for Termination of Employment 11 Article 10 Conferences 12 Article 11 Human Resource File 12 Article 12 Professional Growth 13 Article 13 Sick Leave 14 Article 14 Personal Leave 16 Article 15 Other Leaves 17 Article 16 Grievance Procedures 18 Article 17 Legal Assistance 19 Article 18 Conformity to Law 19 Article 19 Health Insurance 20 Article 20 Retirement Plan 20 Article 21 Salary Schedule 21 Article 22 Seniority Policy 23 Article 23 Compensation for Financial Loss 24 Article 24 Duration of Agreement 25 Appendix A Determination of Negotiating Unit 25 Appendix B Payroll Deduction Authorization 26 Appendix C Bus Aides 26 Appendix D Salary Schedules 27

  • Developer Attachment Facilities Developer shall design, procure, construct, install, own and/or control the Developer Attachment Facilities described in Appendix A hereto, at its sole expense.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!