Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks. (2) The Information Security Program shall require encryption of any Personal Information in electronic format while in transit or in storage, and enhanced controls and standards for transport and disposal of physical media containing Personal Information. DTI shall, and shall require its agents, contractors and subcontractors who access or use Personal Information or Confidential Information to, regularly test key controls, systems and procedures relating to the Information Security Program ("ISP Tests"). DTI shall advise the Funds of any material issues identified in the ISP Tests potentially affecting the Information Security Program. (3) DTI shall comply with its Information Security Program.
Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.
Personal Information security breach Supplier/Service Provider’s Obligations a) The Supplier/Service Provider shall notify the Information Officer of Transnet, in writing as soon as possible after it becomes aware of or suspects any loss, unauthorised access or unlawful use of any personal data and shall, at its own cost, take all necessary remedial steps to mitigate the extent of the loss or compromise of personal data and to restore the integrity of the affected Goods/Services as quickly as is possible. The Supplier/Service Provider shall also be required to provide Transnet with details of the persons affected by the compromise and the nature and extent of the compromise, including details of the identity of the unauthorised person who may have accessed or acquired the personal data. b) The Supplier/Service Provider shall provide on-going updates on its progress in resolving the compromise at reasonable intervals until such time as the compromise is resolved. c) Where required, the Supplier/Service Provider may be required to notify the South African Police Service; and/or the State Security Agency and where applicable, the relevant regulator and/or the affected persons of the security breach. Any such notification shall always include sufficient information to allow the persons to take protective measures against the potential consequences of the compromise. d) The Supplier/Service Provider undertakes to co‑operate in any investigation relating to security which is carried out by or on behalf of Transnet including providing any information or material in its possession or control and implementing new security measures.
Information Regarding Collateral (a) Level 3 and the Borrower will furnish to the Collateral Agent prompt written notice of any change (i) in any Loan Party’s corporate name or in any trade name used to identify it in the conduct of its business or in the ownership of its properties, (ii) in any Loan Party’s identity or corporate structure or (iii) in any Loan Party’s Federal Taxpayer Identification Number. Each of Level 3 and the Borrower agrees not to effect or permit any change referred to in the preceding sentence unless all filings (or arrangements therefor satisfactory to the Collateral Agent) have been made under the Uniform Commercial Code or otherwise that are required in order for the Collateral Agent to continue at all times following such change to have a valid, legal and perfected security interest in all the Collateral. Each of Level 3 and the Borrower also agrees promptly to notify the Collateral Agent if any material portion of the Collateral is damaged or destroyed. (b) Each year, at the time of delivery of the certificate pursuant to paragraph (c) of Section 5.01, Level 3 shall deliver to the Collateral Agent certificates of an authorized officer of Level 3 (i) setting forth the information required pursuant to (A) the Annual Perfection Certificate and (B) until such time as the Collateral Permit Condition is satisfied with respect to Level 3 LLC, the Annual Loan Proceeds Note Perfection Certificate, or confirming that there has been no change in such information since the dates of the Effective Date Perfection Certificate or the Effective Date Loan Proceeds Note Perfection Certificate, as the case may be, or the date of the most recent certificates delivered pursuant to this Section and (ii) certifying that all Uniform Commercial Code financing statements (excluding fixture filings) or other appropriate filings, recordings or registrations, including all refilings, rerecordings and reregistrations, containing a description of the Collateral required to be set forth therein have been filed of record in each United States governmental, municipal or other appropriate office in each jurisdiction identified pursuant to clause (i) above to the extent necessary to perfect and continue the perfection of the security interests under the applicable Security Documents for a period of not less than 18 months after the date of such certificate (except as noted therein with respect to any continuation statements to be filed within such period).
Contractor and Employee Security Precautions The security aspects of working at the Correctional Facility are critical. The following security precautions are part of the site conditions and are a part of this Contract. All persons coming on the site in any way connected with this Work shall be made aware of them, and it is the (General) Contractor’s responsibility to check and enforce them.
Shareholder Information Services (i) Make information available to shareholder servicing unit and other remote access units regarding trade date, share price, current holdings, yields, and dividend information. (ii) Produce detailed history of transactions through duplicate or special order statements upon request. (iii) Provide mailing labels for distribution of financial reports, prospectuses, proxy statements or marketing material to current shareholders. (iv) Respond as appropriate to all inquiries and communications from shareholders relating to shareholder accounts.
Security Policies IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure.
Information Sharing (a) HHSC will provide the MA Dual SNP with resources regarding the LTSS covered by Medicaid in accordance with this section. (b) Texas Medicaid benefits are described in Attachment B, Texas Medicaid Summary of Benefits. The MA Dual SNP must include the Texas Medicaid Summary of Benefits in its Member Handbook for the MA Product. (c) HHSC and the MA Dual SNP will identify and share information, such as the following: (1) HHSC will provide the MA Dual SNP with links to online Medicaid LTSS provider information for the traditional fee-for-service and STAR+PLUS programs. Within thirty (30) business days after receiving such information, the MA Dual SNP must post a link to this information on its website. (2) The MA Dual SNP must: A) Notify Dual Eligible Members and Other Dual SNP Members, via its member communication materials that information concerning Medicaid provider participation is available on the MA Dual SNP’s website; and B) Notify Dual Eligible Members and Other Dual SNP Members that they may request written copies of Medicaid Provider directories by contacting their STAR+PLUS MCO, C) Assist the Dual Eligible Members and Other Dual SNP Members in obtaining printed copies of Medicaid Provider directories from their STAR+PLUS MCO, and D) Verify that the Dual Eligible Members and Other Dual SNP Member received the requested directory. (3) The MA Dual SNP must notify Network Providers that information concerning Medicaid provider participation is available on the MA Dual SNP’s website. The MA Dual SNP must provide this notice in the Network Provider agreement, Network Provider manuals, bulletins, faxes, policies and procedures, provider manual updates, or other contractual documents. (4) The MA Dual SNP must have written procedures for ensuring that Dual Eligible Members and Other Dual SNP Members have access to the services identified in the MA Product, including policies regarding network adequacy that are consistent with the requirements of the MA Agreement. The MA Dual SNP must provide HHSC with a copy of these policies no later than 5 business days after a request. (d) The MA Dual SNP must encourage Network Provider SNF to electronically submit to the HHSC Medicaid claims administrator a resident transaction notice within 72 hours after a Dual Eligible Member’s admission or discharge from the nursing facility, in accordance with 40 Tex. Admin. Code § 19.2615. (e) The MA Dual SNP is required to notify HHSC of significant changes to the terms of its CMS contract within 10 business days of such changes, which may include but is not limited to the following: changes in the services areas; plan benefit package (PBP) changes; non-renewal; terminations or deficiencies of the contract; notices of intent to deny; and any novation agreements. Plans must submit any CMS warning letters or corrective action plans within 10 business days of receipt to the HHSC point-of- contact identified in Section 9.06. (f) The MA Dual SNP is required to notify HHSC in the event the Plan receives less than a 3.0 star Medicare rating on either its Part C or Part D scores. The Plan must provide an outline of the steps proposed or implemented to improve the low score. (g) The MA Dual SNP must participate in meetings with HHSC, telephonic or in person, relating to the health care provided under this Agreement and their compliance with this Agreement's terms, and to timely provide any necessary information and data upon HHSC's request. (h) The MA Dual SNP, upon request from HHSC, must provide all documents it provides to and receives from CMS, within 30 days of the HHSC request, unless an extension is granted by HHSC.
Information Regarding the Collateral (a) Furnish to the Administrative Agent at least fifteen (15) days (or such shorter period as the Administrative Agent may agree) prior written notice of any change in: (i) any Loan Party’s legal name; (ii) the location of any Loan Party’s chief executive office, its principal place of business, any office in which it maintains books or records relating to Collateral owned by it or any office or facility at which Collateral owned by it is located (including the establishment of any such new office or facility, but excluding in-transit Collateral); (iii) any Loan Party’s organizational structure or jurisdiction of incorporation or formation; or (iv) any Loan Party’s Federal Taxpayer Identification Number or organizational identification number assigned to it by its state of organization. The Loan Parties shall not effect or permit any change referred to in the preceding sentence unless the Loan Parties have undertaken all such action, if any, reasonably requested by the Administrative Agent under the UCC or otherwise that is required in order for the Collateral Agent to continue at all times following such change to have a valid, legal and perfected first priority security interest in all the Collateral for its own benefit and the benefit of the other Credit Parties. (b) From time to time as may be reasonably requested by the Administrative Agent, the Lead Borrower shall supplement each Schedule hereto, or any representation herein or in any other Loan Document, with respect to any matter arising after the Restatement Effective Date that is required to be set forth or described in such Schedule or as an exception to such representation or that is necessary to correct any information in such Schedule or representation which has been rendered inaccurate thereby (and, in the case of any supplements to any Schedule, such Schedule shall be appropriately marked to show the changes made therein). Notwithstanding the foregoing, no supplement or revision to any Schedule or representation shall be deemed the Credit Parties’ consent to the matters reflected in such updated Schedules or revised representations nor permit the Loan Parties to undertake any actions otherwise prohibited hereunder or fail to undertake any action required hereunder from the restrictions and requirements in existence prior to the delivery of such updated Schedules or such revision of a representation; nor shall any such supplement or revision to any Schedule or representation be deemed the Credit Parties’ waiver of any Default resulting from the matters disclosed therein.
Additional Financial Information The Company shall provide Parent with the Company’s audited financial statements for the twelve month periods ended December 31, 2022 and 2021 consisting of the audited consolidated balance sheets as of such dates, the audited consolidated income statements for the twelve month period ended on such date, and the audited consolidated cash flow statements for the twelve month period ended on such date (the “Year End Financials”). Subsequent to the delivery of the Year End Financials, the Company’s consolidated interim financial information for each quarterly period thereafter shall be delivered to Parent no later than forty (40) calendar days following the end of each quarterly period and consolidated interim monthly information for each month thereafter shall be delivered to Purchaser no later than 20 days following the end of each month (the “Required Financial Statements”). All of the financial statements to be delivered pursuant to this Section 7.3, shall be prepared under U.S. GAAP in accordance with requirements of the PCAOB for public companies. The Required Financial Statements shall be accompanied by a certificate of the Chief Executive Officer of the Company to the effect that all such financial statements fairly present the financial position and results of operations of the Company as of the date or for the periods indicated, in accordance with U.S. GAAP, except as otherwise indicated in such statements and subject to year-end audit adjustments. The Company will promptly provide with additional Company financial information reasonably requested by Parent for inclusion in the Proxy Statement and any other filings to be made by Parent with the SEC.