Document Retention; Information Security Sample Clauses

Document Retention; Information Security. (a) In performing the Administrative Services and its obligations under this Agreement, the Administrator shall at all times comply with The Hartford Document Retention Policy to the extent applicable to the Administered Contracts and Accounts. The Companies represent and warrant that The Hartford Document Retention Policy attached as Schedule F hereto, to the extent it applies to the provision of the Administrative Services, is the Companies’ document retention policy as of the Closing Date (the “Closing Date Document Retention Policy”). If The Hartford Document Retention Policy, to the extent it would apply to the provision of the Administrative Services, differs in any material respect from the Closing Date Document Retention Policy, then the Administrator shall be entitled to implement the Closing Date Document Retention Policy in lieu of The Hartford Document Retention Policy, subject to the following sentences of this Section 3.12(a). Before implementing the Closing Date Document Retention Policy, the Administrator’s Relationship Manager shall notify the Companies’ Relationship Manager of the issue and the Relationship Managers shall meet within five (5) days thereafter to discuss the matter. Unless the Companies’ Relationship Manager in good faith disagrees with the Administrator’s position within ten (10) days after such meeting, the Administrator shall be entitled to implement the Closing Date Document Retention Policy in lieu of The Hartford Document Retention Policy. If, however, the Companies’ Relationship Manager in good faith disagrees with the Administrator’s position, the Administrator shall be entitled to seek to resolve the dispute pursuant to Section 21.1 and, if the dispute cannot be resolved pursuant to such Section, then pursuant to Sections 21.2 through 21.10. The Administrator’s exclusive remedy for the Companies’ breach of the representation and warranty set forth in the second sentence of this Section 3.12(a) shall be the right to implement the Closing Date Document Retention Policy going forward and, if applicable, to recover its reasonable and documented incremental costs incurred in implementing The Hartford Document Retention Policy instead of the Closing Date Document Retention Policy.
AutoNDA by SimpleDocs

Related to Document Retention; Information Security

  • Information Security 10.1 The Transfer Agent shall maintain reasonable safeguards for maintaining in confidence any and all Fund Confidential Information, including, without limitation, the policies and procedures described in Section 10.2. The Transfer Agent shall not, at any time, use any such Fund Confidential Information for any purpose other than as specifically authorized by this Agreement, or in writing by the Fund.

  • File Security and Retention; Confidentiality A. USBFS and its agents will provide reasonable security provisions to ensure that unauthorized third parties do not have access to the Trust’s data bases, files, and other information provided by the Trust to USBFS for use with the Electronic Services, the names of End Users or End User transaction or account data (collectively, “Trust Files”). USBFS’s security provisions with respect to the Electronic Services, the Trust’s web site(s) and the Trust Files will be no less protected than USBFS’s security provisions with respect to its own proprietary information. USBFS agrees that any and all Trust Files maintained by USBFS for the Trust hereunder shall be available for inspection by the Trust’s regulatory authorities during regular business hours, upon reasonable prior written notice to USBFS, and will be maintained and retained in accordance with applicable requirements of the 1940 Act. USBFS will take such actions as are necessary to protect the intellectual property contained within the Trust’s web site(s) or any software, written materials, or pictorial materials describing or creating the Trust’s web site(s), including all interface designs or specifications. USBFS will take such actions as are reasonably necessary to protect all rights to the source code and interface of the Trust’s web site(s). In addition, USBFS will not use, or permit the use of, names of End Users for the purpose of soliciting any business, product, or service whatsoever except where the communication is necessary and appropriate for USBFS’s delivery of the Electronic Services.

  • INFORMATION SECURITY SCHEDULE All capitalized terms not defined in this Information Security Schedule (this “Security Schedule”) shall have the meanings ascribed to them in the Transfer Agency and Service Agreement by and between DST and each of the funds listed on Exhibit A thereto (each such fund, or series thereof, severally, and not jointly, the “Fund”) dated March 1, 2022 (the “Agreement”). DST and Fund hereby agree that DST shall maintain and comply with an information security policy (“Security Policy”) that satisfies the requirements set forth below; provided, that, because information security is a highly dynamic space (where laws, regulations and threats are constantly changing), DST reserves the right to make changes to its information security controls at any time and at the sole discretion of DST in a manner that it believes does not materially reduce the protection it applies to Fund Data. From time to time, DST may subcontract services performed under the Agreement (to the extent provided for under the Agreement) or provide access to Fund Data or its network to a subcontractor or other third party; provided, that, such subcontractor or third party implements and maintains security measures DST believes are at least as stringent as those described in this Security Schedule. For the purposes of this Schedule “prevailing industry practices and standards” refers to standards among financial institutions, including mutual funds, and third parties providing financial services to financial institutions.

  • Transaction Information The Adviser shall furnish to the Trust such information concerning portfolio transactions as may be necessary to enable the Trust or its designated agent to perform such compliance testing on the Funds and the Adviser’s services as the Trust may, in its sole discretion, determine to be appropriate. The provision of such information by the Adviser to the Trust or its designated agent in no way relieves the Adviser of its own responsibilities under this Agreement.

  • Custodian to Deliver Security and Transaction Information On each Business Day that the Federal Reserve Bank is open, the Custodian shall furnish the Trust with a detailed statement of monies held for the Fund under this Agreement and with confirmations and a summary of all transfers to or from the account of the Fund. At least monthly and from time to time, the Custodian shall furnish the Trust with a detailed statement of the Securities held for the Fund under this Agreement. Where Securities are transferred to the account of the Fund without physical delivery, the Custodian shall also identify as belonging to the Fund a quantity of Securities in a fungible bulk of Securities registered in the name of the Custodian (or its nominee) or shown on the Custodian's account on the books of the Book-Entry System or the Depository. With respect to information provided by this section, it shall not be necessary for the Custodian to provide notice as described by Article XI Section F. Notices to Trust; it shall be sufficient to communicate by such means as shall be mutually agreeable to the Trust and the Custodian.

  • Director Notification Information If you are a director of a Singapore Subsidiary, you may need to notify the Singapore Subsidiary in writing within two business days of your receiving an interest (e.g., Performance Units) in the Company or any Subsidiary or within two business days of you becoming a director if such an interest exists at the time. This notification requirement also applies to an associate director of the Singapore Subsidiary and to a shadow director of the Singapore Subsidiary (i.e., an individual who is not on the board of directors of the Singapore Subsidiary but who has sufficient control so that the board of directors of the Singapore Subsidiary acts in accordance with the “directions and instructions” of the individual). US/INTERNATIONAL EMPLOYEE (EXHIBIT B) SOUTH AFRICA KBR, INC. 2006 STOCK AND INCENTIVE PLAN

  • Property Information (A) To the knowledge of Borrower, the Collateral Properties include sufficient on-site parking to comply with Applicable Law; (B) the Collateral Properties currently abut completed and dedicated public thoroughfares or otherwise benefit from recorded and insurable easements sufficient to provide access (both ingress and egress) to and from the Collateral Properties and such dedicated public thoroughfares; and (C) to the knowledge of Borrower, no archaeological ruins, discoveries or specimens, or cemeteries exist on any Collateral Property.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Access, Information and Confidentiality (i) From the Signing Date until the date on which all of the Preferred Shares have been redeemed in whole, the Company will permit, and shall cause each of the Company’s Subsidiaries to permit, Treasury, the Oversight Officials and their respective agents, consultants, contractors and advisors to (x) examine any books, papers, records, Tax returns (including all schedules attached thereto), data and other information; (y) make copies thereof; and (z) discuss the affairs, finances and accounts of the Company and the Company Subsidiaries with the personnel of the Company and the Company Subsidiaries, all upon reasonable notice; provided, that:

  • Option Information (a) Date of Option: September 12, 2008

Time is Money Join Law Insider Premium to draft better contracts faster.