INFORMATION TECHNOLOGY SYSTEMS SECURITY SPECIFICATIONS Sample Clauses

INFORMATION TECHNOLOGY SYSTEMS SECURITY SPECIFICATIONS. The Contractor agrees to comply with the Information Technology system security and/or privacy specifications set forth in the Statement of Work, the Computer Security Act of 1987 Office of Management and Budget (0MB) Circular A-130, Appendix III, "Security of Federal Automated Information Systems," and the DHHS Automated Information Systems Security Program Handbook (Release 2.0, dated May 1994). The Contractor further agrees to include this provision in any subcontract awarded pursuant to this prime contract. NOTE: OMB A-130 is accessible via web site: xxxx://xxxx.xxxx.xxxx.xxx/secplcy/al30app3.txt DHHS Automated Information Systems Security Program Handbook is accessible via web site: xxxx://xxx.xxx.xxx.xxx/policy/aissp.html
AutoNDA by SimpleDocs

Related to INFORMATION TECHNOLOGY SYSTEMS SECURITY SPECIFICATIONS

  • Information Technology The Company’s and the Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) operate and perform in all material respects as required in connection with the operation of the business of the Company and the Subsidiaries as currently conducted. The Company, and the Subsidiaries maintain commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”) processed and stored thereon, and to the knowledge of the Company, there have been no breaches, incidents, violations, outages, compromises or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same. The Company and the Subsidiaries are presently in compliance in all material respects with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for any such noncompliance that would not have a Material Adverse Effect.

  • Information Systems Acquisition Development and Maintenance a. Client Data – Client Data will only be used by State Street for the purposes specified in this Agreement.

  • Intellectual Property and Information Technology (a) Section 5.20(a) of the Company Disclosure Schedule contains a true and complete list, as of the date of this Agreement, of all Company Products.

  • Information Systems (a) The MA Organization must:

  • Security and Safeguarding Information (a) Confidential Information that contains Non-Public Personal Information about customers is subject to the protections created by the Xxxxx-Xxxxx-Xxxxxx Act of 1999 (the “Act”) and under the standards for safeguarding Confidential Information, 16 CFR Part 314 (2002) adopted by Federal Trade Commission (“FTC”) (the “Safeguards Rule”). Additionally, state specific laws may regulate how certain confidential or personal information is safeguarded. The parties agree with respect to the Non-Public Personal Information to take all appropriate measures in accordance with the Act, and any state specific laws, as are necessary to protect the security of the Non-Public Personal Information and to specifically assure there is no disclosure of the Non-Public Personal Information other than as authorized under the Act, and any state specific laws, and this Agreement. With respect to Confidential Information, including Non-Public Personal Information and Personally Identifiable Financial Information as applicable, each of the parties agrees that:

  • Information Services The Custodian may rely upon information received from issuers of Securities or agents of such issuers, information received from Subcustodians or depositories, information from data reporting services that provide detail on corporate actions and other securities information, and other commercially reasonable industry sources; and, provided the Custodian has acted in accordance with the standard of care set forth in Section 6 (a), the Custodian shall have no liability as a result of relying upon such information sources, including but not limited to errors in any such information.

  • Technical Information Methods, processes, formulae, compositions, systems, techniques, inventions, machines, computer programs and research projects, unpatented inventions, designs, know-how, trade secrets, technical information and data, specifications, blueprints, transparencies, test data, and additions, modifications, and improvements thereon which are revealed to Employee.

  • Sales Material, Information and Trademarks 6.1 For purposes of this Section 6, "Sales literature or other Promotional material" includes, but is not limited to, portions of the following that use any logo or other trademark related to the Trust, or Underwriter or its affiliates, or refer to the Trust: advertisements (such as material published or designed for use in a newspaper, magazine or other periodical, radio, television, telephone or tape recording, videotape display, signs or billboards, motion pictures, electronic communication or other public media), sales literature (i.e., any written communication distributed or made generally available to customers or the public, including brochures, circulars, research reports, market letters, form letters, seminar texts, reprints or excerpts or any other advertisement, sales literature or published article or electronic communication), educational or training materials or other communications distributed or made generally available to some or all agents or employees in any media, and disclosure documents, shareholder reports and proxy materials.

  • USE OF THIRD PARTY SYSTEMS-LEVEL SOFTWARE State Street and the Fund acknowledge that in connection with the Data Access Services provided under this Addendum, the Fund will have access, through the Data Access Services, to Fund Data and to functions of State Street’s proprietary systems; provided, however that in no event will the Fund have direct access to any third party systems-level software that retrieves data for, stores data from, or otherwise supports the System.

  • Information/Cooperation Executive shall, upon reasonable notice, furnish such information and assistance to the Bank as may be reasonably required by the Bank, in connection with any litigation in which it or any of its subsidiaries or affiliates is, or may become, a party; provided, however, that Executive shall not be required to provide information or assistance with respect to any litigation between Executive and the Bank or any other subsidiaries or affiliates.

Time is Money Join Law Insider Premium to draft better contracts faster.