Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.
Ownership Information The Participant hereby covenants that so long as the Participant holds any LTIP Units, at the request of the Partnership, the Participant shall disclose to the Partnership in writing such information relating to the Participant’s ownership of the LTIP Units as the Partnership reasonably believes to be necessary or desirable to ascertain in order to comply with the Code or the requirements of any other appropriate taxing authority.