Information Security Systems and Controls Sample Clauses

Information Security Systems and Controls. The Custodian will maintain commercially reasonable information security systems and controls, which include administrative, technical, and physical safeguards that are designed to: (i) maintain the security and confidentiality of the Client’s data; (ii) protect against any anticipated threats or hazards to the security or integrity of the Client’s data, including appropriate measures designed to meet legal and regulatory requirements applying to the Custodian; and (iii) protect against unauthorized access to or use of the Client’s data.
AutoNDA by SimpleDocs
Information Security Systems and Controls. The Transfer Agent will maintain commercially reasonable information security systems and controls that are designed to (A) maintain the security and confidentiality of the Trust’s data; (B) protect such data from unauthorized access or use; (C) protect such data from reasonably foreseeable threats or hazards to its security or integrity; and (D) meet legal and regulatory requirements applying to the Transfer Agent. A description of the Transfer Agent’s information security systems and controls is set forth on Appendix B (State Street Client Information Security Schedule), which is attached hereto and incorporated herein by reference.
Information Security Systems and Controls. The Custodian will maintain commercially reasonable information security systems and controls, which include administrative, technical, and physical safeguards that are designed to: (i) maintain the security and confidentiality of the Fund’s data; (ii) protect against any anticipated threats or hazards to the security or integrity of the Fund’s data, including appropriate measures designed to meet legal and regulatory requirements applying to the Custodian; and (iii) protect against unauthorized access to or use of the Fund’s data. In the event the Custodian becomes aware of critical vulnerabilities in its information security systems and controls, the Custodian will use commercially reasonable efforts to remediate such vulnerabilities within a reasonable period of time.
Information Security Systems and Controls. The Administrator will maintain commercially reasonable information security systems and controls, which include administrative, technical, and physical safeguards that are designed to: (i) maintain the security and confidentiality of the Trust’s data; (ii) protect against any anticipated threats or hazards to the security or integrity of the Trust’s data, including appropriate measures designed to meet legal and regulatory requirements applying to the Administrator; and (iii) protect against unauthorized access to or use of the Trust’s data.
Information Security Systems and Controls. The Sub-Administrator will maintain written policies and procedures and commercially reasonable information security systems and controls, which include administrative, technical, and physical safeguards that are designed to: (i) maintain the security and confidentiality of the Administrator’s or the Fund’s data; (ii) protect against any anticipated threats or hazards to the security or integrity of such data, including appropriate measures designed to meet legal and regulatory requirements applying to the Sub-Administrator; and (iii) protect against unauthorized access to or use of the Administrator’s or the Fund’s data.
Information Security Systems and Controls. State Street will maintain commercially reasonable information security systems and controls that are designed to (A) maintain the security and confidentiality of Client Data; (B) protect such Data from unauthorized access or use; (C) protect such Data from reasonably foreseeable threats or hazards to its security or integrity; and (D) meet legal and regulatory requirements applying to State Street. A description of State Street’s information security systems and controls is set forth on Appendix D (Client Information Security Schedule), which is attached hereto and incorporated herein by reference.

Related to Information Security Systems and Controls

  • INFORMATION SECURITY SCHEDULE All capitalized terms not defined in this Information Security Schedule (this “Security Schedule”) shall have the meanings ascribed to them in the Transfer Agency and Service Agreement by and between DST and each of the funds listed on Exhibit A thereto (each such fund, or series thereof, severally, and not jointly, the “Fund”) dated March 1, 2022 (the “Agreement”). DST and Fund hereby agree that DST shall maintain and comply with an information security policy (“Security Policy”) that satisfies the requirements set forth below; provided, that, because information security is a highly dynamic space (where laws, regulations and threats are constantly changing), DST reserves the right to make changes to its information security controls at any time and at the sole discretion of DST in a manner that it believes does not materially reduce the protection it applies to Fund Data. From time to time, DST may subcontract services performed under the Agreement (to the extent provided for under the Agreement) or provide access to Fund Data or its network to a subcontractor or other third party; provided, that, such subcontractor or third party implements and maintains security measures DST believes are at least as stringent as those described in this Security Schedule. For the purposes of this Schedule “prevailing industry practices and standards” refers to standards among financial institutions, including mutual funds, and third parties providing financial services to financial institutions.

  • Systems The details of any systems work will be determined after a thorough business analysis. System's work will be billed on a time and material basis. Investors Bank provides an allowance of 10 systems hours for data extract set up and reporting extract set up. Additional hours will be billed on a time and material basis.

  • Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.

  • Information Systems 5.1. The Customer is aware that vehicles manufactured, supplied or marketed by a company within the Volvo Group are equipped with one or more systems which may gather and store information about the vehicle (the “Information Systems”), including but not limited to information relating to vehicle condition and performance and information relating to the operation of the vehicle (together, the “Vehicle Data”). The Customer agrees not to interfere with the operation of the Information System in any way.

  • Information Technology The following applies to all contracts for information technology commodities and contractual services. “Information technology” is defined in section 287.012(15), F.S., to have the same meaning as provided in section 282.0041, F.S.

  • Security Services CONTRACTOR shall provide security services designed for preventing escapes, maintaining order, providing care, custody, control, supervision and management of the inmate population. A successful security program depends heavily on staff training, effective administration, and the establishment of inmate programs. The organization, staffing, and administration of the security program are vital to the Facility. The direction provided by a well-organized and clearly articulated operations manual, and emergency planning provides a solid base for successful administration. The final operations manual shall be submitted to the Bureau prior to the Service Commencement Date and shall be reviewed annually and updated as needed. Documentation of the review shall be provided annually to the On- Site Contract Monitor. Changes to the plan require written permission by the Contract Manager. The Department reserves the right to require changes to plans submitted to the Bureau.

Time is Money Join Law Insider Premium to draft better contracts faster.