Monitoring of Authorized User Security Compliance Sample Clauses

Monitoring of Authorized User Security Compliance. The BCSA and CSAs are responsible for instructing all Authorized Users as to each of the procedures for maintaining security of User IDs, Passwords, Digital Tokens, and Digital Token Codes set forth in Clause 4 above. The BCSA and CSAs are also responsible for monitoring compliance by all Authorized Users with these security maintenance procedures.
AutoNDA by SimpleDocs

Related to Monitoring of Authorized User Security Compliance

  • Monitoring and Risk Assessment of Securities Depositories Prior to the placement of any assets of the Fund with a non-U.S. Securities Depository, the Custodian: (a) shall provide to the Fund or its authorized representative an assessment of the custody risks associated with maintaining assets within such Securities Depository; and (b) shall have established a system to monitor the custody risks associated with maintaining assets with such Securities Depository on a continuing basis and to promptly notify the Fund or its Investment Adviser of any material changes in such risk. In performing its duties under this subsection, the Custodian shall use reasonable care and may rely on such reasonable sources of information as may be available including but not limited to: (i) published ratings; (ii) information supplied by a Subcustodian that is a participant in such Securities Depository; (iii) industry surveys or publications; (iv) information supplied by the depository itself, by its auditors (internal or external) or by the relevant Foreign Financial Regulatory Authority. It is acknowledged that information procured through some or all of these sources may not be independently verifiable by the Custodian and that direct access to Securities Depositories is limited under most circumstances. Accordingly, the Custodian shall not be responsible for errors or omissions in its duties hereunder provided that it has performed its monitoring and assessment duties with reasonable care. The risk assessment shall be provided to the Fund or its Investment Advisor by such means as the Custodian shall reasonably establish. Advices of material change in such assessment may be provided by the Custodian in the manner established as customary between the Fund and the Custodian for transmission of material market information.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Access to and Maintenance of Auction Records The Auction Agent shall afford to the Company, its agents, independent public accountants and counsel, access at reasonable times during normal business hours to review and make extracts or copies (at the Company's sole cost and expense) of all books, records, documents and other information concerning the conduct and results of Auctions, provided that any such agent, accountant or counsel shall furnish the Auction Agent with a letter from the Company requesting that the Auction Agent afford such person access. The Auction Agent shall maintain records relating to any Auction for a period of two years after such Auction (unless requested by the Company to maintain such records for such longer period not in excess of four years, then for such longer period), and such records, in reasonable detail, shall accurately and fairly reflect the actions taken by the Auction Agent hereunder. The Company agrees to keep confidential any information regarding the customers of any Broker-Dealer received from the Auction Agent in connection with this Agreement or any Auction, and shall not disclose such information or permit the disclosure of such information without the prior written consent of the applicable Broker- Dealer to anyone except such agent, accountant or counsel engaged to audit or review the results of Auctions as permitted by this Section 2.7, provided that the Company reserves the right to disclose any such information if it is advised by its counsel that its failure to do so would (i) be unlawful or (ii) expose it to liability, unless the Broker-Dealer shall have offered indemnification satisfactory to the Company. Any such agent, accountant or counsel, before having access to such information, shall agree to keep such information confidential and not to disclose such information or permit disclosure of such information without the prior written consent of the applicable Broker-Dealer, provided that such agent, accountant or counsel may reserve the right to disclose any such information if it is advised by its counsel that its failure to do so would (i) be unlawful or (ii) expose it to liability, unless the Broker-Dealer shall have offered indemnification satisfactory to such agent, accountant or counsel.

  • Monitoring Compliance Upon the request of the Lender, but without incurring any liability beyond the Guaranteed Obligations, from time to time, Guarantor shall promptly provide to the Lender such documents, certificates and other information as may be deemed reasonably necessary to enable the Lender to perform its functions under the Servicing Agreement as the same relates to the Guarantor.

  • No Reliance on Administrative Agent’s Customer Identification Program Each Lender acknowledges and agrees that neither such Lender, nor any of its Affiliates, participants or assignees, may rely on the Administrative Agent to carry out such Lender’s, Affiliate’s, participant’s or assignee’s customer identification program, or other obligations required or imposed under or pursuant to the USA Patriot Act or the regulations thereunder, including the regulations contained in 31 CFR 103.121 (as hereafter amended or replaced, the “CIP Regulations”), or any other Anti-Terrorism Law, including any programs involving any of the following items relating to or in connection with any of the Loan Parties, their Affiliates or their agents, the Loan Documents or the transactions hereunder or contemplated hereby: (i) any identity verification procedures, (ii) any recordkeeping, (iii) comparisons with government lists, (iv) customer notices or (v) other procedures required under the CIP Regulations or such other Laws.

  • Federal Medicaid System Security Requirements Compliance Party shall provide a security plan, risk assessment, and security controls review document within three months of the start date of this Agreement (and update it annually thereafter) in order to support audit compliance with 45 CFR 95.621 subpart F, ADP System Security Requirements and Review Process.

  • Child Support Compliance Act If the Contract Amount is $100,000 or more, this section is applicable. Contractor recognizes the importance of child and family support obligations and fully complies with (and will continue to comply with during the Term) all applicable state and federal laws relating to child and family support enforcement, including disclosure of information and compliance with earnings assignment orders, as provided in Family Code section 5200 et seq. Contractor provides the names of all new employees to the New Hire Registry maintained by the California Employment Development Department.

  • Data Security Requirements Without limiting Contractor’s obligation of confidentiality as further described in this Contract, Contractor must establish, maintain, and enforce a data privacy program and an information and cyber security program, including safety, physical, and technical security and resiliency policies and procedures, that comply with the requirements set forth in this Contract and, to the extent such programs are consistent with and not less protective than the requirements set forth in this Contract and are at least equal to applicable best industry practices and standards (NIST 800-53).

  • Contractor Security Clearance Customers may designate certain duties and/or positions as positions of “special trust” because they involve special trust responsibilities, are located in sensitive locations, or have key capabilities with access to sensitive or confidential information. The designation of a special trust position or duties is at the sole discretion of the Customer. Contractor or Contractor’s employees and Staff who, in the performance of this Contract, will be assigned to work in positions determined by the Customer to be positions of special trust, may be required to submit to background screening and be approved by the Customer to work on this Contract.

  • Authorized Uses The Participating Institutions and the Authorized Users may make all use of the Licensed Materials as is consistent with the applicable law and with this Agreement, including but not limited to the following licensing conditions ("Authorized Uses"). In addition, the Licensed Materials may be used for purposes of research, education or other non-commercial use as particularly follows:

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!