Internal Security; Risk Assessment Sample Clauses

Internal Security; Risk Assessment. You understand the importance of your role in preventing misuse of your Accounts. You agree to establish, maintain and update commercially reasonable policies, procedures, equipment and software (“Internal Security Controls”) that will safeguard the security and integrity of your computer and other equipment used to initiate payment orders and account information from unauthorized use, intrusion, takeover or theft, and prevent your Wire Authorization Codes from unauthorized discovery or use. You bear all risk of fraudulent transfers and other losses arising from your internal security breaches, external security breaches of your equipment, networks, systems, or other information, or from the interception of your communications prior to their receipt by us. You are encouraged to consider purchasing insurance to cover any internal security losses. You agree to periodically (but no less than once annually) perform a risk assessment and evaluation of your Internal Security Controls and these Security Procedures. You agree to consider the size, type, and frequency of wire transfer requests you intend to make. You will consider the risks presented by the possibility of unauthorized access to the Wire Transfer Services and your obligation on wire transfer requests, including those that areunauthorized. After your review, you will notify us if your use of the Wire Transfer Service would necessitate or be better served by a level of security that exceeds that previously selected by you or offered by the Wire Transfer Service. If you fail to notify us, you acknowledge and agree that the security aspects of the Wire Transfer Service are appropriate for your needs and will provide you with a commercially reasonable degree of security against unauthorized use. You agree to provide us with the results of your internal security assessments upon our reasonablerequest.
AutoNDA by SimpleDocs

Related to Internal Security; Risk Assessment

  • Risk Assessment An assessment of any risks inherent in the work requirements and actions to mitigate these risks.

  • Periodic Risk Assessment Provider further acknowledges and agrees to conduct periodic risk assessments and remediate any identified security and privacy vulnerabilities in a timely manner.

  • Risk Assessments a. Risk Assessment - Transfer Agent shall, at least annually, perform risk assessments that are designed to identify material threats (both internal and external) against Fund Data, the likelihood of those threats occurring and the impact of those threats upon the Transfer Agent organization to evaluate and analyze the appropriate level of information security safeguards (“Risk Assessments”).

  • Impact Assessment If Service Provider desires to make any change, upgrade, replacement or addition that may have an adverse impact or require changes as described in Section 9.6(c) or increase the risk of Service Provider not being able to provide the Services in accordance with this Agreement or violate or be inconsistent with DIR Standards or Strategic Plans, then Service Provider shall prepare a written risk assessment and mitigation plan (1) describing in detail the nature and extent of such adverse impact or risk, (2) describing any benefits, savings or risks to DIR or the DIR Customers associated with such change, and (3) proposing strategies to mitigate any adverse risks or impacts associated with such change and, after consultation and agreement with DIR, implement the plan.

  • Additional security requirements The following provisions apply in respect of any Additional Security provided:

  • Needs Assessment 1. The Contractor shall conduct a cultural and linguistic group-needs assessment of the eligible client population in the Contractor’s service area to assess the language needs of the population and determine what reasonable steps are necessary to ensure meaningful access to services and activities to eligible individuals. [22 CCR 98310, 98314] The group-needs assessment shall take into account the following four (4) factors:

  • Security Assessment If Accenture reasonably determines, or in good faith believes, that Supplier’s security practices or procedures do not meet Supplier’s obligations under the Agreement, then Accenture will notify Supplier of the deficiencies. Supplier will without unreasonable delay: (i) correct such deficiencies at its own expense; (ii) permit Accenture, or its duly authorized representatives, to assess Supplier’s security-related activities that are relevant to the Agreement; and (iii) timely complete a security questionnaire from Accenture on a periodic basis upon Accenture’s request. Security issues identified by Accenture will be assigned risk ratings and an agreed-to timeframe to remediate. Supplier will remediate all the security issues identified within the agreed to timeframes. Upon Supplier’s failure to remediate any high or medium rated security issues within the stated timeframes, Accenture may terminate the Agreement in accordance with Section 8 above.

  • Federal Medicaid System Security Requirements Compliance Party shall provide a security plan, risk assessment, and security controls review document within three months of the start date of this Agreement (and update it annually thereafter) in order to support audit compliance with 45 CFR 95.621 subpart F, ADP System Security Requirements and Review Process.

  • System Security Review All systems processing and/or storing DHCS PHI or PI must have at least an annual system risk assessment/security review which provides assurance that administrative, physical, and technical controls are functioning effectively and providing adequate levels of protection. Reviews should include vulnerability scanning tools.

  • Loss Assessment We will pay up to $1000 for your share of loss assessment charged during the policy period against you by a corporation or as- sociation of property owners, when the assess- ment is made as a result of:

Time is Money Join Law Insider Premium to draft better contracts faster.