OUR SECURITY PROCEDURES Sample Clauses

OUR SECURITY PROCEDURES. We keep your information secure by: INFORMATION WE COLLECT. We collect and use different types of information about you to assist in servicing your accounts and managing our relationship with you. For example, we will use information we gather to identify you during a transaction in order to protect your identity and your account. Information you provide will also help us understand your financial needs as we design or improve our products and services.
OUR SECURITY PROCEDURES. We also take steps to safeguard customer information. We restrict access to your personal and account information to those employees who need to know that information to provide products or services to you. Employees who violate these standards will be subject to disciplinary measures. Our physical, electronic, and procedural safeguards meet or exceed federal standards regarding the protection of your nonpublic personal information. We use technological means such as backup files, virus detection, eradication software and firewalls to protect against unauthorized access or alterations to customer data and we maintain policies and procedures covering the proper physical security of workplaces and records. We continually strive to maintain complete, accurate and up to date information. If ever you believe that our records contain inaccurate or incomplete information, please contact us at Tel: 0-000-000-0000. We will investigate your concerns and correct any inaccuracies in a timely manner. We reserve the right to change this policy at anytime but would communicate any significant changes to you as required by applicable law. The policies and practices described in this disclosure replace all previous notices or statements regarding our privacy policy.
OUR SECURITY PROCEDURES. We keep your information secure by: Maintaining physical, electronic and procedural safeguards that comply with or exceed federal standards to guard your nonpublic personal information, including the prompt disposal of all unnecessary customer information. Limiting access to information about you to those associates who need to know that information to provide you products or services. Training our associates about the importance of maintaining the confidentiality of customer information. We take appropriate disciplinary action to enforce our associates’ privacy responsibilities. Requiring companies that do work for us on your behalf to protect information, and only provide them with information that we believe is necessary to fulfill their responsibilities. The information we gather comes from a variety of sources, including: Information you provide to us (such as name, address and telephone number). Information about your transactions with UMB (such as account balance and payment history). Information we receive from credit reporting agencies and other companies and agencies (such as your credit history).
OUR SECURITY PROCEDURESYou acknowledge that you have reviewed our current online security procedures as reflected in this Agreement, and you acknowledge that these procedures are commercially reasonable in the context of your business operations. You further acknowledge that we may update these security procedures from time to time and make them available to you. You agree to keep any security information we provide to you, including but not limited to, User IDs, Passwords, and security procedures, confidential.
OUR SECURITY PROCEDURES. We keep your information secure by:

Related to OUR SECURITY PROCEDURES

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Security Procedure The Client acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Client from Security Procedures offered by State Street. The Client agrees that the Security Procedures are reasonable and adequate for its wire transfer transactions and agrees to be bound by any payment orders, amendments and cancellations, whether or not authorized, issued in its name and accepted by State Street after being confirmed by any of the selected Security Procedures. The Client also agrees to be bound by any other valid and authorized payment order accepted by State Street. The Client shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated in writing to State Street. The Client must notify State Street immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Client’s authorized personnel. State Street shall verify the authenticity of all instructions according to the Security Procedure.

  • Safety and Security Procedures Contractor shall maintain and enforce, at the Contractor Work Locations, industry-standard safety and physical security policies and procedures. While at each JBE Work Location, Contractor shall comply with the safety and security policies and procedures in effect at such JBE Work Location.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Safety Procedures The Contractor shall: (a) comply with all applicable safety regulations according to Attachment H; (b) take care for the safety of all persons entitled to be on the Site; (c) use reasonable efforts to keep the Site and Works clear of unnecessary obstruction so as to avoid danger to these persons; (d) provide fencing, lighting, guarding and watching of the Works until completion and taking over under clause 10 [Employer's Taking Over]; and (e) provide any Temporary Works (including roadways, footways, guards and fences) which may be necessary, because of the execution of the Works, for the use and protection of the public and of owners and occupiers of adjacent land.

  • Security Program Contractor will develop and implement an effective security program for the Project Site, which program shall require the Contractor and subcontractors to take measures for the protection of their tools, materials, equipment, and structures. As between Contractor and Owner, Contractor shall be solely responsible for security against theft of and damage of all tools and equipment of every kind and nature and used in connection with the Work, regardless of by whom owned.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks. (2) The Information Security Program shall require encryption of any Personal Information in electronic format while in transit or in storage, and enhanced controls and standards for transport and disposal of physical media containing Personal Information. DTI shall, and shall require its agents, contractors and subcontractors who access or use Personal Information or Confidential Information to, regularly test key controls, systems and procedures relating to the Information Security Program ("ISP Tests"). DTI shall advise the Funds of any material issues identified in the ISP Tests potentially affecting the Information Security Program. (3) DTI shall comply with its Information Security Program.

  • Security Safeguards Contractor shall maintain a comprehensive security program that is reasonably designed to protect the security, privacy, confidentiality, and integrity of District Data. Contractor shall store and process District Data in accordance with industry standards and best practices, including implementing appropriate administrative, physical, and technical safeguards that are no less rigorous than those outlined in CIS Critical Security Controls (CIS Controls), as amended, to secure such data from unauthorized access, disclosure, alteration, and use. Contractor shall ensure that all such safeguards, including the manner in which District Data is collected, accessed, used, stored, processed, disposed of and disclosed, comply with all applicable federal and state data protection and privacy laws, regulations and directives, including without limitation the Act, as well as the terms and conditions of this Addendum. Without limiting the foregoing, and unless expressly agreed to the contrary in writing, Contractor warrants that all electronic District Data will be encrypted in transmission and at rest in accordance with NIST Special Publication 800-57, as amended, or such other standard as the District’s Chief Privacy Officer or designee may agree to in writing. Contractor shall also encrypt any backup, backup media, removable media, tape, or other copies. In addition, Contractor shall fully encrypt disks and storage for all laptops and mobile devices.

  • Loan Procedures (a) Except for Same Day Loans funded under Section 2.2(b), the Company shall give written notice or telephonic notice (followed immediately by written confirmation thereof) to the Agent of each proposed borrowing not later than 10:00 A.M., Detroit time, at least two Business Days prior to the proposed date of such borrowing. Each such notice shall be effective upon receipt by the Agent, shall be irrevocable and shall specify the date and amount of the proposed borrowing. Within one Business Day after receipt of such notice, the Agent shall advise each Lender thereof. Not later than 1:00 P.M., Detroit time, on the date of a proposed borrowing, each Lender shall provide the Agent at the office specified by the Agent with immediately available funds covering such Lender’s Pro Rata Share of such borrowing and, so long as the Agent has not received written notice that the conditions precedent set forth in Section 10 with respect to such borrowing have not been satisfied, the Agent shall pay over the funds received by the Agent to the Company on the requested borrowing date. Each borrowing shall be on a Business Day. (b) In addition to borrowings under Section 2.2(a), the Company may give written or electronic notice or telephonic notice (followed immediately by written or electronic confirmation thereof) to the Agent of a proposed Same Day Loan not later than 11:00 A.M., Detroit time, on any Business Day that the Company has not made (and will not make) a Same Day Prepayment. Each such notice shall be effective upon receipt by the Agent, shall be irrevocable and shall specify the amount of the proposed Same Day Loan, which amount may not exceed Fifteen Million and 00/100 Dollars ($15,000,000.00) for any particular Business Day. By 11:30 A.M., Detroit time, on the Business Day that the Agent receives a notice of a proposed Same Day Loan, the Agent shall advise each Lender thereof. Not later than 3:00 P.M., Detroit time, on the Business Day that the Agent receives a notice of a proposed Same Day Loan, each Lender shall provide the Agent at the office specified by the Agent with immediately available funds covering such Lender’s Pro Rata Share of such Same Day Loan and, so long as the Agent has not received written notice from a Lender (before 3:00 P.M., Detroit time, on the Business Day that the Agent receives a notice of a proposed Same Day Loan) that the conditions precedent set forth in Section 10 with respect to such borrowing have not been satisfied, the Agent shall pay over the funds received by the Agent by a federal wire transfer to the Company’s bank account, which federal wire transfer must be initiated by the Agent on or before 4:00 P.M., Detroit time, on the Business Day that the Agent receives a notice of the proposed Same Day Loan. Each Same Day Loan for which the above requirements are satisfied shall be treated as being made by the Lenders (and shall be part of the Revolving Outstandings) on the Business Day that the Agent initiates the federal wire transfer, even if the Company cannot confirm the receipt of such funds until the next Business Day. Each Same Day Loan must be requested (and shall be made) on a Business Day. The Company may not request a Same Day Loan on any Business Day if the Company has notified the Agent that the Company is making a Same Day Prepayment on such Business Day. The Company may request a Same Day Loan on the same Business Day that it has previously requested a borrowing under Section 2.2(a) and/or on the same Business Day for which the Company has notified the Agent of a voluntary prepayment under Section 6.2(a) and such Same Day Loan shall be funded in addition to, separately from and without any netting for such other borrowing and/or voluntary prepayment. (c) All borrowings and repayments of Loans shall be effected in accordance with each Lender’s Pro Rata Share.

  • Indemnity Procedures Promptly after receipt by an Indemnified Party of any claim or notice of the commencement of any action or administrative or legal proceeding or investigation as to which the indemnity provided for in Article 18.1 may apply, the Indemnified Party shall notify the Indemnifying Party of such fact. Any failure of or delay in such notification shall not affect a Party’s indemnification obligation unless such failure or delay is materially prejudicial to the Indemnifying Party. Except as stated below, the Indemnifying Party shall have the right to assume the defense thereof with counsel designated by such Indemnifying Party and reasonably satisfactory to the Indemnified Party. If the defendants in any such action include one or more Indemnified Parties and the Indemnifying Party and if the Indemnified Party reasonably concludes that there may be legal defenses available to it and/or other Indemnified Parties which are different from or additional to those available to the Indemnifying Party, the Indemnified Party shall have the right to select separate counsel to assert such legal defenses and to otherwise participate in the defense of such action on its own behalf. In such instances, the Indemnifying Party shall only be required to pay the fees and expenses of one additional attorney to represent an Indemnified Party or Indemnified Parties having such differing or additional legal defenses. The Indemnified Party shall be entitled, at its expense, to participate in any such action, suit or proceeding, the defense of which has been assumed by the Indemnifying Party. Notwithstanding the foregoing, the Indemnifying Party (i) shall not be entitled to assume and control the defense of any such action, suit or proceedings if and to the extent that, in the opinion of the Indemnified Party and its counsel, such action, suit or proceeding involves the potential imposition of criminal liability on the Indemnified Party, or there exists a conflict or adversity of interest between the Indemnified Party and the Indemnifying Party, in such event the Indemnifying Party shall pay the reasonable expenses of the Indemnified Party, and (ii) shall not settle or consent to the entry of any judgment in any action, suit or proceeding without the consent of the Indemnified Party, which shall not be unreasonably withheld, conditioned or delayed.