Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.
Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.
SECURITY PROCESSES If requested by an Authorized User as part the Request for Quote process, Contractor shall complete a Consensus Assessment Initiative Questionnaire (CAIQ) including on an annual basis thereafter, if requested by the Authorized User. The CAIQ is available at Cloud Security Alliance (xxxxx://xxxxxxxxxxxxxxxxxxxxx.xxx/). The CAIQ may be used to assist the Authorized User in building the necessary assessment processes when engaging with Contractors. In addition to a request for a CAIQ, Contractor shall cooperate with all reasonable Authorized User requests for a Written description of Contractor’s physical/virtual security and/or internal control processes. The Authorized User shall have the right to reject any Contractor’s RFQ response or terminate an Authorized User Agreement when such a request has been denied. For example, Federal, State and local regulations and/or laws may require that Contractors operate within the Authorized User’s regulatory environment. In order to ensure that security is adequate and free of gaps in control coverage, the Authorized User may require information from the Contractor’s Service Organization Controls (SOC) audit report.
SAFETY PROCEDURES The Contractor shall:
Security Safeguards Even if you enroll in on-line banking or bill pay or our electronic document delivery service, we may from time to time require certain transactions to be made in-person or we may require verification or authentication of your identity for security purposes before a transaction or other business with us may be initiated, processed, or completed. You agree and understand that this is for the protection of us and you and is intended to safeguard your personal information and all funds held in or by the Credit Union, and to help prevent Identity Theft and bank fraud. You agree that we will not be liable for any delay in, or prevention of, any transaction or business conducted by you due to these security measures. Legal Process Against Your Account. If any legal action is brought against your account such as tax levy, garnishment, attachment, etc., we may pay out funds according to the terms of the action or refuse any payout until the dispute is resolved. We will not be liable to you for any such payout, even if it causes overdrafts or returned items as determined under our Overdraft Governance Documents. Any expenses or attorney fees we incur responding to legal process may be charged against your account without notice, unless prohibited by law. Any legal process against your account is subject to our lien and security interest in your account and our right to set-off.