Management of Information Security Incidents and Improvements Sample Clauses

Management of Information Security Incidents and Improvements. 1. NautaDutilh has responsibilities and procedures in place for efficiently managing Information Security incidents and weaknesses.
AutoNDA by SimpleDocs
Management of Information Security Incidents and Improvements 

Related to Management of Information Security Incidents and Improvements

  • Contractor Information The Contractor will provide up to date information for each of the following in the form and manner specified by OGS:

  • Other Information and Inspections In each case subject to the last sentence of this Section 6.3, each Restricted Person will furnish to each Lender any information which Administrative Agent or any Lender may from time to time request concerning any covenant, provision or condition of the Loan Documents or any matter in connection with Restricted Persons' businesses and operations. In each case subject to the last sentence of this Section 6.3, each Restricted Person will permit representatives appointed by Administrative Agent (including independent accountants, auditors, agents, attorneys, appraisers and any other Persons) to visit and inspect during normal business hours any of such Restricted Person's property, including its books of account, other books and records, and any facilities or other business assets, and to make extra copies therefrom and photocopies and photographs thereof, and to write down and record any information such representatives obtain, and each Restricted Person shall permit Administrative Agent or its representatives to investigate and verify the accuracy of the information furnished to Administrative Agent or any Lender in connection with the Loan Documents and to discuss all such matters with its officers, employees and, upon prior notice to Borrower, its representatives. Each of the foregoing inspections shall be made subject to compliance with applicable safety standards and the same conditions applicable to any Restricted Person in respect of property of that Restricted Person on the premises of Persons other than a Restricted Person or an Affiliate of a Restricted Person, and all information, books and records furnished or requested to be furnished, or of which copies, photocopies or photographs are made or requested to be made, all information to be investigated or verified and all discussions conducted with any officer, employee or representative of any Restricted Person shall be subject to any applicable attorney-client privilege exceptions which the Restricted Person determines is reasonably necessary and compliance with conditions to disclosures under non-disclosure agreements between any Restricted Person and Persons other than a Restricted Person or an Affiliate of a Restricted Person and the express undertaking of each Person acting at the direction of or on behalf of any Lender Party to be bound by the confidentiality provisions of Section 10.6 of this Agreement.

  • Furnishing of Information and Inspection of Receivables The Seller will furnish to the Administrator and each Purchaser Agent from time to time such information with respect to the Pool Receivables as the Administrator or such Purchaser Agent may reasonably request. The Seller will, at the Seller’s expense, at any time during regular business hours with prior written notice (i) permit the Administrator or any Purchaser Agent, or their respective agents or representatives, (A) to examine and make copies of and abstracts from all books and records relating to the Pool Receivables or other Pool Assets and (B) to visit the offices and properties of the Seller for the purpose of examining such books and records, and to discuss matters relating to the Pool Receivables, other Pool Assets or the Seller’s performance hereunder or under the other Transaction Documents to which it is a party with any of the officers, directors, employees or independent public accountants of the Seller (provided that representatives of the Seller are present during such discussions) having knowledge of such matters; provided, that so long as no Termination Event has occurred and is continuing such examinations and visits shall not exceed one (1) per year and (ii) without limiting the provisions of clause (i) above, from time to time during regular business hours, at the Seller’s expense, upon reasonable prior written notice from the Administrator and the Purchaser Agents, permit certified public accountants or other auditors acceptable to the Administrator to conduct a review of its books and records with respect to the Pool Receivables; provided, that so long as no Termination Event has occurred and is continuing, the Seller shall be required to reimburse the Administrator and Purchaser Agents for only one (1) such audit per year. For the avoidance of doubt, the Administrator may require examinations and audits in addition to the examinations and audits specified in clause (i) and clause (ii) above, but the expense of any such additional examination or audit shall be borne by the Administrator and not the Seller.

  • Inspection of Property; Books and Records; Discussions Keep proper books of records and account in which full, true and correct entries in conformity with GAAP and all Requirements of Law shall be made of all dealings and transactions in relation to its business and activities; and permit representatives of any Lender (upon reasonable advance notice coordinated through the Administrative Agent) to visit and inspect any of its properties and examine and make abstracts from any of its books and records at any reasonable time and as often as may reasonably be desired and to discuss the business, operations, properties and financial and other condition of the Borrower and its Subsidiaries with officers and employees of the Borrower and its Subsidiaries and with its independent certified public accountants.

  • Security of Information Unless otherwise specifically authorized by the DOH Chief Information Security Officer, Contractor receiving confidential information under this contract assures that: • Encryption is selected and applied using industry standard algorithms validated by the National Institute of Standards and Technology (NIST) Cryptographic Algorithm Validation Program against all information stored locally and off-site. Information must be encrypted both in-transit and at rest and applied in such a way that it renders data unusable to anyone but authorized personnel, and the confidential process, encryption key or other means to decipher the information is protected from unauthorized access. • It is compliant with the applicable provisions of the Washington State Office of the Chief Information Officer (OCIO) policy 141, Securing Information Technology Assets, available at: xxxxx://xxxx.xx.xxx/policy/securing-information-technology-assets. • It will provide DOH copies of its IT security policies, practices and procedures upon the request of the DOH Chief Information Security Officer. • DOH may at any time conduct an audit of the Contractor’s security practices and/or infrastructure to assure compliance with the security requirements of this contract. • It has implemented physical, electronic and administrative safeguards that are consistent with OCIO security standard 141.10 and ISB IT guidelines to prevent unauthorized access, use, modification or disclosure of DOH Confidential Information in any form. This includes, but is not limited to, restricting access to specifically authorized individuals and services through the use of: o Documented access authorization and change control procedures; o Card key systems that restrict, monitor and log access; o Locked racks for the storage of servers that contain Confidential Information or use AES encryption (key lengths of 256 bits or greater) to protect confidential data at rest, standard algorithms validated by the National Institute of Standards and Technology (NIST) Cryptographic Algorithm Validation Program (CMVP); o Documented patch management practices that assure all network systems are running critical security updates within 6 days of release when the exploit is in the wild, and within 30 days of release for all others; o Documented anti-virus strategies that assure all systems are running the most current anti-virus signatures within 1 day of release; o Complex passwords that are systematically enforced and password expiration not to exceed 120 days, dependent user authentication types as defined in OCIO security standards; o Strong multi-factor authentication mechanisms that assure the identity of individuals who access Confidential Information; o Account lock-out after 5 failed authentication attempts for a minimum of 15 minutes, or for Confidential Information, until administrator reset; o AES encryption (using key lengths 128 bits or greater) session for all data transmissions, standard algorithms validated by NIST CMVP; o Firewall rules and network address translation that isolate database servers from web servers and public networks; o Regular review of firewall rules and configurations to assure compliance with authorization and change control procedures; o Log management and intrusion detection/prevention systems; o A documented and tested incident response plan Any breach of this clause may result in termination of the contract and the demand for return of all personal information.

  • Accessibility of Information Technology Contractor represents and warrants that any software/ hardware/ communications system/ equipment (collectively “technology”), if any, provided under this Agreement adheres to the standards and/or specifications as may be set forth in the Section 508 of the Rehabilitation Act of 1973 standards guide and is fully compliant with WCAG 2.0 AA standards for accessibility and compliant with any applicable FCC regulations. Technology that will be used on a mobile device must also be navigable with Voiceover on iOS devices in addition to meeting WCAG 2.0 level AA. If portions of the technology or user experience are alleged to be non-compliant or non- accessible at any point, District will provide Contractor with notice of such allegation and Contractor shall use its best efforts to make the technology compliant and accessible. If a state or federal department, office or regulatory agency, or if any other third party administrative agency or organization (“Claimants”), make a claim, allegation, initiates legal or regulatory process, or if a court finds or otherwise determines that technology is non-compliant or non-accessible, Contractor shall indemnify, defend and hold harmless the District from and against any and all such claims, allegations, liabilities, damages, penalties, fees, costs (including but not limited to reasonable attorneys’ fees), arising out of or related to Xxxxxxxxx’ claims. Contractor shall also fully indemnify District for the full cost of any user accommodation that is found to be necessary due to an identifiable lack of accessibility in the Contractor’s technology. If necessary, an independent 3rd party accessibility firm using POUR standards (Perceivable, Operable, Understandable and Robust) may be used to validate the accessibility of the technology.

  • Information and Inspection Rights The Company shall permit, and shall cause each of its Subsidiaries to permit, the Purchaser, its representatives or any independent auditor or legal counsel appointed by the Purchaser, during normal business hours following reasonable notice by the Purchaser to the Company, to (i) visit and inspect any of the properties of the Company or any of its Subsidiaries, (ii) examine the books of account and records of the Company or any of its Subsidiaries, and (iii) discuss the affairs, finances and accounts of the Company or any of its Subsidiaries with the directors, officers, and management employees of the Company or any of its Subsidiaries.

  • Information and Inspection Pledgor shall (i) promptly furnish Bank any information with respect to the Collateral requested by Bank; (ii) allow Bank or its representatives to inspect and copy, or furnish Bank or its representatives with copies of, all records relating to the Collateral and the Obligation; and (iii) promptly furnish Bank or its representatives with any other information Bank may reasonably request.

  • Due Diligence Review; Information The Company shall make available, during normal business hours, for inspection and review by the Investors, advisors to and representatives of the Investors (who may or may not be affiliated with the Investors and who are reasonably acceptable to the Company), all financial and other records, all SEC Filings (as defined in the Purchase Agreement) and other filings with the SEC, and all other corporate documents and properties of the Company as may be reasonably necessary for the purpose of such review, and cause the Company’s officers, directors and employees, within a reasonable time period, to supply all such information reasonably requested by the Investors or any such representative, advisor or underwriter in connection with such Registration Statement (including, without limitation, in response to all questions and other inquiries reasonably made or submitted by any of them), prior to and from time to time after the filing and effectiveness of the Registration Statement for the sole purpose of enabling the Investors and such representatives, advisors and underwriters and their respective accountants and attorneys to conduct initial and ongoing due diligence with respect to the Company and the accuracy of such Registration Statement. The Company shall not disclose material nonpublic information to the Investors, or to advisors to or representatives of the Investors, unless prior to disclosure of such information the Company identifies such information as being material nonpublic information and provides the Investors, such advisors and representatives with the opportunity to accept or refuse to accept such material nonpublic information for review and any Investor wishing to obtain such information enters into an appropriate confidentiality agreement with the Company with respect thereto.

  • OBLIGATIONS AND ACTIVITIES OF CONTRACTOR AS BUSINESS ASSOCIATE 1. CONTRACTOR agrees not to use or further disclose PHI COUNTY discloses to CONTRACTOR other than as permitted or required by this Business Associate Contract or as required by law. 2. XXXXXXXXXX agrees to use appropriate safeguards, as provided for in this Business Associate Contract and the Agreement, to prevent use or disclosure of PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY other than as provided for by this Business Associate Contract. 3. XXXXXXXXXX agrees to comply with the HIPAA Security Rule at Subpart C of 45 CFR Part 164 with respect to electronic PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY. 4. CONTRACTOR agrees to mitigate, to the extent practicable, any harmful effect that is known to CONTRACTOR of a Use or Disclosure of PHI by CONTRACTOR in violation of the requirements of this Business Associate Contract. 5. XXXXXXXXXX agrees to report to COUNTY immediately any Use or Disclosure of PHI not provided for by this Business Associate Contract of which CONTRACTOR becomes aware. CONTRACTOR must report Breaches of Unsecured PHI in accordance with Paragraph E below and as required by 45 CFR § 164.410. 6. CONTRACTOR agrees to ensure that any Subcontractors that create, receive, maintain, or transmit PHI on behalf of CONTRACTOR agree to the same restrictions and conditions that apply through this Business Associate Contract to CONTRACTOR with respect to such information. 7. CONTRACTOR agrees to provide access, within fifteen (15) calendar days of receipt of a written request by COUNTY, to PHI in a Designated Record Set, to COUNTY or, as directed by COUNTY, to an Individual in order to meet the requirements under 45 CFR § 164.524. If CONTRACTOR maintains an Electronic Health Record with PHI, and an individual requests a copy of such information in an electronic format, CONTRACTOR shall provide such information in an electronic format. 8. CONTRACTOR agrees to make any amendment(s) to PHI in a Designated Record Set that COUNTY directs or agrees to pursuant to 45 CFR § 164.526 at the request of COUNTY or an Individual, within thirty (30) calendar days of receipt of said request by COUNTY. XXXXXXXXXX agrees to notify COUNTY in writing no later than ten (10) calendar days after said amendment is completed. 9. CONTRACTOR agrees to make internal practices, books, and records, including policies and procedures, relating to the use and disclosure of PHI received from, or created or received by CONTRACTOR on behalf of, COUNTY available to COUNTY and the Secretary in a time and manner as determined by COUNTY or as designated by the Secretary for purposes of the Secretary determining COUNTY’S compliance with the HIPAA Privacy Rule. 10. CONTRACTOR agrees to document any Disclosures of PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, and to make information related to such Disclosures available as would be required for COUNTY to respond to a request by an Individual for an accounting of Disclosures of PHI in accordance with 45 CFR § 164.528. 11. CONTRACTOR agrees to provide COUNTY or an Individual, as directed by COUNTY, in a time and manner to be determined by COUNTY, that information collected in accordance with the Agreement, in order to permit COUNTY to respond to a request by an Individual for an accounting of Disclosures of PHI in accordance with 45 CFR § 164.528. 12. XXXXXXXXXX agrees that to the extent CONTRACTOR carries out COUNTY’s obligation under the HIPAA Privacy and/or Security rules CONTRACTOR will comply with the requirements of 45 CFR Part 164 that apply to COUNTY in the performance of such obligation. 13. If CONTRACTOR receives Social Security data from COUNTY provided to COUNTY by a state agency, upon request by COUNTY, CONTRACTOR shall provide COUNTY with a list of all employees, subcontractors and agents who have access to the Social Security data, including employees, agents, subcontractors and agents of its subcontractors. 14. CONTRACTOR will notify COUNTY if CONTRACTOR is named as a defendant in a criminal proceeding for a violation of HIPAA. COUNTY may terminate the Agreement, if CONTRACTOR is found guilty of a criminal violation in connection with HIPAA. COUNTY may terminate the Agreement, if a finding or stipulation that CONTRACTOR has violated any standard or requirement of the privacy or security provisions of HIPAA, or other security or privacy laws are made in any administrative or civil proceeding in which CONTRACTOR is a party or has been joined. COUNTY will consider the nature and seriousness of the violation in deciding whether or not to terminate the Agreement.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!