INFORMATION SECURITY MANAGEMENT PROCEDURES Sample Clauses

INFORMATION SECURITY MANAGEMENT PROCEDURES. ADMINISTRATOR and SDI shall implement measures reasonably designed to (i) safeguard the security and confidentiality of the Nonpublic Personal Information; (ii) protect against any anticipated threats or hazards to the security or integrity of such information and; (iii) protect against unauthorized access to or use of the Nonpublic Personal Information that could result in substantial harm or inconvenience to the individual policyholder, annuityholder or certificateholder to whom such information relates. Without limiting the generality of the foregoing, ADMINISTRATOR and SDI shall implement and maintain the information security management procedures and obligations detailed in EXHIBIT E during the Term.
AutoNDA by SimpleDocs

Related to INFORMATION SECURITY MANAGEMENT PROCEDURES

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Cooperation Procedures The Seller shall, in connection with the delivery of each Qualified Replacement Mortgage to the Custodian, on behalf of the Indenture Trustee, provide the Indenture Trustee with information set forth in the Schedules of Home Equity Loans with respect to such Qualified Replacement Mortgage.

  • Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.

  • Collection Procedures (a) On or before the Closing Date, the Seller and the Purchaser shall have established and shall maintain thereafter the system of collecting and processing Collections of Receivables in accordance with Section 2.02 of the Servicing Agreement.

  • Administrative Procedures Administrative procedures with respect to the sale of Notes shall be agreed upon from time to time by the Agents and the Company (the "Procedures"). The Agents and the Company agree to perform the respective duties and obligations specifically provided to be performed by them in the Procedures.

  • Loan Procedures □ (a) Loans will be provided under the default loan procedures set forth in Section 13 of the Plan, unless modified under this Appendix B.

  • Disbursement Procedures The Issuing Bank shall, promptly following its receipt thereof, examine all documents purporting to represent a demand for payment under a Letter of Credit. The Issuing Bank shall promptly notify the Administrative Agent and the Borrower by telephone (confirmed by telecopy) of such demand for payment and whether the Issuing Bank has made or will make an LC Disbursement thereunder; provided that any failure to give or delay in giving such notice shall not relieve the Borrower of its obligation to reimburse the Issuing Bank and the Lenders with respect to any such LC Disbursement.

  • Compliance Policies and Procedures To assist the Fund in complying with Rule 38a-1 of the 1940 Act, BBH&Co. represents that it has adopted written policies and procedures reasonably designed to prevent violation of the federal securities laws in fulfilling its obligations under the Agreement and that it has in place a compliance program to monitor its compliance with those policies and procedures. BBH&Co will upon request provide the Fund with information about our compliance program as mutually agreed.

  • Amendment Procedures Amendments to this Agreement may be proposed only by the General Partner. To the fullest extent permitted by law, the General Partner shall have no duty or obligation to propose or approve any amendment to this Agreement and may decline to do so free of any duty or obligation whatsoever to the Partnership, any Limited Partner or any other Person bound by this Agreement, and, in declining to propose or approve an amendment to this Agreement, to the fullest extent permitted by law shall not be required to act in good faith or pursuant to any other standard imposed by this Agreement, any Group Member Agreement, any other agreement contemplated hereby or under the Delaware Act or any other law, rule or regulation or at equity, and the General Partner in determining whether to propose or approve any amendment to this Agreement shall be permitted to do so in its sole and absolute discretion. An amendment to this Agreement shall be effective upon its approval by the General Partner and, except as otherwise provided by Section 13.1 or Section 13.3, the holders of a Unit Majority, unless a greater or different percentage of Outstanding Units is required under this Agreement. Each proposed amendment that requires the approval of the holders of a specified percentage of Outstanding Units shall be set forth in a writing that contains the text of the proposed amendment. If such an amendment is proposed, the General Partner shall seek the written approval of the requisite percentage of Outstanding Units or call a meeting of the Unitholders to consider and vote on such proposed amendment. The General Partner shall notify all Record Holders upon final adoption of any amendments. The General Partner shall be deemed to have notified all Record Holders as required by this Section 13.2 if it has posted or made accessible such amendment through the Partnership’s or the Commission’s website.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!