Information Security Program Framework and Right to Audit Sample Clauses

Information Security Program Framework and Right to Audit x. Xxxxx agrees to conform its Information Security Program to the framework set forth by the International Standards Organization (“ISO”) in the ISO’s Code of Practice for Information Security Management (“ISO/IEC 27002:2005,” as amended from time to time). Xxxxx also agrees to include in its Information Security Program the practices described in this Attachment A.
AutoNDA by SimpleDocs

Related to Information Security Program Framework and Right to Audit

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Auditor Report; Right to Audit (a) Within the time period permitted for the examination audit pursuant to 12 CFR Section 363 after the end of each fiscal year from and including the fiscal year during which Bank Closing falls to and including the calendar year during which the Termination Date falls, the Assuming Institution shall deliver to the Corporation and to the Receiver a report signed by its independent public accountants stating that they have reviewed the terms of this Commercial Shared-Loss Agreement and that, in the course of their annual audit of the Assuming Institution’s books and records, nothing has come to their attention suggesting that any computations required to be made by the Assuming Institution during such year by this Article II were not made by the Assuming Institution in accordance herewith. In the event that the Assuming Institution cannot comply with the preceding sentence, it shall promptly submit to the Receiver corrected computations together with a report signed by its independent public accountants stating that, after giving effect to such corrected computations, nothing has come to their attention suggesting that any computations required to be made by the Assuming Institution during such year by this Article II were not made by the Assuming Institution in accordance herewith. In such event, the Assuming Institution and the Receiver shall make all such accounting adjustments and payments as may be necessary to give effect to each correction reflected in such corrected computations, retroactive to the date on which the corresponding incorrect computation was made. It is the intention of this provision to align the timing of the audit required under this Commercial Shared-Loss Agreement with the examination audit required pursuant to 12 CFR Section 363.

  • Right to Audit During the term of this Agreement and not more than once per year (unless circumstances warrant additional audits as described below), Servicer may audit the Asset Representations Reviewer’s policies, procedures and records that relate to the performance of the Asset Representation Reviewer under this Agreement to ensure compliance with this Agreement upon at least 10 business days’ notice. Notwithstanding the foregoing, the parties agree that Servicer may conduct an audit at any time, in the event of (i) audits required by Servicer’s governmental or regulatory authorities, (ii) investigations of claims of misappropriation, fraud, or business irregularities of a potentially criminal nature, or (iii) Servicer reasonably believes that an audit is necessary to address a material operational problem or issue that poses a threat to Servicer’s business.

  • Technical Documentation Subject to the terms of this Agreement, BROCADE hereby grants to McDATA a nonexclusive, nontransferable, worldwide license to reproduce and use BROCADE's technical documentation provided to McDATA by BROCADE hereunder, solely for McDATA's internal purposes in connection with the manufacture, marketing and support of the McDATA Products into which the Products are incorporated as set forth herein. Modifications to such technical documentation by McDATA shall require BROCADE's prior written authorization, which authorization will not be unreasonably withheld.

  • INFORMATION SECURITY SCHEDULE All capitalized terms not defined in this Information Security Schedule (this “Security Schedule”) shall have the meanings ascribed to them in the Transfer Agency and Service Agreement by and between DST and each of the funds listed on Exhibit A thereto (each such fund, or series thereof, severally, and not jointly, the “Fund”) dated March 1, 2022 (the “Agreement”). DST and Fund hereby agree that DST shall maintain and comply with an information security policy (“Security Policy”) that satisfies the requirements set forth below; provided, that, because information security is a highly dynamic space (where laws, regulations and threats are constantly changing), DST reserves the right to make changes to its information security controls at any time and at the sole discretion of DST in a manner that it believes does not materially reduce the protection it applies to Fund Data. From time to time, DST may subcontract services performed under the Agreement (to the extent provided for under the Agreement) or provide access to Fund Data or its network to a subcontractor or other third party; provided, that, such subcontractor or third party implements and maintains security measures DST believes are at least as stringent as those described in this Security Schedule. For the purposes of this Schedule “prevailing industry practices and standards” refers to standards among financial institutions, including mutual funds, and third parties providing financial services to financial institutions.

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • FORM AND SECURITY PROCEDURES Proper Instructions may be in writing signed by the authorized individual or individuals or may be in a tested communication or in a communication utilizing access codes effected between electro-mechanical or electronic devices or may be by such other means and utilizing such intermediary systems and utilities as may be agreed to from time to time by the Custodian and the individual or organization giving the instruction, provided that the Fund has followed any security procedures agreed to from time to time by the applicable Fund and the Custodian. The Custodian may agree to accept oral instructions, and in such case oral instructions will be considered Proper Instructions. The Fund shall cause all oral instructions to be confirmed in writing, but the Fund’s failure to do so shall not affect the Custodian’s authority to rely on the oral instructions.

  • Inspection of Reports The Depositary shall make available for inspection by holders of Receipts at the Corporate Office and at such other places as it may from time to time deem advisable during normal business hours any reports and communications received from the Company that are both received by the Depositary as the holder of deposited Preferred Stock and made generally available to the holders of the Preferred Stock. In addition, the Depositary shall transmit certain notices and reports to the holders of Receipts as provided in Section 5.05.

  • Information Security 10.1 The Transfer Agent shall maintain reasonable safeguards for maintaining in confidence any and all Fund Confidential Information, including, without limitation, the policies and procedures described in Section 10.2. The Transfer Agent shall not, at any time, use any such Fund Confidential Information for any purpose other than as specifically authorized by this Agreement, or in writing by the Fund.

  • Security Procedure The Client acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Client from Security Procedures offered by State Street. The Client agrees that the Security Procedures are reasonable and adequate for its wire transfer transactions and agrees to be bound by any payment orders, amendments and cancellations, whether or not authorized, issued in its name and accepted by State Street after being confirmed by any of the selected Security Procedures. The Client also agrees to be bound by any other valid and authorized payment order accepted by State Street. The Client shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated in writing to State Street. The Client must notify State Street immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Client’s authorized personnel. State Street shall verify the authenticity of all instructions according to the Security Procedure.

Time is Money Join Law Insider Premium to draft better contracts faster.