NETWORK SECURITY POLICIES Sample Clauses

NETWORK SECURITY POLICIES. 5.1 Abstract Communication networks vehicle information and provide access to information systems. They are highly vulnerable to disruption and abuse. So, safeguarding business communications require robust and secure network design and strict control by ARCELORMITTAL over all types of access paths.
AutoNDA by SimpleDocs

Related to NETWORK SECURITY POLICIES

  • Blanket Policies Notwithstanding anything to the contrary in this Section 6.03, any insurance which Lessee is required to obtain pursuant to this Section 6.03 may be carried under a “blanket” policy or policies covering other properties or liabilities of Lessee provided that such “blanket” policy or policies otherwise comply with the provisions of this Section 6.03.

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Personnel Policies Employee shall conduct himself at all times in a businesslike and professional manner as appropriate for a person in his position and shall represent the Company in all respects as complies with good business and ethical practices. In addition, Employee shall be subject to and abide by the policies and procedures of the Company applicable to personnel of the Company, as adopted from time to time.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Privacy Policy (a) The parties acknowledge that:

  • Recoupment Policy Executive agrees that Executive will be subject to any compensation clawback or recoupment policies that may be applicable to Executive as an employee of the Company, as in effect from time to time and as approved by the Board or a duly authorized committee thereof, to comply with the Xxxx-Xxxxx Xxxx Street Reform and Consumer Protection Act.

  • Risk Management Policy The Administrative Agent and the Lenders shall have received a copy of the Risk Management Policy, including position and other limits, which shall be satisfactory in content and form to the Administrative Agent.

  • Policies All policies of insurance (the “Policies”) required pursuant to Section 7.1.1 shall (i) be issued by companies approved by Lender and licensed to do business in the State, with a claims paying ability rating of “A” or better by S&P (and the equivalent by any other Rating Agency) (provided, however for multi-layered policies, (a) if four (4) or less insurance companies issue the Policies, then at least 75% of the insurance coverage represented by the Policies must be provided by insurance companies with a claims paying ability rating of “A” or better by S&P (and the equivalent by any other Rating Agency), with no carrier below “BBB” (and the equivalent by any other Rating Agency) or (b) if five (5) or more insurance companies issue the Policies, then at least sixty percent (60%) of the insurance coverage represented by the Policies must be provided by insurance companies with a claims paying ability rating of “A” or better by S&P (and the equivalent by any other Rating Agency), with no carrier below “BBB” (and the equivalent by any other Rating Agency), and a rating of A:XV or better in the current Best’s Insurance Reports; (ii) name Lender and Senior Lender and its successors and/or assigns as their interest may appear as the mortgagee (in the case of property insurance), loss payee (in the case of business interruption/loss of rents coverage) and an additional insured (in the case of liability insurance); (iii) contain (in the case of property insurance and subject to the rights of Senior Lender) a Non-Contributory Standard Mortgagee Clause and a Lender’s Loss Payable Endorsement, or their equivalents, naming Lender as the person to which all payments made by such insurance company shall be paid, subject to the rights of Senior Lender; (iv) contain a waiver of subrogation against Lender; (v) subject to the rights of Senior Lender, be assigned and the originals thereof delivered to Lender; (vi) contain such provisions as Lender deems reasonably necessary or desirable to protect its interest, including (a) endorsements providing that neither Borrower, Owner, Lender nor any other party shall be a co-insurer under the Policies, (b) that Lender shall receive at least thirty (30) days’ prior written notice of any modification, reduction or cancellation of any of the Policies, (c) an agreement whereby the insurer waives any right to claim any premiums and commissions against Lender, provided that the policy need not waive the requirement that the premium be paid in order for a claim to be paid to the insured and (d) providing that Lender is permitted to make payments to effect the continuation of such policy upon notice of cancellation due to non-payment of premiums; (vii) in the event any insurance policy (except for general public and other liability and workers compensation insurance) shall contain breach of warranty provisions, such policy shall provide that with respect to the interest of Lender, such insurance policy shall not be invalidated by and shall insure Lender regardless of (a) any act, failure to act or negligence of or violation of warranties, declarations or conditions contained in such policy by any named insured, (b) the occupancy or use of the premises for purposes more hazardous than permitted by the terms thereof, or (c) any foreclosure or other action or proceeding taken by Lender pursuant to any provision of the Loan Documents; and (viii) be satisfactory in form and substance to Lender and approved by Lender as to amounts, form, risk coverage, deductibles, loss payees and insureds. Borrower shall cause Owner to pay the premiums for such Policies (the “Insurance Premiums”) as the same become due and payable and furnish to Lender evidence of the renewal of each of the Policies together with (unless such Insurance Premiums have been paid by Senior Lender pursuant to Section 3.3 of the Senior Loan Agreement) receipts for or other evidence of the payment of the Insurance Premiums reasonably satisfactory to Lender. If Borrower does not furnish such evidence and receipts at least thirty (30) days prior to the expiration of any expiring Policy, then Lender may, but shall not be obligated to, procure such insurance and pay the Insurance Premiums therefor, and Borrower shall reimburse Lender for the cost of such Insurance Premiums promptly on demand, with interest accruing at the Default Rate. Borrower shall deliver (or cause Owner to deliver) to Lender a certified copy of each Policy within thirty (30) days after its effective date. Within thirty (30) days after request by Lender, Borrower shall obtain (or cause Owner to obtain) such increases in the amounts of coverage required hereunder as may be reasonably requested by Lender, taking into consideration changes in the value of money over time, changes in liability laws, changes in prudent customs and practices, and the like.

  • Security / Passwords 2.1. A digital certificate and/or an encryption key may be required to access certain Services. You may apply for a digital certificate and/or an encryption key by following the procedures set forth at xxxx://xxx.xxx.xxx/certs/. You also will need an identification code (ID) and password(s) (Password) to access the Services.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!