OUR SECURITY PROCEDURES Sample Clauses

OUR SECURITY PROCEDURES. We keep your information secure by: INFORMATION WE COLLECT. We collect and use different types of information about you to assist in servicing your accounts and managing our relationship with you. For example, we will use information we gather to identify you during a transaction in order to protect your identity and your account. Information you provide will also help us understand your financial needs as we design or improve our products and services.
AutoNDA by SimpleDocs
OUR SECURITY PROCEDURES. We also take steps to safeguard customer information. We restrict access to your personal and account information to those employees who need to know that information to provide products or services to you. Employees who violate these standards will be subject to disciplinary measures. Our physical, electronic, and procedural safeguards meet or exceed federal standards regarding the protection of your nonpublic personal information. We use technological means such as backup files, virus detection, eradication software and firewalls to protect against unauthorized access or alterations to customer data and we maintain policies and procedures covering the proper physical security of workplaces and records. We continually strive to maintain complete, accurate and up to date information. If ever you believe that our records contain inaccurate or incomplete information, please contact us at Tel: 0-000-000-0000. We will investigate your concerns and correct any inaccuracies in a timely manner. We reserve the right to change this policy at anytime but would communicate any significant changes to you as required by applicable law. The policies and practices described in this disclosure replace all previous notices or statements regarding our privacy policy.
OUR SECURITY PROCEDURES. We keep your information secure by: Maintaining physical, electronic and procedural safeguards that comply with or exceed federal standards to guard your nonpublic personal information, including the prompt disposal of all unnecessary customer information. Limiting access to information about you to those associates who need to know that information to provide you products or services. Training our associates about the importance of maintaining the confidentiality of customer information. We take appropriate disciplinary action to enforce our associates’ privacy responsibilities. Requiring companies that do work for us on your behalf to protect information, and only provide them with information that we believe is necessary to fulfill their responsibilities. The information we gather comes from a variety of sources, including: Information you provide to us (such as name, address and telephone number). Information about your transactions with UMB (such as account balance and payment history). Information we receive from credit reporting agencies and other companies and agencies (such as your credit history).
OUR SECURITY PROCEDURES. You acknowledge that you have reviewed our current online security procedures as reflected in this Agreement, and you acknowledge that these procedures are commercially reasonable in the context of your business operations. You further acknowledge that we may update these security procedures from time to time and make them available to you. You agree to keep any security information we provide to you, including but not limited to, User IDs, Passwords, and security procedures, confidential.
OUR SECURITY PROCEDURES. We keep your information secure by:

Related to OUR SECURITY PROCEDURES

  • Safety and Security Procedures Contractor shall maintain and enforce, at the Contractor Work Locations, industry-standard safety and physical security policies and procedures. While at each Court Work Location, Contractor shall comply with the safety and security policies and procedures in effect at such Court Work Location.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks. (2) The Information Security Program shall require encryption of any Personal Information in electronic format while in transit or in storage, and enhanced controls and standards for transport and disposal of physical media containing Personal Information. DTI shall, and shall require its agents, contractors and subcontractors who access or use Personal Information or Confidential Information to, regularly test key controls, systems and procedures relating to the Information Security Program ("ISP Tests"). DTI shall advise the Funds of any material issues identified in the ISP Tests potentially affecting the Information Security Program. (3) DTI shall comply with its Information Security Program.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!