Information Security and Business Continuity Sample Clauses

Information Security and Business Continuity. (a) Information Security Standards and Reviews. BNYM represents and warrants that it has in place information security standards that are reasonably designed to comply with applicable requirements set forth by its primary regulatory oversight agency or other applicable federal law. BNYM shall notify the Funds as soon as reasonably practical under the circumstances in the event of discovery of a material breach of its systems, applications, networks or sites used to provide services hereunder and, to the extent possible and available, shall advise the Funds of the efforts undertaken to correct those material breaches.
AutoNDA by SimpleDocs
Information Security and Business Continuity. 6.1 Iress shall comply with the Iress Information Security Policy. 6.2 Each party agrees: (a) not to knowingly suffer or permit its staff or other third party under its direction or control to knowingly introduce into the other party’s systems any Harmful Code; and (b) that if any Harmful Code is introduced, it will promptly report this to the other party, and take all reasonable steps to eliminate the Harmful Code from its own server. 6.3 The Customer acknowledges that: (a) it and its Authorised Users are responsible for maintaining the confidentiality of login information and passwords for accessing the Services; and (b) technical and security controls incorporated within the Iress Services may be updated from time to time in order to provide an enhanced level of security in relation to the Iress Services, and in order to benefit from such enhanced technical and security controls the Customer may be required to install the most recent Upgrade. 6.4 Neither Iress (nor any Third Party Service Provider) will have any liability (whether in contract, tort, including negligence or otherwise) to the Customer as a result of unauthorised access to the Services or any data within them (including Customer Personal Data / Information) as a result of a failure by the Customer to either comply with clause 6.3(a) or to install the most recent Upgrade. 6.5 Iress shall maintain a Business Continuity Plan that details the processes and arrangements which Iress shall follow to ensure continuity of the Iress Services should a Business Continuity Event occur. 6.6 Iress shall test the Business Continuity Plan on a regular basis, and in any event at least once every 12 months, and shall promptly implement any actions or remedial measures which Iress considers to be necessary as a result of those tests. 6.7 In the event Iress invokes its Business Continuity Plan in response to a Business Continuity Event, it shall, to the extent appropriate, keep the Customer informed at reasonable intervals of the progress and application of the Business Continuity Plan.
Information Security and Business Continuity. (a) ESi shall perform all services hereunder consistent with its ASP Information Security Program (“Security Program”). Such Security Program shall set forth, at a minimum, ESi policies and procedures with respect to data classification and management, data and system back-ups, account and password management, physical security and access, network configuration and access, change management, media management and destruction, security training and awareness, and continuity of ASP Environment operations. (b) Any sub-contractors used to deliver, or support delivery of the Hosting Services shall maintain an information security and business continuity program which is supportive of the Security Program. (c) A copy of the Security Program is available, upon request and after execution of the ESi Non-Disclosure Agreement. (d) Hosting Services are provided in a shared environment. Customization of information security, data management and/or business continuity practices to meet Customer-specific needs is not supported.

Related to Information Security and Business Continuity

  • Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks. (2) The Information Security Program shall require encryption of any Personal Information in electronic format while in transit or in storage, and enhanced controls and standards for transport and disposal of physical media containing Personal Information. DTI shall, and shall require its agents, contractors and subcontractors who access or use Personal Information or Confidential Information to, regularly test key controls, systems and procedures relating to the Information Security Program ("ISP Tests"). DTI shall advise the Funds of any material issues identified in the ISP Tests potentially affecting the Information Security Program. (3) DTI shall comply with its Information Security Program.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes. 11.2 We may (i) compile statistical and other information related to the performance, operation and use of the Services, and (ii) use data from the Services in aggregated form for security and operations management, to create statistical analyses, and for research and development purposes (clauses i and ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly available; however, Service Analyses will not incorporate Your Content, Personal Data or Confidential Information in a form that could serve to identify You or any individual. We retain all intellectual property rights in Service Analyses. 11.3 We may provide You with the ability to obtain certain Oracle Software (as defined below) for use with the Services. If we provide Oracle Software to You and do not specify separate terms for such software, then such Oracle Software is provided as part of the Services and You have the non-exclusive, worldwide, limited right to use such Oracle Software, subject to the terms of this Agreement and Your order (except for separately licensed elements of the Oracle Software, which separately licensed elements are governed by the applicable separate terms), solely to facilitate Your use of the Services. You may allow Your Users to use the Oracle Software for this purpose, and You are responsible for their compliance with the license terms. Your right to use any Oracle Software will terminate upon the earlier of our notice (by web posting or otherwise) or the end of the Services associated with the Oracle Software. Notwithstanding the foregoing, if Oracle Software is licensed to You under separate terms, then Your use of such software is governed by the separate terms. Your right to use any part of the Oracle Software that is licensed under the separate terms is not restricted in any way by this Agreement.

  • Disaster Recovery and Business Continuity The Parties shall comply with the provisions of Schedule 5 (Disaster Recovery and Business Continuity).

  • Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.

  • Shareholder Information Services (i) Make information available to shareholder servicing unit and other remote access units regarding trade date, share price, current holdings, yields, and dividend information. (ii) Produce detailed history of transactions through duplicate or special order statements upon request. (iii) Provide mailing labels for distribution of financial reports, prospectuses, proxy statements or marketing material to current shareholders. (iv) Respond as appropriate to all inquiries and communications from shareholders relating to shareholder accounts.

  • Registry Interoperability and Continuity Registry Operator shall comply with the Registry Interoperability and Continuity Specifications as set forth in Specification 6 attached hereto (“Specification 6”).

  • Information/Cooperation Executive shall, upon reasonable notice, furnish such information and assistance to the Bank as may be reasonably required by the Bank, in connection with any litigation in which it or any of its subsidiaries or affiliates is, or may become, a party; provided, however, that Executive shall not be required to provide information or assistance with respect to any litigation between Executive and the Bank or any other subsidiaries or affiliates.

  • Information Sources The Custodian may rely upon information received from issuers of Investments or agents of such issuers, information received from Subcustodians and from other commercially reasonable sources such as commercial data bases and the like, but shall not be responsible for specific inaccuracies in such information, provided that the Custodian has relied upon such information in good faith, or for the failure of any commercially reasonable information provider.

  • Sales Material, Information and Trademarks 6.1 For purposes of this Section 6, “Sales literature or other Promotional material” includes, but is not limited to, portions of the following that use any logo or other trademark related to the Trust, or Underwriter or its affiliates, or refer to the Trust: advertisements (such as material published or designed for use in a newspaper, magazine or other periodical, radio, television, telephone or tape recording, videotape display, signs or billboards, motion pictures, electronic communication or other public media), sales literature (i.e., any written communication distributed or made generally available to customers or the public, including brochures, circulars, research reports, market letters, form letters, seminar texts, reprints or excerpts or any other advertisement, sales literature or published article or electronic communication), educational or training materials or other communications distributed or made generally available to some or all agents or employees in any media, and disclosure documents, shareholder reports and proxy materials. 6.2 You shall furnish, or cause to be furnished to us or our designee, at least one complete copy of each registration statement, prospectus, statement of additional information, private placement memorandum, retirement plan disclosure information or other disclosure documents or similar information, as applicable (collectively “Disclosure Documents”), as well as any report, solicitation for voting instructions, Sales literature or other Promotional materials, and all amendments to any of the above that relate to the Contracts or the Accounts prior to its first use. You shall furnish, or shall cause to be furnished, to us or our designee each piece of Sales literature or other Promotional material in which the Trust or an Adviser is named, at least fifteen (15) Business Days prior to its proposed use. No such material shall be used unless we or our designee approve such material and its proposed use. 6.3 You and your agents shall not give any information or make any representations or statements on behalf of the Trust or concerning the Trust, the Underwriter or an Adviser, other than information or representations contained in and accurately derived from the registration statement or prospectus for the Trust shares (as such registration statement and prospectus may be amended or supplemented from time to time), annual and semi-annual reports of the Trust, Trust-sponsored proxy statements, or in Sales literature or other Promotional material approved by the Trust or its designee, except as required by legal process or regulatory authorities or with the written permission of the Trust or its designee. You shall send us a complete copy of each Disclosure Document and item of Sales literature or other Promotional materials in its final form within twenty (20) days of its first use. 6.4 We shall not give any information or make any representations or statements on behalf of you or concerning you, the Accounts or the Contracts other than information or representations, including naming you as a Trust shareholder, contained in and accurately derived from Disclosure Documents for the Contracts (as such Disclosure Documents may be amended or supplemented from time to time), or in materials approved by you for distribution, including Sales literature or other Promotional materials, except as required by legal process or regulatory authorities or with your written permission. 6.5 Except as provided in Section 6.2, you shall not use any designation comprised in whole or part of the names or marks “Franklin” or “Xxxxxxxxx” or any logo or other trademark relating to the Trust or the Underwriter without prior written consent, and upon termination of this Agreement for any reason, you shall cease all use of any such name or xxxx as soon as reasonably practicable. 6.6 You shall furnish to us ten (10) Business Days prior to its first submission to the SEC or its staff, any request or filing for no-action assurance or exemptive relief naming, pertaining to, or affecting, the Trust, the Underwriter or any of the Portfolios. 6.7 You agree that any posting of Portfolio prospectuses on your website will result in the Portfolio prospectuses: (i) appearing identical to the hard copy printed version or .pdf format file provided to you by us (except that you may reformat .pdf format prospectus files in order to delete blank pages and to insert .pdf format prospectus supplement files provided by us to you); (ii) being clearly associated with the particular Contracts in which they are available and posted in close proximity to the applicable Contract prospectuses; (iii) having no less prominence than prospectuses of any other underlying funds available under the Contracts; and (iv) being used in an authorized manner. Notwithstanding the above, you understand and agree that you are responsible for ensuring that participation in the Portfolios, and any website posting, or other use, of the Portfolio prospectuses is in compliance with this Agreement and applicable state and federal securities and insurance laws and regulations, including as they relate to paper or electronic use of fund prospectuses. The format of such presentation, the script and layout for any website that mentions the Trust, the Underwriter, an Adviser or the Portfolios shall be routed to us as sales literature or other promotional materials, pursuant to Section 6 of this Agreement. In addition, you agree to be solely responsible for maintaining and updating the Portfolio prospectuses’ PDF files (including prospectus supplements) and removing and/or replacing promptly any outdated prospectuses, as necessary, ensuring that any accompanying instructions by us, for using or stopping use are followed. You agree to designate and make available to us a person to act as a single point of communication contact for these purposes. We are not responsible for any additional costs or additional liabilities that may be incurred as a result of your election to place the Portfolio prospectuses on your website. We reserve the right to revoke this authorization, at any time and for any reason, although we may instead make our authorization subject to new procedures. 6.8 Each of your and your distributor’s registered representatives, agents, independent contractors and employees, as applicable, will have access to our websites at xxxxxxxxxxxxxxxxx.xxx, and such other URLs through which we may permit you to conduct business concerning the Portfolios from time to time (referred to collectively as the “Site”) as provided herein: (i) upon registration by such individual on a Site, (ii) if you cause a Site Access Request Form (an “Access Form”) to be signed by your authorized supervisory personnel and submitted to us, as a Schedule to, and legally a part of, this Agreement, or (iii) if you provide such individual with the necessary access codes or other information necessary to access the Site through any generic or firm-wide authorization we may grant you from time to time. Upon receipt by us of a completed registration submitted by an individual through the Site or a signed Access Form referencing such individual, we shall be entitled to rely upon the representations contained therein as if you had made them directly hereunder and we will issue a user identification, express number and/or password (collectively, “Access Code”). Any person to whom we issue an Access Code or to whom you provide the necessary Access Codes or other information necessary to access the Site through any generic or firm-wide authorization we may grant you from time to time shall be an “Authorized User.” We shall be entitled to assume that such person validly represents you and that all instructions received from such person are authorized, in which case such person will have access to the Site, including all services and information to which you are authorized to access on the Site. All inquiries and actions initiated by you (including your Authorized Users) are your responsibility, are at your risk and are subject to our review and approval (which could cause a delay in processing). You agree that we do not have a duty to question information or instructions you (including Authorized Users) give to us under this Agreement, and that we are entitled to treat as authorized, and act upon, any such instructions and information you submit to us. You agree to take all reasonable measures to prevent any individual other than an Authorized User from obtaining access to the Site. You agree to inform us if you wish to restrict or revoke the access of any individual Access Code. If you become aware of any loss or theft or unauthorized use of any Access Code, you agree to contact us immediately. You also agree to monitor your (including Authorized Users’) use of the Site to ensure the terms of this Agreement are followed. You also agree that you will comply with all policies and agreements concerning Site usage, including without limitation the Terms of Use Agreement(s) posted on the Site (“Site Terms”), as may be revised and reposted on the Site from time to time, and those Site Terms (as in effect from time to time) are a part of this Agreement. Your duties under this section are considered “services” required under the terms of this Agreement. You acknowledge that the Site is transmitted over the Internet on a reasonable efforts basis and we do not warrant or guarantee their accuracy, timeliness, completeness, reliability or non-infringement. Moreover, you acknowledge that the Site is provided for informational purposes only, and is not intended to comply with any requirements established by any regulatory or governmental agency.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!