File Security. All files held by a Contractor in a respective office must be in fire proof cabinets and/or the office must have a fire suppression system in place. The files must be able to be secured from the general public either by containing locking mechanisms with keys provided to only Key Persons or located in a locked room. All files must be labeled CONFIDENTIAL.
File Security. BOLC shall utilize security procedures, similar to those applicable to BOLC’ own data, to ensure that access to Business Records in the possession of BOLC is available only to NUVOLA and necessary BOLC support personnel.
File Security. (a) Planet Payment acknowledges that Acquirer is required to comply with various information security standards and other statutory, legal and regulatory requirements as well as their respective internal information security programs for information protection. If applicable, Planet Payment shall make reasonable efforts to assist Acquirer to so comply. Planet Payment shall at all times comply with the requirements of the applicable Account Security System and Acquirer acknowledges that such compliance by Planet Payment is the sole information security standard required of Planet Payment hereunder.
(b) Planet Payment shall at its sole cost engage a national, independent, certified public accountant, or other mutually agreeable firm, to perform a SAS70 Type 2 Review (Report on controls placed into operation and tests of operating effectiveness) and issue a Service Auditors Report (SAR). This review will focus on Planet Payment’s general operating and security controls and major commercial application systems used for the purposes of providing services under this Agreement. A copy of the SAR will be provided to Acquirer following its completion.
File Security. Employee files will be maintained in a secure place. The Superintendent shall provide prior notice to an employee whose personnel file is to be inspected by a member of the public other than the employee or the employee's designee or the administrator(s), and shall provide an opportunity to the employee to be present when the file is to be inspected by a member of the public. Such member of the public who inspected the record or obtained a copy of any portion of it shall acknowledge same in writing which shall be filed in the personnel file of the employee.
File Security. Client acknowledges that it is technically possible for third parties to monitor data traffic over the air via the Communication Networks. If Client desires to secure its transmissions, Client will be solely responsible for providing encryption and security for its data.
File Security. Supplier will provide reasonable protection for Customer's computer-stored files and programs from unauthorized access by third parties. Supplier shall be responsible for no less than the security procedures set forth in Supplier's security manuals or comparable documents in existence at the time of the applicable Category Agreements and their Transaction Agreements, and which are incorporated by reference herein. Customer shall have the unconditional right to make security inspections of Supplier's organization at any time without notice to Supplier. If Customer requests additional security provisions, Supplier shall not unreasonably delay or refuse to institute same.
File Security. AURUM (i) will provide reasonable security provisions to ensure that third parties do not have access to the Customer data bases, files and other information provided by Customer to AURUM for use with Premierecorp Cash Management. AURUM reserves the right to issue and change regulations and procedures from time to time.
File Security. JXX acknowledges that all data files provided by Client are the property of Client and that JHA’s use thereof or access thereto does not create in JXX any right, title or interest therein, except as provided for hereunder. JXX will implement reasonable security precautions and take appropriate actions with respect to the Client data files so as to enable JXX to satisfy its obligations under this Agreement and to prevent the loss, alteration or unauthorized access of Client data files.
File Security. VITI will provide security and back-up and recovery services as specified in Article 12 to protect TSI's data. VITI reserves the right to issue and change security regulations and procedures as needed. VITI shall not be required to reconstruct any files, data, or programs that may, for any reason, have to be re-entered into the system, unless reconstruction is required due to a negligent act or omission on the part of VITI.
File Security. Vendor will use its best efforts to provide reasonable security to protect Customer’s computer- stored files and/or programs from unauthorized access by third parties. Except as required by law, at the request or direction of Customer, or as required in the normal course of providing the Services to Customers hereunder, Vendor will not copy or endeavor to copy Customer’s computer-stored files and/or programs except as backup media for data protection purposes in accordance with Vendor’s standard security procedures. It is understood that Customer assumes full responsibility for use of any code or pass-words as may be permitted or required by the particular service involved. In the event that Vendor is serviced with a subpoena or any other order or request from a governmental body or any other entity or person for any of Customer’s computer-stored backup files and/or programs, Vendor shall, as soon as reasonably practicable, notify Customer of such subpoena, order to request and shall not, without Customer’s prior written consent, accede to such subpoena, order or request unless required to do so under applicable laws and regulations or when otherwise necessary to avoid legal penalties, notwithstanding Customer’s efforts, if any, to contest such subpoena, order or request.