Establishment of a Comprehensive Written Information Security Program Sample Clauses

Establishment of a Comprehensive Written Information Security Program. AST Fund Solutions agrees that it has established and will maintain and comply with written policies and procedures which are reasonably designed to comply with Privacy Laws concerning the protection and safeguarding of PI. Without limiting any requirements under Privacy Laws, such policies and procedures shall address: (i) administrative, technical, and physical safeguards for the protection of the Client records and data that contain PI; (ii) detection of any unauthorized access to or use of PI for unauthorized purposes; and (iii) the proper destruction of such materials so that the information contained therein cannot be practicably read or reconstructed. In order to aid the Client with its compliance with applicable Privacy Laws, AST Fund Solutions agrees to: (i) upon written request, provide certifications of compliance with Privacy Laws, including without limitation, certification that AST Fund Solutions maintains, monitors and complies with a written information security program which is reasonably designed to comply with applicable Privacy Laws; (ii) allow the Client Affiliates, at their expense, the right to audit AST Fund Solutions’ compliance; and (iii) cooperate with the Client’ reasonable requests for information concerning AST Fund Solutions’ policies and procedures.
AutoNDA by SimpleDocs
Establishment of a Comprehensive Written Information Security Program. AST Fund Solutions agrees that it has established and will maintain and comply with written policies and procedures which are reasonably designed to comply with Privacy Laws concerning the protection and safeguarding of PI. Without limiting any requirements under Privacy Laws, such policies and procedures shall address: (i) administrative, technical, and physical safeguards for the protection of the Client records and data that contain PI; (ii) detection of any unauthorized access to or use of PI for unauthorized purposes; and (iii) the proper destruction of such materials so that the information contained therein cannot be practicably read or reconstructed. AST Funds Solutions, LLC • 00 Xxxx Xxxxxx, 00xx. Floor, New York, NY 10005 • Tel: 000.000.0000 • xxx.xxxxxxxxxxxxxxxx.xxx In order to aid the Client with its compliance with applicable Privacy Laws, AST Fund Solutions agrees to: (i) upon written request, provide certifications of compliance with Privacy Laws, including without limitation, certification that AST Fund Solutions maintains, monitors and complies with a written information security program which is reasonably designed to comply with applicable Privacy Laws; (ii) allow the Client Affiliates, at their expense, the right to audit AST Fund Solutions’ compliance; and (iii) cooperate with the Client’ reasonable requests for information concerning AST Fund Solutions’ policies and procedures.
Establishment of a Comprehensive Written Information Security Program. AST Fund Solutions agrees that it has established and will maintain and comply with written policies and procedures which are reasonably designed to comply with Privacy Laws concerning the protection and safeguarding of PI. Without limiting any requirements under Privacy Laws, such policies and procedures shall address: (i) administrative, technical, and physical safeguards for the protection of the Client records and data that contain PI; (ii) detection of any unauthorized access to or use of PI for unauthorized purposes; and AST Funds Solutions, LLC ● 40 Xxxx Xxxxxx, 00xx. Floor, New York, NY 10005 ● Tel: 200.000.0000 ● wxx.xxxxxxxxxxxxxxxx.xxx
Establishment of a Comprehensive Written Information Security Program. AST Fund Solutions agrees that it has established and will maintain and comply with written policies and procedures which are reasonably designed to comply with Privacy Laws concerning the protection and safeguarding of PI. Without limiting any requirements under Privacy Laws, such policies and procedures shall address: (i) administrative, technical, and physical safeguards for the protection of the Client records and data that contain PI; (ii) detection of any unauthorized access to or use of PI for unauthorized purposes; and
Establishment of a Comprehensive Written Information Security Program. AST Fund Solutions agrees that it has established and will maintain and comply with written policies and procedures which are reasonably designed to comply with Privacy Laws concerning the protection and safeguarding of PI. Without limiting any requirements under Privacy Laws, such policies and procedures shall address: (i) administrative, technical, and physical safeguards for the protection of the Client records and data that contain PI; (ii) detection of any unauthorized access to or use of PI for unauthorized purposes; and (iii) the proper destruction of such materials so that the information contained therein cannot be practicably read or reconstructed. In order to aid the Client with its compliance with applicable Privacy Laws, AST Fund Solutions agrees to: (i) upon written request, provide certifications of compliance with Privacy Laws, including without limitation, certification that AST Fund Solutions maintains, monitors and complies with a written information security program which is reasonably designed to comply with applicable Privacy Laws; and (ii) cooperate with the Client’s reasonable requests for information concerning AST Fund Solutions’ policies and procedures. AST Funds Solutions, LLC • 00 Xxxx Xxxxxx, 00xx. Floor, New York, NY 10005 • Tel: 000.000.0000 • xxx.xxxxxxxxxxxxxxxx.xxx
Establishment of a Comprehensive Written Information Security Program. Vendor agrees that it has established and will maintain and comply with written policies and procedures in compliance with Privacy Laws concerning the protection and safeguarding of PI. Without limiting any requirements under Privacy Laws, such policies and procedures shall address: (i) administrative, technical, and physical safeguards for the protection of MFS records and data that contain PI; (ii) detection of any unauthorized access to or use of PI for unauthorized purposes; and (iii) (subject to any records retention requirements or as otherwise directed by MFS) the proper destruction of such materials so that the information contained therein cannot be practicably read or reconstructed. In order to comply with applicable Privacy Laws, Vendor agrees to: (i) provide certifications of compliance with Privacy Laws, including without limitation, certification that Vendor maintains, monitors and complies with a written information security program compliant with applicable Privacy Laws; (ii) allow MFS Affiliates the right to audit Vendor’s compliance; and (iii) cooperate with MFS’ reasonable requests for information concerning Vendor’s policies and procedures.

Related to Establishment of a Comprehensive Written Information Security Program

  • INFORMATION SECURITY SCHEDULE All capitalized terms not defined in this Information Security Schedule (this “Security Schedule”) shall have the meanings ascribed to them in the Transfer Agency and Service Agreement by and between DST and each of the funds listed on Exhibit A thereto (each such fund, or series thereof, severally, and not jointly, the “Fund”) dated March 1, 2022 (the “Agreement”). DST and Fund hereby agree that DST shall maintain and comply with an information security policy (“Security Policy”) that satisfies the requirements set forth below; provided, that, because information security is a highly dynamic space (where laws, regulations and threats are constantly changing), DST reserves the right to make changes to its information security controls at any time and at the sole discretion of DST in a manner that it believes does not materially reduce the protection it applies to Fund Data. From time to time, DST may subcontract services performed under the Agreement (to the extent provided for under the Agreement) or provide access to Fund Data or its network to a subcontractor or other third party; provided, that, such subcontractor or third party implements and maintains security measures DST believes are at least as stringent as those described in this Security Schedule. For the purposes of this Schedule “prevailing industry practices and standards” refers to standards among financial institutions, including mutual funds, and third parties providing financial services to financial institutions.

Time is Money Join Law Insider Premium to draft better contracts faster.