Information Technology The following applies to all contracts for information technology commodities and contractual services. “Information technology” is defined in section 287.012(15), F.S., to have the same meaning as provided in section 282.0041, F.S.
Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.
Accessibility of Information Technology Contractor represents and warrants that any software/ hardware/ communications system/ equipment (collectively “technology”), if any, provided under this Agreement adheres to the standards and/or specifications as may be set forth in the Section 508 of the Rehabilitation Act of 1973 standards guide and is fully compliant with WCAG 2.0 AA standards for accessibility and compliant with any applicable FCC regulations. Technology that will be used on a mobile device must also be navigable with Voiceover on iOS devices in addition to meeting WCAG 2.0 level AA. If portions of the technology or user experience are alleged to be non-compliant or non- accessible at any point, District will provide Contractor with notice of such allegation and Contractor shall use its best efforts to make the technology compliant and accessible. If a state or federal department, office or regulatory agency, or if any other third party administrative agency or organization (“Claimants”), make a claim, allegation, initiates legal or regulatory process, or if a court finds or otherwise determines that technology is non-compliant or non-accessible, Contractor shall indemnify, defend and hold harmless the District from and against any and all such claims, allegations, liabilities, damages, penalties, fees, costs (including but not limited to reasonable attorneys’ fees), arising out of or related to Xxxxxxxxx’ claims. Contractor shall also fully indemnify District for the full cost of any user accommodation that is found to be necessary due to an identifiable lack of accessibility in the Contractor’s technology. If necessary, an independent 3rd party accessibility firm using POUR standards (Perceivable, Operable, Understandable and Robust) may be used to validate the accessibility of the technology.
Data Security Requirements Without limiting Contractor’s obligation of confidentiality as further described in this Contract, Contractor must establish, maintain, and enforce a data privacy program and an information and cyber security program, including safety, physical, and technical security and resiliency policies and procedures, that comply with the requirements set forth in this Contract and, to the extent such programs are consistent with and not less protective than the requirements set forth in this Contract and are at least equal to applicable best industry practices and standards (NIST 800-53).
Information/Cooperation Executive shall, upon reasonable notice, furnish such information and assistance to the Bank as may be reasonably required by the Bank, in connection with any litigation in which it or any of its subsidiaries or affiliates is, or may become, a party; provided, however, that Executive shall not be required to provide information or assistance with respect to any litigation between Executive and the Bank or any other subsidiaries or affiliates.
Information Regarding Collateral (a) Level 3 and the Borrower will furnish to the Collateral Agent prompt written notice of any change (i) in any Loan Party’s corporate name or in any trade name used to identify it in the conduct of its business or in the ownership of its properties, (ii) in any Loan Party’s identity or corporate structure or (iii) in any Loan Party’s Federal Taxpayer Identification Number. Each of Level 3 and the Borrower agrees not to effect or permit any change referred to in the preceding sentence unless all filings (or arrangements therefor satisfactory to the Collateral Agent) have been made under the Uniform Commercial Code or otherwise that are required in order for the Collateral Agent to continue at all times following such change to have a valid, legal and perfected security interest in all the Collateral. Each of Level 3 and the Borrower also agrees promptly to notify the Collateral Agent if any material portion of the Collateral is damaged or destroyed. (b) Each year, at the time of delivery of the certificate pursuant to paragraph (c) of Section 5.01, Level 3 shall deliver to the Collateral Agent certificates of an authorized officer of Level 3 (i) setting forth the information required pursuant to (A) the Annual Perfection Certificate and (B) until such time as the Collateral Permit Condition is satisfied with respect to Level 3 LLC, the Annual Loan Proceeds Note Perfection Certificate, or confirming that there has been no change in such information since the dates of the Effective Date Perfection Certificate or the Effective Date Loan Proceeds Note Perfection Certificate, as the case may be, or the date of the most recent certificates delivered pursuant to this Section and (ii) certifying that all Uniform Commercial Code financing statements (excluding fixture filings) or other appropriate filings, recordings or registrations, including all refilings, rerecordings and reregistrations, containing a description of the Collateral required to be set forth therein have been filed of record in each United States governmental, municipal or other appropriate office in each jurisdiction identified pursuant to clause (i) above to the extent necessary to perfect and continue the perfection of the security interests under the applicable Security Documents for a period of not less than 18 months after the date of such certificate (except as noted therein with respect to any continuation statements to be filed within such period).
Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.
New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.
Security Requirements 7.1 The Authority will review the Contractor’s Security Plan when submitted by the Contractor in accordance with the Schedule (Security Requirements and Plan) and at least annually thereafter.
Sales Material, Information and Trademarks 6.1 For purposes of this Section 6, “Sales literature or other Promotional material” includes, but is not limited to, portions of the following that use any logo or other trademark related to the Trust, or Underwriter or its affiliates, or refer to the Trust: advertisements (such as material published or designed for use in a newspaper, magazine or other periodical, radio, television, telephone or tape recording, videotape display, signs or billboards, motion pictures, electronic communication or other public media), sales literature (i.e., any written communication distributed or made generally available to customers or the public, including brochures, circulars, research reports, market letters, form letters, seminar texts, reprints or excerpts or any other advertisement, sales literature or published article or electronic communication), educational or training materials or other communications distributed or made generally available to some or all agents or employees in any media, and disclosure documents, shareholder reports and proxy materials. 6.2 You shall furnish, or cause to be furnished to us or our designee, at least one complete copy of each registration statement, prospectus, statement of additional information, private placement memorandum, retirement plan disclosure information or other disclosure documents or similar information, as applicable (collectively “Disclosure Documents”), as well as any report, solicitation for voting instructions, Sales literature or other Promotional materials, and all amendments to any of the above that relate to the Contracts or the Accounts prior to its first use. You shall furnish, or shall cause to be furnished, to us or our designee each piece of Sales literature or other Promotional material in which the Trust or an Adviser is named, at least fifteen (15) Business Days prior to its proposed use. No such material shall be used unless we or our designee approve such material and its proposed use. 6.3 You and your agents shall not give any information or make any representations or statements on behalf of the Trust or concerning the Trust, the Underwriter or an Adviser, other than information or representations contained in and accurately derived from the registration statement or prospectus for the Trust shares (as such registration statement and prospectus may be amended or supplemented from time to time), annual and semi-annual reports of the Trust, Trust-sponsored proxy statements, or in Sales literature or other Promotional material approved by the Trust or its designee, except as required by legal process or regulatory authorities or with the written permission of the Trust or its designee. You shall send us a complete copy of each Disclosure Document and item of Sales literature or other Promotional materials in its final form within twenty (20) days of its first use. 6.4 We shall not give any information or make any representations or statements on behalf of you or concerning you, the Accounts or the Contracts other than information or representations, including naming you as a Trust shareholder, contained in and accurately derived from Disclosure Documents for the Contracts (as such Disclosure Documents may be amended or supplemented from time to time), or in materials approved by you for distribution, including Sales literature or other Promotional materials, except as required by legal process or regulatory authorities or with your written permission. 6.5 Except as provided in Section 6.2, you shall not use any designation comprised in whole or part of the names or marks “Franklin” or “Xxxxxxxxx” or any logo or other trademark relating to the Trust or the Underwriter without prior written consent, and upon termination of this Agreement for any reason, you shall cease all use of any such name or xxxx as soon as reasonably practicable. 6.6 You shall furnish to us ten (10) Business Days prior to its first submission to the SEC or its staff, any request or filing for no-action assurance or exemptive relief naming, pertaining to, or affecting, the Trust, the Underwriter or any of the Portfolios. 6.7 You agree that any posting of Portfolio prospectuses on your website will result in the Portfolio prospectuses: (i) appearing identical to the hard copy printed version or .pdf format file provided to you by us (except that you may reformat .pdf format prospectus files in order to delete blank pages and to insert .pdf format prospectus supplement files provided by us to you); (ii) being clearly associated with the particular Contracts in which they are available and posted in close proximity to the applicable Contract prospectuses; (iii) having no less prominence than prospectuses of any other underlying funds available under the Contracts; and (iv) being used in an authorized manner. Notwithstanding the above, you understand and agree that you are responsible for ensuring that participation in the Portfolios, and any website posting, or other use, of the Portfolio prospectuses is in compliance with this Agreement and applicable state and federal securities and insurance laws and regulations, including as they relate to paper or electronic use of fund prospectuses. The format of such presentation, the script and layout for any website that mentions the Trust, the Underwriter, an Adviser or the Portfolios shall be routed to us as sales literature or other promotional materials, pursuant to Section 6 of this Agreement. In addition, you agree to be solely responsible for maintaining and updating the Portfolio prospectuses’ PDF files (including prospectus supplements) and removing and/or replacing promptly any outdated prospectuses, as necessary, ensuring that any accompanying instructions by us, for using or stopping use are followed. You agree to designate and make available to us a person to act as a single point of communication contact for these purposes. We are not responsible for any additional costs or additional liabilities that may be incurred as a result of your election to place the Portfolio prospectuses on your website. We reserve the right to revoke this authorization, at any time and for any reason, although we may instead make our authorization subject to new procedures. 6.8 Each of your and your distributor’s registered representatives, agents, independent contractors and employees, as applicable, will have access to our websites at xxxxxxxxxxxxxxxxx.xxx, and such other URLs through which we may permit you to conduct business concerning the Portfolios from time to time (referred to collectively as the “Site”) as provided herein: (i) upon registration by such individual on a Site, (ii) if you cause a Site Access Request Form (an “Access Form”) to be signed by your authorized supervisory personnel and submitted to us, as a Schedule to, and legally a part of, this Agreement, or (iii) if you provide such individual with the necessary access codes or other information necessary to access the Site through any generic or firm-wide authorization we may grant you from time to time. Upon receipt by us of a completed registration submitted by an individual through the Site or a signed Access Form referencing such individual, we shall be entitled to rely upon the representations contained therein as if you had made them directly hereunder and we will issue a user identification, express number and/or password (collectively, “Access Code”). Any person to whom we issue an Access Code or to whom you provide the necessary Access Codes or other information necessary to access the Site through any generic or firm-wide authorization we may grant you from time to time shall be an “Authorized User.” We shall be entitled to assume that such person validly represents you and that all instructions received from such person are authorized, in which case such person will have access to the Site, including all services and information to which you are authorized to access on the Site. All inquiries and actions initiated by you (including your Authorized Users) are your responsibility, are at your risk and are subject to our review and approval (which could cause a delay in processing). You agree that we do not have a duty to question information or instructions you (including Authorized Users) give to us under this Agreement, and that we are entitled to treat as authorized, and act upon, any such instructions and information you submit to us. You agree to take all reasonable measures to prevent any individual other than an Authorized User from obtaining access to the Site. You agree to inform us if you wish to restrict or revoke the access of any individual Access Code. If you become aware of any loss or theft or unauthorized use of any Access Code, you agree to contact us immediately. You also agree to monitor your (including Authorized Users’) use of the Site to ensure the terms of this Agreement are followed. You also agree that you will comply with all policies and agreements concerning Site usage, including without limitation the Terms of Use Agreement(s) posted on the Site (“Site Terms”), as may be revised and reposted on the Site from time to time, and those Site Terms (as in effect from time to time) are a part of this Agreement. Your duties under this section are considered “services” required under the terms of this Agreement. You acknowledge that the Site is transmitted over the Internet on a reasonable efforts basis and we do not warrant or guarantee their accuracy, timeliness, completeness, reliability or non-infringement. Moreover, you acknowledge that the Site is provided for informational purposes only, and is not intended to comply with any requirements established by any regulatory or governmental agency.