Maintenance of the Security of District Information Sample Clauses

Maintenance of the Security of District Information. Contractor shall develop, implement, maintain and use appropriate administrative, technical and physical security measures to preserve the confidentiality, integrity and availability of all maintained or transmitted District Information received from, or on behalf of, District or its students. These measures will be extended by contract to all subcontractors used by Contractor.
AutoNDA by SimpleDocs
Maintenance of the Security of District Information. FOUNDATION shall develop, implement, maintain and use appropriate administrative, technical and physical security measures to preserve the confidentiality, integrity, and availability of all maintained or transmitted DISTRICT Information received from, or on behalf of, DISTRICT or its students. These measures will be extended by contract to all subcontractors used by FOUNDATION.

Related to Maintenance of the Security of District Information

  • Security of State Information The Contractor represents and warrants that it has implemented and it shall maintain during the term of this Contract the highest industry standard administrative, technical, and physical safeguards and controls consistent with NIST Special Publication 800-53 (version 3 or higher) and Federal Information Processing Standards Publication 200 and designed to (i) ensure the security and confidentiality of State Data; (ii) protect against any anticipated security threats or hazards to the security or integrity of the State Data; and (iii) protect against unauthorized access to or use of State Data. Such measures shall include at a minimum: (1) access controls on information systems, including controls to authenticate and permit access to State Data only to authorized individuals and controls to prevent the Contractor employees from providing State Data to unauthorized individuals who may seek to obtain this information (whether through fraudulent means or otherwise); (2) industry-standard firewall protection; (3) encryption of electronic State Data while in transit from the Contractor networks to external networks; (4) measures to store in a secure fashion all State Data which shall include multiple levels of authentication; (5) dual control procedures, segregation of duties, and pre-employment criminal background checks for employees with responsibilities for or access to State Data; (6) measures to ensure that the State Data shall not be altered or corrupted without the prior written consent of the State; (7) measures to protect against destruction, loss or damage of State Data due to potential environmental hazards, such as fire and water damage; (8) staff training to implement the information security measures; and (9) monitoring of the security of any portions of the Contractor systems that are used in the provision of the services against intrusion on a twenty-four (24) hour a day basis.

  • Security of Data a. Each of the parties shall: i. ensure as far as reasonably practicable, that Data is properly stored, is not accessible to unauthorised persons, is not altered, lost or destroyed and is capable of being retrieved only by properly authorised persons; ii. subject to the provisions of Sub-Clause 8.a. ensure that, in addition to any security, proprietary and other information disclosure provision contained in the Contract, Messages and Associated Data are maintained in confidence, are not disclosed or transmitted to any unauthorised person and are not used for any purpose other than that communicated by the sending party or permitted by the Contract; and iii. protect further transmission to the same degree as the originally transmitted Message and Associated Data when further transmissions of Messages and Associated Data are permitted by the Contract or expressly authorised by the sending party. b. The sending party shall ensure that Messages are marked in accordance with the requirements of the Contract. If a further transmission is made pursuant to Sub-Clause 3. a. iii. the sender shall ensure that such markings are repeated in the further transmission. c. The parties may apply special protection to Messages by encryption or by other agreed means, and may apply designations to the Messages for protective Interchange, handling and storage procedures. Unless the parties otherwise agree, the party receiving a Message so protected or designated shall use at least the same level of protection and protective procedures for any further transmission of the Message and its Associated Data for all responses to the Message and for all other communications by Interchange or otherwise to any other person relating to the Message. d. If either party becomes aware of a security breach or breach of confidence in relation to any Message or in relation to its procedures or systems (including, without limitation, unauthorised access to their systems for generation, authentication, authorisation, processing, transmission, storage, protection and file management of Messages) then it shall immediately inform the other party of such breach. On being informed or becoming aware of a breach the party concerned shall: i. immediately investigate the cause, effect and extent of such breach; ii. report the results of the investigation to the other party; and iii. use all reasonable endeavours to rectify the cause of such breach. e. Each party shall ensure that the contents of Messages that are sent or received are not inconsistent with the law, the application of which could restrict the content of a Message or limit its use, and shall take all necessary measures to inform without delay the other party if such an inconsistency arises.

  • Security of processing (a) The data importer and, during transmission, also the data exporter shall implement appropriate technical and organisational measures to ensure the security of the data, including protection against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to that data (hereinafter ‘personal data breach’). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purpose(s) of processing and the risks involved in the processing for the data subjects. The Parties shall in particular consider having recourse to encryption or pseudonymisation, including during transmission, where the purpose of processing can be fulfilled in that manner. In case of pseudonymisation, the additional information for attributing the personal data to a specific data subject shall, where possible, remain under the exclusive control of the data exporter. In complying with its obligations under this paragraph, the data importer shall at least implement the technical and organisational measures specified in Annex II. The data importer shall carry out regular checks to ensure that these measures continue to provide an appropriate level of security. (b) The data importer shall grant access to the personal data to members of its personnel only to the extent strictly necessary for the implementation, management and monitoring of the contract. It shall ensure that persons authorised to process the personal data have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality. (c) In the event of a personal data breach concerning personal data processed by the data importer under these Clauses, the data importer shall take appropriate measures to address the breach, including measures to mitigate its adverse effects. The data importer shall also notify the data exporter without undue delay after having become aware of the breach. Such notification shall contain the details of a contact point where more information can be obtained, a description of the nature of the breach (including, where possible, categories and approximate number of data subjects and personal data records concerned), its likely consequences and the measures taken or proposed to address the breach including, where appropriate, measures to mitigate its possible adverse effects. Where, and in so far as, it is not possible to provide all information at the same time, the initial notification shall contain the information then available and further information shall, as it becomes available, subsequently be provided without undue delay. (d) The data importer shall cooperate with and assist the data exporter to enable the data exporter to comply with its obligations under Regulation (EU) 2016/679, in particular to notify the competent supervisory authority and the affected data subjects, taking into account the nature of processing and the information available to the data importer.

  • ACCESS TO SECURITY LOGS AND REPORTS Upon request, the Contractor shall provide access to security logs and reports to the State or Authorized User in a format as specified in the Authorized User Agreement.

  • Description of the Services 1.1 The scope of the service to be rendered is described more fully in the Annexures and Schedules referred to below: ❑ Annexure A – Scope / Specification ❑ Annexure C – Pricing Schedule The Deliverables, due for completion by and governed by this Schedule 1. In the event that the Service Provider fails to meet the delivery dates as agreed, the following penalties will be imposed:

  • Perfection and Protection of Security Interest (a) The Borrower shall, at its expense, perform all steps requested by the Agent at any time to perfect, maintain, protect, and enforce the Agent’s Liens, including: (i) executing, delivering and/or recording of filing financing or continuation statements, and amendments thereof, in form and substance reasonably satisfactory to the Agent; (ii) delivering to the Agent the originals of all instruments, documents, and chattel paper, and all other Collateral of which the Agent determines it should have physical possession in order to perfect and protect the Agent’s security interest therein, duly pledged, endorsed or assigned to the Agent without restriction; (iii) placing notations on the Borrower’s books of account to disclose the Agent’s security interest; and (iv) taking such other steps as are deemed necessary or desirable by the Agent to maintain and protect the Agent’s Liens. To the extent permitted by applicable law, the Agent may file, without the Borrower’s signature, one or more financing statements disclosing the Agent’s Liens. The Borrower agrees that a carbon, photographic, photostatic, or other reproduction of this Agreement or of a financing statement is sufficient as a financing statement. (b) If any Collateral is at any time in the possession or control of any warehouseman, bailee or any of the Borrower’s agents or processors, then the Borrower shall notify the Agent thereof and shall, at the request of Agent, notify such Person of the Agent’s security interest in such Collateral and instruct such Person to hold all such Collateral for the Agent’s account subject to the Agent’s instructions. If at any time any Collateral is located in any operating facility of the Borrower not owned by the Borrower, then the Borrower shall, at the request of the Agent, obtain written landlord lien waivers or subordinations, in form and substance reasonably satisfactory to the Agent, of all present and future Liens to which the owner or lessor of such premises may be entitled to assert against the Collateral. (c) From time to time, the Borrower shall, upon the Agent’s request, execute and deliver confirmatory written instruments pledging to the Agent, for the ratable benefit of the Agent and the Lenders, the Collateral with respect to the Borrower, but the Borrower’s failure to do so shall not affect or limit any security interest or any other rights of the Agent or any Lender in and to the Collateral with respect to the Borrower. So long as this Agreement is in effect and until all Obligations have been fully satisfied, the Agent’s Liens shall continue in full force and effect in all Collateral (whether or not deemed eligible for the purpose of calculating the Availability or as the basis for any advance, loan, extension of credit, or other financial accommodation). (d) Except with respect to Collateral delivered to the Agent pursuant to this Section 6.2, the Borrower shall immediately following the execution or receipt of a Contract, stamp on the Contract the following words: “This document is subject to a security interest in favor of Bank of America, N.A., as agent”.

  • LOCATION AND DESCRIPTION OF THE PROPERTY The subject property is a single-storey terraced house bearing the postal address of Xx. 00, Xxxxxx 00/XX0, Xxxxxx Xxxxx Xxxxxxx, 00000 Xxxxxxx Xxxxx, Xxxxxx. The subject property will be sold on an “as is where is basis” and subject to a reserve price of RM310,000.00 (RINGGIT MALAYSIA THREE HUNDRED TEN THOUSAND ONLY) and subject to the Conditions of Sale and by way of an Assignment from the above Assignee/Bank subject to the consent being obtained by the Purchaser from the Developer and other relevant authorities if any, including all terms, conditions, stipulations and covenants which were and may be imposed by the Developer and the relevant authorities. Any arrears of quit rent, assessments and service or maintenance charges which may be lawfully due to any relevant authority or the Developer up to the date of auction sale of the property shall be paid out of the purchase money upon receipt of full purchase price. All other fees, costs and charges relating to the transfer and assignment of the property shall be borne by the successful Purchaser. Online bidders are further subject to the Terms & Conditions on xxx.xxxxxxxxxxxxxxxx.xxx. All intending bidders are required to deposit 10% of the fixed reserve price for the said property by Bank Draft or Cashier’s Order in favour of UOBM for KRISHNAMAL A/P MURLIGIAH & XXXXXXXXXXX A/L XXXXXXX or remit the same through online banking transfer, one (1) working day before auction date. The balance of the purchase money shall be paid by the Purchaser within one hundred and twenty (120) days from the date of auction sale to UNITED OVERSEAS BANK (MALAYSIA) BHD via Real Time Electronics Transfer of Funds and Securities (XXXXXX). For online bidders please refer to the Terms & Conditions on xxx.xxxxxxxxxxxxxxxx.xxx on the manner of payment of the deposit. FOR FURTHER PARTICULARS, please contact M/S HOE & MOIRA, of Xxxxx 000X (Xxxxx), 0xx Xxxxx, Xxxxx Xxxxxx Xxxxxx, Xxxxxxxxxx Xxxx, 00000 Xxxxxx, Xxxxxxxx. (Ref:H&M/MT/Z4P/CB23/16) Tel.: 00-000 0000, Fax: 00-000 0000) the Assignee herein or the undermentioned Auctioneer. Suite C-20-3A, Level 20, Block C, Megan Avenue II, / XXXXX XXXXX BIN XXXXXX 00, Xxxxx Xxx Xxxx Xxxx, 50450 Kuala Lumpur (Licensed Auctioneers) Tel No.: 00-0000 0000 Fax No.: 00-0000 0000 Our Ref: LIAN/UOB1035HM Website: xxx.xxxxxxxxxxxxxxxx.xxx E-mail: xxxx@xxxxxxxxxxxxxxxx.xxx [berkuatkuasa dari 1.11.2022, perniagaan perbankan pengguna (consumer banking business) CITIBANK BERHAD (No. Syarikat: 199401011410 (297089-M) telah dipindahmilik kepada xxx diletakhakkan kepada UOB di bawah Perintah Letakhak bertarikh 12.10.2022 melalui Mahkamah Tinggi Kuala Lumpur Saman Pemula No. WA-24NCC-903-09/2022] Dalam menjalankan xxx xxx kuasa xxxx telah diberikan kepada Pihak Pemegang Serahhak/Bank dibawah Perjanjian Kemudahan, Penyerahanhak xxx Surat Kuasa Wakil kesemuanya Bertarikh 09hb Julai, 2001 diantara Pihak Penyerahhak, Pihak Pelanggan xxx Pihak Pemegang Serahhak/Bank yang diperbuat dalam perkara diatas, adalah dengan ini diisytiharkan bahawa Pihak Pemegang Serahhak/Bank tersebut dengan bantuan Pelelong yang tersebut dibawah.

  • COMPLIANCE WITH NEW YORK STATE INFORMATION SECURITY BREACH AND NOTIFICATION ACT Contractor shall comply with the provisions of the New York State Information Security Breach and Notification Act (General Business Law Section 899-aa; State Technology Law Section 208).

  • DESCRIPTION OF PROJECT For the Company to be eligible to earn the Maximum Credit Amount, the Company will satisfy its obligations as reflected in the following representations, which the IEDC has relied upon: A. The Company will complete the Project at the Project Location. B. The Company represents that the number of permanent, Full-Time Employees (as defined in Indiana Code § 6–3.1–13–4) from whom Indiana state income tax withholdings are retained by the State of Indiana, employed as of the Commencement Date at the Project Location, is the Base Employment Number. C. The Project will result in the creation of New Employees (as defined in Indiana Code § 6- 3.1-13-6) at the Project Location of at least the Additional Jobs Commitment. D. The average of the hourly wages, before benefits, paid to New Employees at the Project Location, will at least equal the Average Wage Commitment. E. At the discretion of the IEDC, New Employees that are paid an average wage of less than the Minimum Wage Commitment may be excluded for the purpose of calculating the credit amount. F. The Project is anticipated to involve at least the Capital Investment Amount.

  • Description of Projects Services a. Project/Services to be performed by A-E shall consist of the work as specified herein and as required in Attachment A. If in the event Attachment A shall be in conflict with any provision of this Contract, the wording as set forth in Attachment A shall prevail. b. A-E shall be responsible for submitting all Projects/Services to County in a form which has been thoroughly reviewed and checked for completeness, accuracy and consistency by the registered professional named in Section 1.1.2 herein; and, any Projects/Services not meeting this requirement will be returned to A-E prior to review by County.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!