Contractor Security Clearance Customers may designate certain duties and/or positions as positions of “special trust” because they involve special trust responsibilities, are located in sensitive locations, or have key capabilities with access to sensitive or confidential information. The designation of a special trust position or duties is at the sole discretion of the Customer. Contractor or Contractor’s employees and Staff who, in the performance of this Contract, will be assigned to work in positions determined by the Customer to be positions of special trust, may be required to submit to background screening and be approved by the Customer to work on this Contract.
Delivery and Control of Security Collateral (a) Any certificates or instruments representing or evidencing Security Collateral shall be delivered to and held by or on behalf of the Collateral Trustee pursuant hereto and shall be in suitable form for transfer by delivery, or shall be accompanied by duly executed instruments of transfer or assignment in blank, all in form and substance satisfactory to the Collateral Trustee. The Collateral Trustee shall have the right, at any time in its discretion and without notice to any Pledgor, to transfer to or to register in the name of the Collateral Trustee or any of its nominees any or all of the certificates and instruments representing or evidencing the Security Collateral, if any, subject only to the revocable rights specified in Section 9(a). In addition, the Collateral Trustee shall have the right at any time to exchange certificates or instruments representing or evidencing Security Collateral, if any, for certificates or instruments of smaller or larger denominations. (b) At such time as any Pledgor has or acquires any Security Collateral in which such Pledgor has any right, title or interest and that constitutes an “uncertificated security” (within the meaning of Article 8 of the UCC), such Pledgor will use its commercially reasonable efforts to cause the issuer thereof to agree in an authenticated record substantially in the form of Exhibit B with such Pledgor and the Collateral Trustee that such issuer will comply with instructions with respect to such security originated by the Collateral Trustee without further consent of such Pledgor, such authenticated record to be in form and substance satisfactory to such issuer and the Collateral Trustee. (c) With respect to any Pledged Equity in which any Pledgor has any right, title or interest and that is not a security (within the meanings of Article 8 and Article 9 of the UCC), such Pledgor will notify each such issuer of Pledged Equity that such Pledged Equity is subject to the security interest granted hereunder. (d) With respect to any Pledged Debt in which any Pledgor has any right, title or interest, the Pledgor will notify each such issuer of Pledged Debt that such Pledged Debt is subject to the security interest granted hereunder. (e) If, at any time, an issuer converts any Pledged Equity into a “security” within the meaning of Articles 8 and 9 of the UCC, the relevant Pledgor will either (i) use its commercially reasonable efforts to cause the issuer of such Pledged Equity to issue certificates or instruments evidencing or representing the Pledged Equity and deliver the originals of such certificates or instruments promptly to the Collateral Trustee (or as directed by the Collateral Trustee), and, if it or any Person other than the relevant Pledgor, receives any such certificates or instruments, shall promptly deliver or cause to be delivered to the Collateral Trustee, the originals of such certificates or instruments or (ii) if the security is an uncertificated security (within the meaning of Article 8 of the UCC), use its commercially reasonable efforts to cause the issuer of such Pledged Equity to enter into an Uncertificated Securities Control Agreement pursuant to clause (b) above. (f) At such time as any Pledgor has or acquires any Security Collateral in which such Pledgor has any right, title or interest and that is not a security (within the meaning of Article 8 of the UCC), such Pledgor agrees that the Collateral Trustee may file a financing statement in the relevant jurisdiction. (g) No Pledgor shall take or omit to take any action which would or could reasonably be expected to have the result of materially adversely affecting or impairing the Liens in favor of the Collateral Trustee and the holders of Parity Lien Obligations with respect to the Collateral.
Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.
Data Security and Privacy Plan As more fully described herein, throughout the term of the Subscription Agreement, Vendor will have a Data Security and Privacy Plan in place to protect the confidentiality, privacy and security of the Protected Data it receives from the District. Vendor’s Plan for protecting the District’s Protected Data includes, but is not limited to, its agreement to comply with the terms of the District’s Bill of Rights for Data Security and Privacy, a copy of which is set forth below and has been signed by the Vendor. Additional components of Vendor’s Data Security and Privacy Plan for protection of the District’s Protected Data throughout the term of the Subscription Agreement are as follows: (a) Vendor will implement all state, federal, and local data security and privacy requirements including those contained within the Subscription Agreement and this Data Sharing and Confidentiality Agreement, consistent with the District’s data security and privacy policy. (b) Vendor will have specific administrative, operational and technical safeguards and practices in place to protect Protected Data that it receives from the District under the Subscription Agreement. (c) Vendor will comply with all obligations contained within the section set forth in this Exhibit below entitled “Supplemental Information about a Subscription Agreement between [Xxxxx-Fultonville Central School District] and [Vendor Name].” Vendor’s obligations described within this section include, but are not limited to: (i) its obligation to require subcontractors or other authorized persons or entities to whom it may disclose Protected Data (if any) to execute written agreements acknowledging that the data protection obligations imposed on Vendor by state and federal law and the Subscription Agreement shall apply to the subcontractor, and (ii) its obligation to follow certain procedures for the return, transition, deletion and/or destruction of Protected Data upon termination, expiration or assignment (to the extent authorized) of the Subscription Agreement. (d) Vendor has provided or will provide training on the federal and state laws governing confidentiality of Protected Data for any of its officers or employees (or officers or employees of any of its subcontractors or assignees) who will have access to Protected Data, prior to their receiving access. (e) Vendor will manage data security and privacy incidents that implicate Protected Data and will develop and implement plans to identify breaches and unauthorized disclosures. Vendor will provide prompt notification to the District of any breaches or unauthorized disclosures of Protected Data in accordance with the provisions of Section 5 of this Data Sharing and Confidentiality Agreement.
Data Security and Privacy (a) Each Group Member is, and at all times, has been, in compliance in all material respects with (i) all applicable Data Protection Laws, including, to the extent applicable, but not limited to the GDPR and those relating to cross-border transfers; (ii) all applicable contractual obligations of each Loan Party and its Subsidiaries concerning data privacy and security relating to Personal Data in the possession or control of any Group Member or maintained by third parties on behalf of such Group Member and having access to such information under contracts (or portions thereof) to which a Group Member is a party; and (iii) all applicable data transfer agreements and data processing agreements, including the EU standard contractual clauses, to which a Group Member is a party (collectively, “Privacy Agreements”): (b) Each Group Member is, and has been, in compliance in all material respects with all applicable prior and current written internal and public-facing privacy policies and notices of the Group Members regarding the collection, retention, use, processing, disclosure and distribution of Personal Data by the Group Members or their respective agents (collectively, the “Privacy Policies”), and the Privacy Policies have been maintained to be consistent in all material respects with the actual practices of each Group Member. The Privacy Policies contemplate the Group Members’ current uses of the Personal Data, and to the extent required under applicable Data Protection Laws, each Group Member has sought and obtained the appropriate consent from the applicable data subject for such uses. The Privacy Policies have made all material disclosures to users, customers, employees, or other individuals required by Data Protection Laws. (c) Each Group Member has implemented and maintains a commercially reasonable security program (“Security Program”) that (i) complies in all material respects with all applicable Data Protection Laws, applicable Privacy Policies, and applicable Privacy Agreements, and (ii) includes commercially reasonable administrative, technical, organization, and physical security procedures and measures designed to preserve the security and integrity of all Personal Data and any other sensitive or confidential information or data related to each Group Member (collectively, “Company Sensitive Information”) in such Group Member’s possession or control and to protect such Company Sensitive Information against unauthorized or unlawful processing, access, acquisition, use, theft, interruption, modification, disclosure, loss, destruction or damage. (d) Except as disclosed on Schedule 4.23(d), there has been (i) no actual, suspected or alleged (in writing) incidents of unauthorized access, use, intrusion, disclosure or breach of the security of any information technology systems owned or controlled by a Group Member or any of their contractors and used by such contractors on behalf of a Group Member, and (ii) no actual, suspected or alleged (in writing) incidents of unauthorized acquisition, destruction, damage, disclosure, loss, corruption, alteration, or use of any Company Sensitive Information, in each case that could reasonably be expected to cause a Material Adverse Effect. (e) Each Group Member has a valid and legal right (whether contractually, by applicable law or otherwise) to access or use all Personal Data that is accessed and used by or on behalf of a Group Member in connection with the sale, use and/or operation of their products, services and businesses. (f) Except as would not reasonably be expected to have a Material Adverse Effect, there is no pending or to the knowledge of any Loan Party, threatened in writing, complaints, claims, demands, inquiries, proceedings, or other notices, including any notices of any investigation or other legal proceedings, regarding a Group Member, initiated by (i) any Governmental Authority, including the United States Federal Trade Commission, a state attorney general, data protection authority or similar state official, or a supervisory authority; (ii) any counterparty to, or subject of, a Privacy Agreement; or (iii) any self-regulatory authority or entity, alleging that any activity of a Group Member: (1) is in violation of any applicable Data Protection Laws, (2) is in violation of any Privacy Agreements, (3) is in violation of any Privacy Policies or (4) is otherwise in violation of any person’s privacy, personal or confidentiality rights.
Financial Security Arrangements At least 20 Business Days prior to the commencement of the design, procurement, installation, or construction of a discrete portion of the Connecting Transmission Owner’s Interconnection Facilities and Upgrades, the Interconnection Customer shall provide the Connecting Transmission Owner, at the Interconnection Customer’s option, a guarantee, a surety bond, letter of credit or other form of security that is reasonably acceptable to the Connecting Transmission Owner and is consistent with the Uniform Commercial Code of the jurisdiction where the Point of Interconnection is located. Such security for payment shall be in an amount sufficient to cover the costs for constructing, designing, procuring, and installing the applicable portion of the Connecting Transmission Owner’s Interconnection Facilities and Upgrades and shall be reduced on a dollar-for-dollar basis for payments made to the Connecting Transmission Owner under this Agreement during its term. The Connecting Transmission Owner may draw on any such security to the extent that the Interconnection Customer fails to make any payments due under this Agreement. In addition: 6.3.1 The guarantee must be made by an entity that meets the creditworthiness requirements of the Connecting Transmission Owner, and contain terms and conditions that guarantee payment of any amount that may be due from the Interconnection Customer, up to an agreed-to maximum amount. 6.3.2 The letter of credit or surety bond must be issued by a financial institution or insurer reasonably acceptable to the Connecting Transmission Owner and must specify a reasonable expiration date. 6.3.3 Notwithstanding the above, Security posted for System Upgrade Facilities for a Small Generating Facility required to enter the Class Year process, or cash or Security provided for System Deliverability Upgrades, shall meet the requirements for Security contained in Attachment S to the ISO OATT.
Personnel Security 6.1 Staff recruitment in accordance with government requirements for pre- employment checks; 6.2 Staff training and awareness of Departmental security and any specific contract requirements.
Collateral Security (a) The Obligations shall be secured by (a) a perfected first-priority security interest (subject to Permitted Liens entitled to priority under Applicable Law) in all Collateral, whether now owned or hereafter acquired, pursuant to the terms of the Security Agreement to which each Borrower is a party to the extent perfected by the filing of UCC financing statements; (b) a pledge of 100% of the capital stock or other Equity Interests of such Borrowers (other than the Parent) and of the Non-Borrower Subsidiaries (other than the Foreign Subsidiaries) to the Administrative Agent on behalf of the Secured Parties pursuant to the Pledge Agreement; and (c) a pledge of the capital stock or other Equity Interests of each Foreign Subsidiary (provided that not more than 65% of the total voting power of all outstanding capital stock or other Equity Interest of any such first-tier Foreign Subsidiary of a Borrower shall be required to be so pledged and no Equity Interests of any non-first-tier Foreign Subsidiary shall be provided to be so pledged); provided that the Borrowers hereby agree, upon the request of the Administrative Agent and the Required Lenders, to deliver, as promptly as practicable, but in any event within ninety (90) days after request therefor, or such other later time, if any, to which the Administrative Agent may agree, (i) certificates of titles for all or substantially all vehicles, trucks, trailers, tractors, automobiles and any other equipment covered by certificates of title owned by a Borrower (collectively, “Motor Vehicles”) with the Administrative Agent listed as lienholder therein (subject to a limited power of attorney in favor of the Parent to dispose of titled equipment) and, if required by the Administrative Agent, the Borrowers shall retain Corporation Service Company (or other similar company satisfactory to the Administrative Agent) pursuant to agreements reasonably satisfactory to the Administrative Agent pursuant to which Corporation Service Company (or such other company) will agree to act as agent for the Secured Parties with respect to the perfection of security interests in the Motor Vehicles; and (ii) mortgages with respect to Real Property and to take such other steps and make such other deliveries as may be reasonably requested by the Administrative Agent (including, without limitation, the delivery of legal opinions, Consulting Engineer’s reports, surveys, title insurance, environmental assessment reports, flood hazard certifications, evidence of flood insurance, if required, and a certification of the name and address of each real estate recording office where a mortgage on the real estate on which any Collateral consisting of fixtures may be located would be recorded) so as to provide the Administrative Agent, for the benefit of the Secured Parties, a perfected first-priority security interest in such assets, provided that to the extent that any lease of (or operating/management agreement with respect to) Real Property prohibits assignment of such lease (or operating/management agreement) without the consent of the lessor or another party thereunder, the Borrowers shall not be required to grant a mortgage on the leasehold interest under such lease, but in such event, the Borrowers agree to diligently and in good faith use its reasonable best efforts to obtain the consent (which consent shall be in form and substance reasonably satisfactory to the Administrative Agent) of the applicable lessor or other party to such leasehold mortgage (and, upon the receipt of such consent, the Borrowers shall promptly grant such leasehold mortgage and comply with the other provisions of this Section 10.15 with respect thereto). (b) In the event any Borrower disposes of any assets or Equity Interests as permitted under, and in compliance with, Section 7.04(b) (including any amendment thereof or consent thereunder), or in the event that the Parent designates any Borrower as an Excluded Subsidiary or a Non-Borrower Subsidiary hereunder and no Default would result from such designation, and so long as such Borrower (or the Parent, in the case of designating a Borrower as an Excluded Subsidiary hereunder) shall have provided the Administrative Agent with such certifications or documents, if any, as the Administrative Agent shall reasonably request, the Administrative Agent will, at the Borrowers’ sole cost and expense, and without recourse to or warranty by the Administrative Agent, execute and deliver all such forms, releases, discharges, assignments, termination statements, and similar documents as the Borrowers may reasonably request in order to release such Person from its Obligations under the Loan Documents and to release the Liens granted to the Administrative Agent with respect to such assets, Equity Interests or Borrower, as applicable.
Perfection of Uncertificated Securities Collateral Each Pledgor represents and warrants that the Collateral Agent has a perfected First Priority security interest in all uncertificated Pledged Securities (other than uncertificated Pledged Securities in which a security interest cannot be perfected by taking all applicable actions under the UCC and such other actions (including, without limitation, the delivery or filing of financing, statements, agreements instruments or other documents) as may have been reasonably requested by the Collateral Agent in order to perfect such security interest under the local laws of the jurisdiction of the issuer of such Pledged Securities) pledged by it hereunder that are in existence on the date hereof. Each Pledgor hereby agrees that if any of the Pledged Securities are at any time not evidenced by certificates of ownership, then each applicable Pledgor shall, to the extent permitted by applicable law, (i) cause (or in the case of Pledged Securities issued by an issuer that is not a Wholly Owned Subsidiary, use commercially reasonable efforts to cause) the issuer to execute and deliver to the Collateral Agent an acknowledgment of the pledge of such Pledged Securities substantially in the form of Exhibit 1 hereto or such other form that is reasonably satisfactory to the Collateral Agent, (ii) if necessary or desirable to perfect a security interest in such Pledged Securities, cause (or in the case of Pledged Securities issued by an issuer that is not a Wholly Owned Subsidiary, use commercially reasonable efforts to cause) the issuer of such uncertificated Pledged Securities to enter into a control agreement with the Collateral Agent and such Pledgor reasonably satisfactory to the Collateral Agent pursuant to which such issuer shall agree to comply with instructions originated by the Collateral Agent without further consent by such Pledgor, and cause (or in the case of Pledged Securities issued by an issuer that is not a Wholly Owned Subsidiary, use commercially reasonable efforts to cause) such pledge to be recorded on the equityholder register or the books of the issuer, execute any customary pledge forms or other documents necessary or appropriate to complete the pledge and give the Collateral Agent the right to transfer such Pledged Securities under the terms hereof, (iii) upon request by the Collateral Agent, provide to the Collateral Agent an opinion of counsel, in form and substance reasonably satisfactory to the Collateral Agent, confirming such pledge and perfection thereof, and (iv) after the occurrence and during the continuance of any Event of Default, upon request by the Collateral Agent, (A) cause (or in the case of Pledged Securities issued by an issuer that is not a Wholly Owned Subsidiary, use commercially reasonable efforts to cause) the Organizational Documents of each such issuer that is a Subsidiary of a Pledgor to be amended to provide that such Pledged Securities shall be treated as “securities” for purposes of the UCC and (B) cause (or in the case of Pledged Securities issued by an issuer that is not a Wholly Owned Subsidiary, use commercially reasonable efforts to cause) such Pledged Securities to become certificated and delivered to the Collateral Agent in accordance with the provisions of Section 3.1.
Data Security Requirements Without limiting Contractor’s obligation of confidentiality as further described in this Contract, Contractor must establish, maintain, and enforce a data privacy program and an information and cyber security program, including safety, physical, and technical security and resiliency policies and procedures, that comply with the requirements set forth in this Contract and, to the extent such programs are consistent with and not less protective than the requirements set forth in this Contract and are at least equal to applicable best industry practices and standards (NIST 800-53).