Global Information Security Requirements Sample Clauses

Global Information Security Requirements. Supplier will adhere to the following PepsiCo, Inc. Global Information Security Policy: 1) Notification of security breaches - Supplier will inform PepsiCo in a timely manner regarding any breaches that may impact PepsiCo or the integrity of PepsiCo’s data. 2) Right to perform assessment - by request or upon significant changes to the relationship, Supplier will accommodate PepsiCo’s information security assessments by providing information/documentation on related policies and practices. 3) Adherence to security practices - Supplier and its sub-contractors will adhere to industry acceptable practices regarding security policies/ guidelines/ standards (including physical security, onboarding and off-boarding resources, etc.).
AutoNDA by SimpleDocs
Global Information Security Requirements. Supplier will adhere to the following Global Information Security Policy: 1) Notification of security breaches - Supplier will inform Tropicana in a timely manner regarding any breaches that may impact Tropicana or the integrity of Tropicana’s data.

Related to Global Information Security Requirements

  • Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.

  • Data Security Requirements Without limiting Contractor’s obligation of confidentiality as further described in this Contract, Contractor must establish, maintain, and enforce a data privacy program and an information and cyber security program, including safety, physical, and technical security and resiliency policies and procedures, that comply with the requirements set forth in this Contract and, to the extent such programs are consistent with and not less protective than the requirements set forth in this Contract and are at least equal to applicable best industry practices and standards (NIST 800-53).

  • Security Requirements 7.1 The Authority will review the Contractor’s Security Plan when submitted by the Contractor in accordance with the Schedule (Security Requirements and Plan) and at least annually thereafter.

  • Information Regarding Collateral (a) Level 3 and the Borrower will furnish to the Collateral Agent prompt written notice of any change (i) in any Loan Party’s corporate name or in any trade name used to identify it in the conduct of its business or in the ownership of its properties, (ii) in any Loan Party’s identity or corporate structure or (iii) in any Loan Party’s Federal Taxpayer Identification Number. Each of Level 3 and the Borrower agrees not to effect or permit any change referred to in the preceding sentence unless all filings (or arrangements therefor satisfactory to the Collateral Agent) have been made under the Uniform Commercial Code or otherwise that are required in order for the Collateral Agent to continue at all times following such change to have a valid, legal and perfected security interest in all the Collateral. Each of Level 3 and the Borrower also agrees promptly to notify the Collateral Agent if any material portion of the Collateral is damaged or destroyed. (b) Each year, at the time of delivery of the certificate pursuant to paragraph (c) of Section 5.01, Level 3 shall deliver to the Collateral Agent certificates of an authorized officer of Level 3 (i) setting forth the information required pursuant to (A) the Annual Perfection Certificate and (B) until such time as the Collateral Permit Condition is satisfied with respect to Level 3 LLC, the Annual Loan Proceeds Note Perfection Certificate, or confirming that there has been no change in such information since the dates of the Effective Date Perfection Certificate or the Effective Date Loan Proceeds Note Perfection Certificate, as the case may be, or the date of the most recent certificates delivered pursuant to this Section and (ii) certifying that all Uniform Commercial Code financing statements (excluding fixture filings) or other appropriate filings, recordings or registrations, including all refilings, rerecordings and reregistrations, containing a description of the Collateral required to be set forth therein have been filed of record in each United States governmental, municipal or other appropriate office in each jurisdiction identified pursuant to clause (i) above to the extent necessary to perfect and continue the perfection of the security interests under the applicable Security Documents for a period of not less than 18 months after the date of such certificate (except as noted therein with respect to any continuation statements to be filed within such period).

  • PERSONAL INFORMATION PRIVACY AND SECURITY CONTRACT 11 Any reference to statutory, regulatory, or contractual language herein shall be to such language as in 12 effect or as amended. 13 A. DEFINITIONS

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Personal Information security breach Supplier/Service Provider’s Obligations a) The Supplier/Service Provider shall notify the Information Officer of Transnet, in writing as soon as possible after it becomes aware of or suspects any loss, unauthorised access or unlawful use of any personal data and shall, at its own cost, take all necessary remedial steps to mitigate the extent of the loss or compromise of personal data and to restore the integrity of the affected Goods/Services as quickly as is possible. The Supplier/Service Provider shall also be required to provide Transnet with details of the persons affected by the compromise and the nature and extent of the compromise, including details of the identity of the unauthorised person who may have accessed or acquired the personal data. b) The Supplier/Service Provider shall provide on-going updates on its progress in resolving the compromise at reasonable intervals until such time as the compromise is resolved. c) Where required, the Supplier/Service Provider may be required to notify the South African Police Service; and/or the State Security Agency and where applicable, the relevant regulator and/or the affected persons of the security breach. Any such notification shall always include sufficient information to allow the persons to take protective measures against the potential consequences of the compromise. d) The Supplier/Service Provider undertakes to co‑operate in any investigation relating to security which is carried out by or on behalf of Transnet including providing any information or material in its possession or control and implementing new security measures.

  • Access to Financial Information Buyer’s representatives shall have access to, and Seller and its Affiliates shall cooperate with Buyer and furnish upon request, all financial and other information relating to the Hotel’s operations to the extent necessary to enable Buyer’s representatives to prepare audited financial statements in conformity with Regulation S-X of the Securities and Exchange Commission (the “SEC”) and other applicable rules and regulations of the SEC and to enable them to prepare a registration statement, report or disclosure statement for filing with the SEC on behalf of Buyer or its Affiliates, whether before or after Closing and regardless of whether such information is included in the Records to be transferred to Buyer hereunder. Seller shall also provide to Buyer’s representative a signed representation letter in form and substance reasonably acceptable to Seller sufficient to enable an independent public accountant to render an opinion on the financial statements related to the Hotel. Buyer will reimburse Seller for costs reasonably incurred by Seller to comply with the requirements of the preceding sentence to the extent that Seller is required to incur costs not in the ordinary course of business for third parties to provide such representation letters. The provisions of this Section shall survive Closing or termination of this Contract.

  • Collateral Information Debtor shall provide all information, in form and substance satisfactory to Secured Party, that Secured Party shall from time to time request to (i) identify the nature, extent, value, age and location of any of the Collateral, or (ii) identify any account debtor or other party obligated with respect to any chattel paper, general intangible, instrument, investment property, document or deposit account included in the Collateral.

  • Financial Information, etc The Borrower will furnish, or will cause to be furnished, to the Administrative Agent and each Lender copies of the following financial statements, reports and information: (a) promptly when available and in any event within 90 days after the close of each Fiscal Year (i) a balance sheet at the close of such Fiscal Year, and statements of operations, of shareholders' equity and of cash flows for such Fiscal Year, of the Borrower and its Consolidated Subsidiaries certified without Impermissible Qualification by independent public accountants of recognized standing selected by the Borrower and reasonably acceptable to the Required Lenders, (ii) a Compliance Certificate calculated as of the close of such Fiscal Year, (iii) a projected financial statement of the Borrower and its Consolidated Subsidiaries for the following Fiscal Year, and (iv) the report filed by the Borrower with the SEC on Form 10-K for such Fiscal Year; (b) promptly when available and in any event within 45 days after the close of each of the first three Fiscal Quarters of each Fiscal Year (i) a balance sheet at the close of such Fiscal Quarter and statements of operations, of income and of cash flows for the period commencing at the close of the previous Fiscal Year and ending with the close of such Fiscal Quarter, of the Borrower and its Consolidated Subsidiaries certified by the chief accounting or financial Authorized Officer of the Borrower, (ii) a Compliance Certificate calculated as of the close of such Fiscal Quarter, and (iii) the report filed by the Borrower with the SEC on Form 10-Q for each such Fiscal Quarter; (c) promptly upon receipt thereof and upon request of the Administrative Agent or any Lender, copies of all management letters submitted to the Borrower by independent public accountants in connection with each annual or interim audit made by such accountants of the books of the Borrower or any Subsidiary; (d) promptly upon the incorporation or acquisition thereof, information regarding the creation or acquisition of any new Subsidiary; (e) promptly when available and in any event within ten days of publication, all material filings with the SEC; (f) within 45 days after the close of each Fiscal Quarter, an Applicable Margin Determination Ratio Certificate; and (g) such other information with respect to the financial condition, business, property, assets, revenues and operations of the Borrower and Subsidiaries as the Administrative Agent or any Lender may from time to time reasonably request.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!