Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.
Personal Information security breach Supplier/Service Provider’s Obligations a) The Supplier/Service Provider shall notify the Information Officer of Transnet, in writing as soon as possible after it becomes aware of or suspects any loss, unauthorised access or unlawful use of any personal data and shall, at its own cost, take all necessary remedial steps to mitigate the extent of the loss or compromise of personal data and to restore the integrity of the affected Goods/Services as quickly as is possible. The Supplier/Service Provider shall also be required to provide Transnet with details of the persons affected by the compromise and the nature and extent of the compromise, including details of the identity of the unauthorised person who may have accessed or acquired the personal data. b) The Supplier/Service Provider shall provide on-going updates on its progress in resolving the compromise at reasonable intervals until such time as the compromise is resolved. c) Where required, the Supplier/Service Provider may be required to notify the South African Police Service; and/or the State Security Agency and where applicable, the relevant regulator and/or the affected persons of the security breach. Any such notification shall always include sufficient information to allow the persons to take protective measures against the potential consequences of the compromise. d) The Supplier/Service Provider undertakes to co‑operate in any investigation relating to security which is carried out by or on behalf of Transnet including providing any information or material in its possession or control and implementing new security measures.
Holder Information Each Holder agrees, if requested in writing, to represent to the Company the total number of Registrable Securities held by such Holder in order for the Company to make determinations hereunder.
Rule 144 Information The Company covenants that it will use its reasonable best efforts to timely file all reports and other documents required to be filed by it under the Securities Act and the Exchange Act and the rules and regulations promulgated by the SEC thereunder (or, if the Company is not required to file such reports, it will, upon the request of any Warrantholder, make publicly available such information as necessary to permit sales pursuant to Rule 144 under the Securities Act), and it will use reasonable best efforts to take such further action as any Warrantholder may reasonably request, in each case to the extent required from time to time to enable such holder to, if permitted by the terms of this Warrant and the Purchase Agreement, sell this Warrant without registration under the Securities Act within the limitation of the exemptions provided by (A) Rule 144 under the Securities Act, as such rule may be amended from time to time, or (B) any successor rule or regulation hereafter adopted by the SEC. Upon the written request of any Warrantholder, the Company will deliver to such Warrantholder a written statement that it has complied with such requirements.
KYC Information (i) Upon the reasonable request of the Lender made at least 1 day prior to the Closing Date, the Borrower shall have provided to the Lender the documentation and other information so requested in connection with applicable “know your customer” and anti-money-laundering rules and regulations, including the PATRIOT Act, in each case at least five days prior to the Closing Date. (ii) [reserved].
- CLEC INFORMATION 3.1 Except as otherwise required by law, CenturyLink will not provide or establish Interconnection, Unbundled Network Elements, ancillary services and/or resale of Telecommunications Services in accordance with the terms and conditions of this Agreement prior to CLEC's execution of this Agreement. The Parties shall complete CenturyLink's "New Customer Questionnaire," as it applies to CLEC's obtaining of Interconnection, Unbundled Network Elements, ancillary services, and/or resale of Telecommunications Services hereunder. 3.2 Prior to placing any orders for services under this Agreement, the Parties will jointly complete the following sections of CenturyLink's "New Customer Questionnaire:" General Information Billing and Collection (Section 1) Credit Information Billing Information Summary Billing OSS and Network Outage Notification Contact Information System Administration Contact Information Ordering Information for LIS Trunks, Collocation, and Associated Products (if CLEC plans to order these services) Design Layout Request – LIS Trunking and Unbundled Loop (if CLEC plans to order these services) 3.2.1 The remainder of this questionnaire must be completed within two (2) weeks of completing the initial portion of the questionnaire. This questionnaire will be used to: Determine geographical requirements; Identify CLEC identification codes; Determine CenturyLink system requirements to support CLEC's specific activity; Collect credit information; Obtain Billing information; Create summary bills; Establish input and output requirements; Create and distribute CenturyLink and CLEC contact lists; and Identify CLEC hours and holidays. 3.2.2 CLECs that have previously completed a Questionnaire need not fill out a New Customer Questionnaire; however, CLEC will update its New Customer Questionnaire with any changes in the required information that have occurred and communicate those changes to CenturyLink. Before placing an order for a new product, CLEC will need to complete the relevant New Product Questionnaire and amend this Agreement.
Rule 144A Information For so long as any of the Investor Certificates of any Series or any Class are "restricted securities" within the meaning of Rule 144(a)(3) under the Securities Act, each of the Transferor, the Servicer, the Trustee and the Enhancement Provider for such Series agree to cooperate with each other to provide to any Investor Certificateholders of such Series or Class and to any prospective purchaser of Certificates designated by such an Investor Certificateholder upon the request of such Investor Certificateholder or prospective purchaser, any information required to be provided to such holder or prospective purchaser to satisfy the condition set forth in Rule 144A(d)(4) under the Securities Act.
Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks. (2) The Information Security Program shall require encryption of any Personal Information in electronic format while in transit or in storage, and enhanced controls and standards for transport and disposal of physical media containing Personal Information. DTI shall, and shall require its agents, contractors and subcontractors who access or use Personal Information or Confidential Information to, regularly test key controls, systems and procedures relating to the Information Security Program ("ISP Tests"). DTI shall advise the Funds of any material issues identified in the ISP Tests potentially affecting the Information Security Program. (3) DTI shall comply with its Information Security Program.
Seller Information The Company may require each seller of Registrable Securities as to which any registration is being effected to furnish, and such seller shall furnish, to the Company such information regarding the distribution of such securities as the Company may from time to time reasonably request in writing.
FATCA Information (a) Subject to paragraph (c) below, each Party shall, within ten Business Days of a reasonable request by another Party: (i) confirm to that other Party whether it is: (A) a FATCA Exempt Party; or (B) not a FATCA Exempt Party. (ii) supply to that other Party such forms, documentation and other information relating to its status under FATCA as that other Party reasonably requests for the purposes of that other Party's compliance with FATCA; and (iii) supply to that other Party such forms, documentation and other information relating to its status as that other Party reasonably requests for the purposes of that other Party's compliance with any other law, regulation, or exchange of information regime. (b) If a Party confirms to another Party pursuant to paragraph (a)(i) above that it is a FATCA Exempt Party and it subsequently becomes aware that it is not or has ceased to be a FATCA Exempt Party, that Party shall notify that other Party reasonably promptly. (c) Paragraph (a) above shall not oblige the Security Trustee to do anything, and paragraph (a)(iii) above shall not oblige any other Party to do anything, which would or might in its reasonable opinion constitute a breach of: (i) any law or regulation; (ii) any fiduciary duty; or (iii) any duty of confidentiality. (d) If a Party fails to confirm whether or not it is a FATCA Exempt Party or to supply forms, documentation or other information requested in accordance with paragraph (a)(i) or (ii) above (including, for the avoidance of doubt, where paragraph (c) above applies), then such Party shall be treated for the purposes of the Finance Documents (and payments under them) as if it is not a FATCA Exempt Party until such time as the Party in question provides the requested confirmation, forms, documentation or other information.