Information Security Program and Policy Sample Clauses

Information Security Program and Policy. See Attachments III for complete Information Security Program and Policy • IT PRICING TERMS : All services identified above shall be provided to GMAC Bank and its subsidiaries at no charge.
AutoNDA by SimpleDocs
Information Security Program and Policy. See Attachments III for complete Information Security Program and Policy • IT PRICING TERMS : IT Administrative Services invoice will be prepared on a monthly basis reflecting services delivered to the Bank from IT detailed in the above service level agreement elements in addition to specific depreciation related to pertinent hardware, software licenses and software development as illustrated below.
Information Security Program and Policy. Iron Mountain shall maintain an information security program with appropriate physical, technical and administrative controls that are designed to meet industry standards. The information security program shall include:

Related to Information Security Program and Policy

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • FORM AND SECURITY PROCEDURES Proper Instructions may be in writing signed by the authorized individual or individuals or may be in a tested communication or in a communication utilizing access codes effected between electro-mechanical or electronic devices or may be by such other means and utilizing such intermediary systems and utilities as may be agreed to from time to time by the Custodian and the individual or organization giving the instruction, provided that the Fund has followed any security procedures agreed to from time to time by the applicable Fund and the Custodian including, but not limited to, the security procedures selected by the Fund by reference to the form of Funds Transfer Addendum hereto, the terms of which are part of this Agreement. The Custodian may agree to accept oral instructions, and in such case oral instructions will be considered Proper Instructions. The Fund shall cause all oral instructions to be confirmed in writing, but the Fund’s failure to do so shall not affect the Custodian’s authority to rely on the oral instructions.

  • Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.

  • Third-Party Information; Privacy or Data Protection Laws Each Party acknowledges that it and members of its Group may presently have and, following the Effective Time, may gain access to or possession of confidential or proprietary information of, or personal information relating to, Third Parties (i) that was received under confidentiality or non-disclosure agreements entered into between such Third Parties, on the one hand, and the other Party or members of such Party’s Group, on the other hand, prior to the Effective Time; or (ii) that, as between the two Parties, was originally collected by the other Party or members of such Party’s Group and that may be subject to and protected by privacy, data protection or other applicable Laws. Each Party agrees that it shall hold, protect and use, and shall cause the members of its Group and its and their respective Representatives to hold, protect and use, in strict confidence the confidential and proprietary information of, or personal information relating to, Third Parties in accordance with privacy, data protection or other applicable Laws and the terms of any agreements that were either entered into before the Effective Time or affirmative commitments or representations that were made before the Effective Time by, between or among the other Party or members of the other Party’s Group, on the one hand, and such Third Parties, on the other hand.

  • Disclosure Document Each Prospectus delivered with respect to the Notes shall clearly disclose that the Note Policy is not covered by the property/casualty insurance security fund specified in Article 76 of the New York Insurance Law. In addition, each Prospectus delivered with respect to the Notes which include financial statements of Financial Security prepared in accordance with generally accepted accounting principles (other than a Prospectus that only incorporates such financial statements by reference) shall include the following statement immediately preceding such financial statements: The New York State Insurance Department recognizes only statutory accounting practices for determining and reporting the financial condition and results of operations of an insurance company, for determining its solvency under the New York Insurance Law, and for determining whether its financial condition warrants the payment of a dividend to its stockholders. No consideration is given by the New York State Insurance Department to financial statements prepared in accordance with generally accepted accounting principles in making such determinations.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!