Identity Theft Prevention. 15.1 In the event that the Contractor will obtain identifying information during the performance of the Services, the Contractor must take reasonable precautions to ensure that such identifying information is protected from unauthorized disclosure and is used only for the purpose of performing the Services.
Identity Theft Prevention. In an effort to combat identity theft, the University maintains a comprehensive Identity Theft Prevention Program with a goal of protecting the personal information of students, employees, affiliates and customers. In the course of performing its duties under this Agreement and through its work for or on behalf of the University, Contractor may collect, access and/or receive personal information pertaining to University students, employees, affiliates and customers that can be linked to identifiable individuals (hereinafter “Personal Information”). Such Personal Information is Confidential Information of the University. It is the University’s expectation that Contractor will assist the University in its identity theft prevention efforts under the University’s Identity Theft Prevention Program. Contractor shall collect, access, receive and/or use such Personal Information solely for the purposes of conducting its work for or on behalf of the University and otherwise in compliance with any and all applicable federal and/or state laws. Additionally, Contractor shall safeguard such information in compliance with all applicable federal and state laws, including but not limited to the Fair Credit Transactions Act of 2003 and any regulations promulgated thereunder (e.g., Red Flags Rule regulations), including implementing appropriate policies or procedures for detecting and identifying possible identity theft and similar fraudulent or potentially fraudulent activities, and notify the University of any such suspicious activities. For the purpose of notification to the University, upon identification of a potential or actual issue of identity theft, Contractor shall immediately contact:
Identity Theft Prevention. The Transfer Agent has developed and shall maintain a program of policies, procedures and controls that is reasonably designed to (i) comply with applicable federal identity theft prevention laws, rules and regulations (the “identity theft rules”) applicable to the Transfer Agent and/or the Trusts or Administrator, including but not limited to Regulation S-ID and (ii) assist in the detection, prevention and mitigation of identity theft with respect to the records and accounts of each Trust’s shareholders that are maintained by the Transfer Agent (the “identity theft program”). The Transfer Agent agrees to comply with such identity theft program during the term of this Agreement with respect to each Trust’s shareholder accounts and records that are maintained by the Transfer Agent. The Transfer Agent agrees to report any detected violations of the identity theft rules, including any incidents of attempted or suspected identity theft that are detected by the Transfer Agent, promptly (i) to the Administrator on behalf of each Trust in accordance with agreed upon procedures, and (ii) to the U.S. Department of Treasury’s Financial Crimes Enforcement Network (“FinCEN”) to the extent a suspicious activity report (“SAR”) filing is required. The Transfer Agent shall handle such SAR filing in accordance with Section 4.2 of Schedule 1.2(f) to this Agreement. The Transfer Agent shall provide to the Administrator on behalf of each Trust an annual certification with respect to its controls and such other certifications as the parties may mutually agree upon;
Identity Theft Prevention. The Transfer Agent has developed and maintains a program of policies, procedures and controls to assist each Fund in its compliance with applicable identity theft regulatory requirements, including Regulation S-ID , Title 16 of the Code of Federal Regulations (“CFR”) Part 681 (Identity Theft Rules) and giving due consideration to the Guidelines provided in Appendix A thereto. The Transfer Agent’s program and controls are reasonably designed to assist in the detection of violations of those requirements. Among other things, the program is designed to identify, detect, and respond to Red Flags, as defined in Section 681.1. The Transfer Agent agrees to promptly report any detected violations to the affected Fund in accordance with agreed upon procedures and to provide annual certification to each Fund with respect to its controls.”
Identity Theft Prevention. The Transfer Agent has developed and maintains a program of policies, procedures and controls to assist the Fund in its compliance with applicable identity theft regulatory requirements. The Transfer Agent’s program and controls are reasonably designed to assist in the detection of violations of those requirements. The Transfer Agent agrees to report any detected violations to the Fund in accordance with agreed upon procedures and to provide annual certification to the Fund with respect to its controls.”
Identity Theft Prevention. 2 CONTRACTOR shall obtain and maintain all customers’ personal, 3 payment and credit information with appropriate privacy controls in accordance 4 with Payment Card Industry Data Security Standard (PCI DSS). CONTRACTOR 5 shall maintain an identity theft prevention program as required by the Federal 6 Trade Commission’s Red Flag Rules (pursuant to the Fair and Accurate Credit
Identity Theft Prevention. 32 CONTRACTOR shall obtain and maintain all customers’ personal, 33 payment and credit information with appropriate privacy controls in accordance 34 with Payment Card Industry Data Security Standard (PCI DSS). CONTRACTOR 35 shall maintain an identity theft prevention program as required by the Federal 36 Trade Commission’s Red Flag Rules (pursuant to the Fair and Accurate Credit 37 Transactions Act of 2003 and 16 CFR §§ 681.1 and 681.2). Prior to Go-Live, 1 CONTRACTOR shall provide a copy of its written policies and procedures to 2 detect, prevent and mitigate identity theft in accordance with the most current 3 Federal Trade Commission’s Red Flag Rules for approval by the City 4 Representative.
Identity Theft Prevention. The Contractor shall establish and maintain Identity Theft policies, procedures and controls for the purpose of assuring that “personal identifying information,” as defined by A.R.S. § 13-2001(10), as amended, contained in its records or obtained from the City or from others in carrying out its responsibilities under the Contract, is protected at all times and shall not be used by or disclosed to unauthorized persons. Persons requesting such information should be referred to the City. Contractor also agrees that any “personal identifying information” shall not be disclosed other than to employees or officers of Contractor as needed for the performance of duties under the Contract. Contractor agrees to maintain reasonable policies and procedures designed to detect, prevent and mitigate the risk of identity theft. Contractor is required under this contract to review the City of Peoria’s Identity Theft Program and to report to the Program Administrator any Red Flags as defined within that program. At a minimum, the contractor will have the following Identity Theft procedures in place: a. Solicit and retain only the “personal identifying information” minimally necessary for business purposes related to performance of the Contract. b. Ensure that any website used in the performance of the contract is secure. If a website that is not secure is to be used, the City shall be notified in advance before any information is posted. The City reserves to right to restrict the use of any non-secure websites under this contract. c. Ensure complete and secure destruction of any and all paper documents and computer files at the end of the contracts retention requirements. d. Ensure that office computers are password protected and that computer screens lock after a set period of time. e. Ensure that offices and workspaces containing customer information are secure. f. Ensure that computer virus protection is up to date. 37.
Identity Theft Prevention. The Transfer Agent has developed and shall maintain a program of policies, procedures and controls that is reasonably designed to (i) comply with applicable federal identity theft prevention laws, rules and regulations (the "identity theft rules") applicable to the Transfer Agent and/or a Fund, including but not limited to Regulation S-ID and (ii) assist in the detection, prevention and mitigation of identity theft with respect to the records and accounts of each Fund's shareholders that are maintained by the Transfer Agent (the "identity theft program"). The Transfer Agent agrees to comply with such identity theft program during the term of this Agreement with respect to each Fund's shareholder accounts and records that are maintained by the Transfer Agent. The Transfer Agent agrees to report any detected violations of the identity theft rules, including any incidents of attempted or suspected identity theft that are detected by the Transfer Agent, promptly (i) to a Fund in accordance with agreed upon procedures, and (ii) to the U.S. Department of Treasury's Financial Crimes Enforcement Network ("FinCEN") to the extent a suspicious activity report ("SAR") filing is required. The Transfer Agent shall handle such SAR filing in accordance with Section 4.2 of Schedule l .2(f) to this Agreement.
Identity Theft Prevention. In an effort to combat identity theft, the University maintains a comprehensive Identity Theft Prevention Program with a goal of protecting the personal information of students, employees, affiliates and customers. In the course of performing its duties under this Agreement and through its work for or on behalf of the University, Contractor may collect, access and/or receive personal information pertaining to University students, employees, affiliates and customers that can be linked to identifiable individuals (hereinafter “Personal Information”). Such Personal Information is Confidential Information of the University. It is the University’s expectation that Contractor will assist the University in its identity theft prevention efforts under the University’s Identity Theft Prevention Program. Contractor shall collect, access, receive and/or use such Personal Information solely for the purposes of conducting its work for or on behalf of the University and otherwise in compliance with any and all applicable federal and/or state laws. Additionally, Contractor shall safeguard such information in compliance with all applicable federal and state laws, including but not limited to the Fair Credit Transactions Act of 2003 and any regulations promulgated thereunder (e.g., Red Flags Rule regulations), including implementing appropriate policies or procedures for detecting and identifying possible identity theft and similar fraudulent or potentially fraudulent activities, and notify the University of any such suspicious activities. For the purpose of notification to the University, upon identification of a potential or actual issue of identity theft, Contractor shall immediately contact: Associate Vice President / Chief Privacy Officer Office of Privacy Protection & Management University of Connecticut 00 Xxxxxxxxxxxx Xxxx Xxxx, X0000 Xxxxxx, XX 00000 Phone: (000) 000-0000 Fax: (000) 000-0000 ATTACHMENT D Scope of Services and Pricing