Information Security Improvements Sample Clauses

Information Security Improvements. Prior to the filing of a motion for preliminary approval, Defendant has agreed to provide a confidential declaration to Class Counsel indicating data security-related measures that it has implemented or will be implementing. Costs associated with these information security improvements will be paid by Defendant separate and apart from other settlement benefits.
AutoNDA by SimpleDocs
Information Security Improvements. Defendant has agreed to provide sufficient documentation showing that it either has implemented or will implement various security-related measures to improve its data security. Costs associated with these information security improvements will be paid by Defendant separate and apart from other settlement benefits. Upon request by Plaintiff’s counsel, Xxxxxxxxx agrees to provide confirmatory discovery regarding changes and improvements made to protect Settlement Class MembersPrivate Information.
Information Security Improvements. For a period of one year following the execution of this Settlement Agreement, Texas ENT agrees to implement and maintain various data security procedures and the actual costs for implementation and maintenance of those Information Security Improvements will be paid by Texas ENT separate and apart from the Settlement Benefits described above.
Information Security Improvements. GCBS has agreed to provide sufficient documentation to demonstrate that it either has implemented or will implement various security related measures. Costs associated with these information security improvements will be paid by GCBS separate and apart from other settlement benefits.
Information Security Improvements. In addition to a cash payment and/or credit monitoring, Xxxxxxxxx has also agreed to provide sufficient documentation to demonstrate that it either has implemented or will implement various security related measures for a period of two years. Costs associated with these information security improvements will be paid by Xxxxxxxxx separate and apart from other Settlement benefits. Upon request, Xxxxxxxxx agrees to provide confirmatory discovery regarding changes and improvements made to protect Settlement Class Members’ and others’ Personal Information.
Information Security Improvements. PECU has agreed to provide sufficient documentation to demonstrate that it either has implemented or will implement various security related measures through December 31, 2023. Costs associated with these information security improvements will be paid by PECU separate and apart from other settlement benefits. PECU agrees to provide confirmatory discovery establishing the appropriateness of settlement terms as contemplated under Fed. R. Civ. P. 23(b)(1). A copy of the information security improvements may be filed with the Court, under seal, pursuant to an agreed upon Confidentiality Order entered by the Court.
Information Security Improvements. Upon request, Syracuse has agreed to provide sufficient documentation to demonstrate that it either has implemented or will implement various security related measures. Costs associated with these information security improvements will be paid by Syracuse separate and apart from other settlement benefits. Upon request by Plaintiff’s Counsel, Syracuse agrees to provide confirmatory discovery regarding changes and improvements made to protect Settlement Class MembersPrivate Information.
AutoNDA by SimpleDocs
Information Security Improvements. Xxxxxxxx has agreed to provide sufficient documentation to demonstrate that it either has implemented or will implement various security related measures. Costs associated with these information security improvements will be paid by Trussway separate and apart from other settlement benefits. Upon request by Plaintiffs’ counsel, Xxxxxxxx agrees to provide confirmatory discovery and/or a confidential declaration regarding changes and improvements made to protect Settlement Class Members’ Personal Information.

Related to Information Security Improvements

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks. (2) The Information Security Program shall require encryption of any Personal Information in electronic format while in transit or in storage, and enhanced controls and standards for transport and disposal of physical media containing Personal Information. DTI shall, and shall require its agents, contractors and subcontractors who access or use Personal Information or Confidential Information to, regularly test key controls, systems and procedures relating to the Information Security Program ("ISP Tests"). DTI shall advise the Funds of any material issues identified in the ISP Tests potentially affecting the Information Security Program. (3) DTI shall comply with its Information Security Program.

  • Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.

  • Maintenance of Intellectual Property The Company will, and will cause each of its Subsidiaries to, take all reasonable action necessary or advisable to maintain all of the Intellectual Property Rights of the Company and/or any of its Subsidiaries that are necessary or material to the conduct of its business in full force and effect.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!