Common use of Per E-Mail Clause in Contracts

Per E-Mail. E-Mail Notification E-mail notification to Investors of document availability on DST web service. Notification volume will be determined by Investor consent to shut off paper. $[ ] Regulatory E-Mail Notification Development Implementation E-mail notification to Investors that provided consent for compliance documents made available on-line. Designing, coding, constructing, software integration and unit testing software solutions. Updating email templates. Print analysis involves the developing and deploying of print resources. Preparing and creating the Project Requirements Document, Input Data Map, Document Type map, and other documents required under the System Development Life Cycle (SDLC). Managing project software Events. One time additional implementation set up fee separate from on-boarding fee. $[ ] Per Hour $[ ] One-Time TBD *The fees are subject to an increase on each anniversary of the agreement in an amount not less than the annual percentage change in the Consumer Price Index for all Urban Consumers (“CPI-U”) in the Kansas City, Missouri-Kansas Standard Metropolitan Statistical Area, All Items, Base 1982-1984=100, as last reported by the U.S. Bureau of Labor Statistics for the 12 calendar months immediately preceding such anniversary. The fees presented in this Exhibit A are subject to change unless this Services Attachment is agreed to and executed by the Parties no later than December 31, 2016. All capitalized terms not defined in this DST Systems, Inc. (“DST”) Client Information Security Schedule (this “Security Schedule”) shall have the meanings ascribed to them in the Agency Agreement by and between DST and Federated Project and Trade Finance Tender Fund (“Client”) dated December 6, 2016 (the “Agreement”). DST and Client hereby agree that DST shall maintain and comply with an information security policy (“Security Policy”) that is reasonably designed to satisfy the requirements set forth below; provided, that, because information security is a highly dynamic space (where laws, regulations and threats are constantly changing), DST reserves the right to make changes to its information security controls at any time and at the sole discretion of DST in a manner that it believes does not materially reduce the protection it applies to Client Data (as defined below). From time to time, DST may subcontract services performed under the Agreement (to the extent provided for under the Agreement) or provide access to Client Data or its network to a subcontractor or other third party; provided, that, in DST’s reasonable discretion, such subcontractor or third party implements and maintains security measures DST believes are at least as stringent as those described in this Security Schedule.

Appears in 3 contracts

Sources: Agency Agreement (Federated Hermes Sustainable High Yield Bond Fund, Inc.), Agency Agreement (Federated Hermes Income Securities Trust), Agency Agreement (Federated Hermes Project & Trade Finance Tender Fund)

Per E-Mail. E-Mail Notification E-mail notification to Investors of document availability on DST web service. Notification volume will be determined by Investor consent to shut off paper. $[ ] 0.10000 Regulatory E-E- Mail Notification Development Implementation E-mail notification to Investors that provided consent for compliance documents made available on-line. $0.29000 Development Designing, coding, constructing, software integration and unit testing software solutions. Updating email templates. Print analysis involves the developing and deploying of print resources. Preparing and creating the Project Requirements Document, Input Data Map, Document Type map, and other documents required under the System Development Life Cycle (SDLC). Managing project software Events. Per Hour $150.00 Implementation One time additional implementation set up fee separate from on-boarding fee. $[ ] Per Hour $[ ] One-Time TBD ** The fees are subject to an increase on each anniversary of the agreement in an amount not less than the annual percentage change in the Consumer Price Index for all Urban Consumers (“CPI-U”) in the Kansas City, Missouri-Kansas Standard Metropolitan Statistical Area, All Items, Base 1982-1984=100, as last reported by the U.S. Bureau of Labor Statistics for the 12 calendar months immediately preceding such anniversary. The fees presented in this Exhibit A are subject to change unless this Services Attachment is agreed to and executed by the Parties no later than December 31, 2016. All capitalized terms not defined in this DST Systems, Inc. (“DST”) Client Information Security Schedule (this “Security Schedule”) shall have the meanings ascribed Pursuant to them in Section7.A. of the Agency Agreement by and between DST and Federated Project and Trade Finance Tender Pacific Investment Management Company LLC on behalf of PIMCO Flexible Credit Income Fund (the ClientFinancial Product”) dated December 6, 2016 and DST (the “Agreement”), the Financial Product authorizes the following Financial Product personnel to provide instructions to DST, and receive inquiries from DST in connection with the Agreement: ▇▇▇▇▇ ▇. ▇▇▇▇▇▇▇ Managing Director of PIMCO ▇▇▇▇ ▇. ▇▇▇▇▇▇▇ Executive Vice President of PIMCO ▇▇▇▇▇▇▇▇ ▇. ▇▇▇▇ Senior Vice President of PIMCO ▇▇▇▇▇ ▇▇▇▇▇▇▇▇ Senior Vice President of PIMCO ▇▇▇▇▇▇▇▇▇▇▇ ▇. ▇▇▇▇▇ Vice President of PIMCO ▇▇▇▇▇ ▇▇▇▇▇▇ Executive Vice President of PIMCO, Financial Reporting Manager ▇▇▇▇▇▇▇ ▇. ▇▇▇▇▇▇▇▇ Executive Vice President of PIMCO, Fund Administration By: /s/ ▇▇▇▇▇▇▇▇▇▇▇ ▇. ▇▇▇▇ By: /s/ ▇▇▇ ▇. ▇▇▇▇▇▇ Print Name: ▇▇▇▇▇▇▇▇▇▇▇ ▇. ▇▇▇▇ Print Name: ▇▇▇ ▇. ▇▇▇▇▇▇ Title: Officer Title: President and Managing Director Date: 3/29/17 Date: March 28, 2017 This Exhibit may be revised by the Financial Product by providing DST with a substitute Exhibit B. Any such substitute Exhibit B shall become effective twenty-four (24) hours after DST’s receipt of the document and shall be incorporated into the Agreement. DST has a formal Information Protection Program (IPP) that was established and Client hereby agree exists as a working roadmap for DST security. DST does Risk Assessments, Security Assessments, Security Awareness for the corporation as a whole, targeted training for specific applicable groups, and other security related activities. DST has a program and process pursuant to which DST reviews its technology and architecture and security requirements and needs. Integral to the function of the IPP is the Global Security Council (GSC). The GSC convenes periodically during the year and is responsible for 1) identifying, measuring and rating risks, 2) approving policies, standards, and practices, and 3) assessing and reporting progress towards compliance. The GSC convenes periodically during the year and is responsible for providing executive level oversight and guidance to the Information Protection Program. A component of the IPP is DST’s Policies, Control Standards, and Technology Baselines. DST’s Security Management Console (SMC) is an on-line system DST obtained from ▇▇▇▇▇▇ Technologies that provides Security Policies, Control Standards, and Technical Baselines, oriented to the financial industry. The policies and standards incorporated in the SMC are designed to be consistent and evolve with ISO27001, HIPAA, Data Protection Act of 1998, IS Forum Standards, FFIEC IS Booklet, and MAS to the extent DST deems them applicable to its business. DST has in place security log and activity monitoring, on a 24x7x365 basis. DST has an Intrusion Detection System (IDS) implemented to keep us informed on network activity. DST has an incident response process to deal with unexplainable logs and activities that are observed. This process is reviewed for validity and effectiveness for the purpose. DST also uses at least annually, third party security reviews to provide the information to support DST’s security efforts. DST will share summary level information related to application source code vulnerability scans. The information will only be made available to the Financial Product while on-site at DST’s premises. If vulnerabilities are identified, then DST shall maintain review such results in efforts to determine in its sole discretion whether additional remediation efforts are required. All of the foregoing policies and comply with an information procedures are subject to regular review and modification without notice, it being agreed that (i) no change to the foregoing shall diminish the over-all level of security policy and protections afforded to The Financial Product Data as maintained on the DST Subaccounting System and the DST Facilities and (“Security Policy”ii) DST hereby undertakes that is it shall at all times have in place data security policies and standards that are reasonably designed to satisfy the requirements set forth below; providedbe consistent and evolve with ISO27001, thatHIPAA, because information security is a highly dynamic space (where lawsData Protection Act of 1998, regulations IS Forum Standards, FFIEC IS Booklet, and threats are constantly changing), DST reserves the right to make changes to its information security controls at any time and at the sole discretion of DST in a manner that it believes does not materially reduce the protection it applies to Client Data (as defined below). From time to time, DST may subcontract services performed under the Agreement (MAS to the extent provided for under the Agreement) or provide access DST reasonably deems them applicable to Client Data or its network to a subcontractor or other third party; provided, that, in DST’s reasonable discretion, such subcontractor or third party implements and maintains security measures DST believes are at least as stringent as those described in this Security Schedulebusiness.

Appears in 2 contracts

Sources: Agency Agreement (PIMCO California Flexible Municipal Income Fund), Agency Agreement (PIMCO Flexible Emerging Markets Income Fund)

Per E-Mail. E-Mail Notification E-mail notification to Investors of document availability on DST web service. Notification volume will be determined by Investor consent to shut off paper. $[ ] 0.10000 Regulatory E-Mail Notification Development Implementation E-mail notification to Investors that provided consent for compliance documents made available on-line. $0.29000 Development Designing, coding, constructing, software integration and unit testing software solutions. Updating email templates. Print analysis involves the developing and deploying of print resources. Preparing and creating the Project Requirements Document, Input Data Map, Document Type map, and other documents required under the System Development Life Cycle (SDLC). Managing project software Events. Per Hour $150.00 Implementation One time additional implementation set up fee separate from on-boarding fee. $[ ] Per Hour $[ ] One-Time TBD ** The fees are subject to an increase on each anniversary of the agreement in an amount not less than the annual percentage change in the Consumer Price Index for all Urban Consumers (“CPI-U”) in the Kansas City, Missouri-Kansas Standard Metropolitan Statistical Area, All Items, Base 1982-1984=100, as last reported by the U.S. Bureau of Labor Statistics for the 12 calendar months immediately preceding such anniversary. The fees presented in this Exhibit A are subject to change unless this Services Attachment is agreed to and executed by the Parties no later than December 31, 2016. All capitalized terms not defined in this DST Systems, Inc. (“DST”) Client Information Security Schedule (this “Security Schedule”) shall have the meanings ascribed Pursuant to them in Section7.A. of the Agency Agreement by and between DST and Federated Project and Trade Finance Tender Pacific Investment Management Company LLC on behalf of PIMCO Flexible Credit Income Fund (the ClientFinancial Product”) dated December 6, 2016 and DST (the “Agreement”), the Financial Product authorizes the following Financial Product personnel to provide instructions to DST, and receive inquiries from DST in connection with the Agreement: ▇▇▇▇▇ ▇. ▇▇▇▇▇▇▇ Managing Director of PIMCO ▇▇▇▇ ▇. ▇▇▇▇▇▇▇ Executive Vice President of PIMCO ▇▇▇▇▇▇▇▇ ▇. ▇▇▇▇ Senior Vice President of PIMCO ▇▇▇▇▇ ▇▇▇▇▇▇▇▇ Senior Vice President of PIMCO ▇▇▇▇▇▇▇▇▇▇▇ ▇. ▇▇▇▇▇ Vice President of PIMCO ▇▇▇▇▇ ▇▇▇▇▇▇ Executive Vice President of PIMCO, Financial Reporting Manager ▇▇▇▇▇▇▇ ▇. ▇▇▇▇▇▇▇▇ Executive Vice President of PIMCO, Fund Administration By: /s/ ▇▇▇▇▇▇▇▇▇▇▇ ▇. ▇▇▇▇ By: /s/ ▇▇▇ ▇. ▇▇▇▇▇▇ Print Name: ▇▇▇▇▇▇▇▇▇▇▇ ▇. ▇▇▇▇ Print Name: ▇▇▇ ▇. ▇▇▇▇▇▇ Title: Officer Title: President and Managing Director Date: 3/29/17 Date: March 28, 2017 This Exhibit may be revised by the Financial Product by providing DST with a substitute Exhibit B. Any such substitute Exhibit B shall become effective twenty-four (24) hours after DST’s receipt of the document and shall be incorporated into the Agreement. DST has a formal Information Protection Program (IPP) that was established and Client hereby agree exists as a working roadmap for DST security. DST does Risk Assessments, Security Assessments, Security Awareness for the corporation as a whole, targeted training for specific applicable groups, and other security related activities. DST has a program and process pursuant to which DST reviews its technology and architecture and security requirements and needs. Integral to the function of the IPP is the Global Security Council (GSC). The GSC convenes periodically during the year and is responsible for 1) identifying, measuring and rating risks, 2) approving policies, standards, and practices, and 3) assessing and reporting progress towards compliance. The GSC convenes periodically during the year and is responsible for providing executive level oversight and guidance to the Information Protection Program. A component of the IPP is DST’s Policies, Control Standards, and Technology Baselines. DST’s Security Management Console (SMC) is an on-line system DST obtained from ▇▇▇▇▇▇ Technologies that provides Security Policies, Control Standards, and Technical Baselines, oriented to the financial industry. The policies and standards incorporated in the SMC are designed to be consistent and evolve with ISO27001, HIPAA, Data Protection Act of 1998, IS Forum Standards, FFIEC IS Booklet, and MAS to the extent DST deems them applicable to its business. DST has in place security log and activity monitoring, on a 24x7x365 basis. DST has an Intrusion Detection System (IDS) implemented to keep us informed on network activity. DST has an incident response process to deal with unexplainable logs and activities that are observed. This process is reviewed for validity and effectiveness for the purpose. DST also uses at least annually, third party security reviews to provide the information to support DST’s security efforts. DST will share summary level information related to application source code vulnerability scans. The information will only be made available to the Financial Product while on-site at DST’s premises. If vulnerabilities are identified, then DST shall maintain review such results in efforts to determine in its sole discretion whether additional remediation efforts are required. All of the foregoing policies and comply with an information procedures are subject to regular review and modification without notice, it being agreed that (i) no change to the foregoing shall diminish the over-all level of security policy and protections afforded to The Financial Product Data as maintained on the DST Subaccounting System and the DST Facilities and (“Security Policy”ii) DST hereby undertakes that is it shall at all times have in place data security policies and standards that are reasonably designed to satisfy the requirements set forth below; providedbe consistent and evolve with ISO27001, thatHIPAA, because information security is a highly dynamic space (where lawsData Protection Act of 1998, regulations IS Forum Standards, FFIEC IS Booklet, and threats are constantly changing), DST reserves the right to make changes to its information security controls at any time and at the sole discretion of DST in a manner that it believes does not materially reduce the protection it applies to Client Data (as defined below). From time to time, DST may subcontract services performed under the Agreement (MAS to the extent provided for under the Agreement) or provide access DST reasonably deems them applicable to Client Data or its network to a subcontractor or other third party; provided, that, in DST’s reasonable discretion, such subcontractor or third party implements and maintains security measures DST believes are at least as stringent as those described in this Security Schedulebusiness.

Appears in 1 contract

Sources: Agency Agreement (PIMCO Flexible Municipal Income Fund)

Per E-Mail. E-Mail Notification E-mail notification to Investors of document availability on DST web service. Notification volume will be determined by Investor consent to shut off paper. $[ ] 0.10000 Regulatory E-Mail Notification Development Implementation E-mail notification to Investors that provided consent for compliance documents made available on-line. $0.29000 Development Designing, coding, constructing, software integration and unit testing software solutions. Updating email templates. Print analysis involves the developing and deploying of print resources. Preparing and creating the Project Requirements Document, Input Data Map, Document Type map, and other documents required under the System Development Life Cycle (SDLC). Managing project software Events. Per Hour $150.00 Implementation One time additional implementation set up fee separate from on-boarding fee. $[ ] Per Hour $[ ] One-Time TBD ** The fees are subject to an increase on each anniversary of the agreement in an amount not less than the annual percentage change in the Consumer Price Index for all Urban Consumers (“CPI-U”) in the Kansas City, Missouri-Kansas Standard Metropolitan Statistical Area, All Items, Base 1982-1984=100, as last reported by the U.S. Bureau of Labor Statistics for the 12 calendar months immediately preceding such anniversary. The fees presented in this Exhibit A are subject to change unless this Services Attachment is agreed to and executed by the Parties no later than December 31, 2016. All capitalized terms not defined in this DST Systems, Inc. (“DST”) Client Information Security Schedule (this “Security Schedule”) shall have the meanings ascribed Pursuant to them in Section7.A. of the Agency Agreement by and between DST and Federated Project and Trade Finance Tender Pacific Investment Management Company LLC on behalf of PIMCO Flexible Credit Income Fund (the ClientFinancial Product”) dated December 6, 2016 and DST (the “Agreement”), the Financial Product authorizes the following Financial Product personnel to provide instructions to DST, and receive inquiries from DST in connection with the Agreement: ▇▇▇▇▇ ▇. ▇▇▇▇▇▇▇ Managing Director of PIMCO ▇▇▇▇ ▇. ▇▇▇▇▇▇▇ Executive Vice President of PIMCO ▇▇▇▇▇▇▇▇ ▇. ▇▇▇▇ Senior Vice President of PIMCO ▇▇▇▇▇ ▇▇▇▇▇▇▇▇ Senior Vice President of PIMCO ▇▇▇▇▇▇▇▇▇▇▇ ▇. ▇▇▇▇▇ Vice President of PIMCO ▇▇▇▇▇ ▇▇▇▇▇▇ Executive Vice President of PIMCO, Financial Reporting Manager ▇▇▇▇▇▇▇ ▇. ▇▇▇▇▇▇▇▇ Executive Vice President of PIMCO, Fund Administration By: /s/ ▇▇▇▇▇▇▇▇▇▇▇ ▇. ▇▇▇▇ By: /s/ ▇▇▇ ▇. ▇▇▇▇▇▇ Print Name: ▇▇▇▇▇▇▇▇▇▇▇ ▇. ▇▇▇▇ Print Name: ▇▇▇ ▇. ▇▇▇▇▇▇ Title: Officer Title: President and Managing Director Date: 3/29/17 Date: March 28, 2017 This Exhibit may be revised by the Financial Product by providing DST with a substitute Exhibit B. Any such substitute Exhibit B shall become effective twenty-four (24) hours after DST’s receipt of the document and shall be incorporated into the Agreement. DST has a formal Information Protection Program (IPP) that was established and Client hereby agree exists as a working roadmap for DST security. DST does Risk Assessments, Security Assessments, Security Awareness for the corporation as a whole, targeted training for specific applicable groups, and other security related activities. DST has a program and process pursuant to which DST reviews its technology and architecture and security requirements and needs. Integral to the function of the IPP is the Global Security Council (GSC). The GSC convenes periodically during the year and is responsible for 1) identifying, measuring and rating risks, 2) approving policies, standards, and practices, and 3) assessing and reporting progress towards compliance. The GSC convenes periodically during the year and is responsible for providing executive level oversight and guidance to the Information Protection Program. A component of the IPP is DST’s Policies, Control Standards, and Technology Baselines. DST’s Security Management Console (SMC) is an on-line system DST obtained from ▇▇▇▇▇▇ Technologies that provides Security Policies, Control Standards, and Technical Baselines, oriented to the financial industry. The policies and standards incorporated in the SMC are designed to be consistent and evolve with ISO27001, HIPAA, Data Protection Act of 1998, IS Forum Standards, FFIEC IS Booklet, and MAS to the extent DST deems them applicable to its business. DST has in place security log and activity monitoring, on a 24x7x365 basis. DST has an Intrusion Detection System (IDS) implemented to keep us informed on network activity. DST has an incident response process to deal with unexplainable logs and activities that are observed. This process is reviewed for validity and effectiveness for the purpose. DST also uses at least annually, third party security reviews to provide the information to support DST’s security efforts. DST will share summary level information related to application source code vulnerability scans. The information will only be made available to the Financial Product while on-site at DST’s premises. If vulnerabilities are identified, then DST shall maintain review such results in efforts to determine in its sole discretion whether additional remediation efforts are required. All of the foregoing policies and comply with an information procedures are subject to regular review and modification without notice, it being agreed that (i) no change to the foregoing shall diminish the over-all level of security policy and protections afforded to The Financial Product Data as maintained on the DST Subaccounting System and the DST Facilities and (“Security Policy”ii) DST hereby undertakes that is it shall at all times have in place data security policies and standards that are reasonably designed to satisfy the requirements set forth below; providedbe consistent and evolve with ISO27001, thatHIPAA, because information security is a highly dynamic space (where lawsData Protection Act of 1998, regulations IS Forum Standards, FFIEC IS Booklet, and threats are constantly changing), DST reserves the right to make changes to its information security controls at any time and at the sole discretion of DST in a manner that it believes does not materially reduce the protection it applies to Client Data (as defined below). From time to time, DST may subcontract services performed under the Agreement (MAS to the extent provided for under the Agreement) or provide access DST reasonably deems them applicable to Client Data or its network to a subcontractor or other third party; provided, that, in DST’s reasonable discretion, such subcontractor or third party implements and maintains security measures DST believes are at least as stringent as those described in this Security Schedulebusiness.

Appears in 1 contract

Sources: Agency Agreement (PIMCO Flexible Credit Income Fund)

Per E-Mail. E-Mail Notification E-mail notification to Investors of document availability on DST web service. Notification volume will be determined by Investor consent to shut off paper. $[ ] 0.10000 Regulatory E-Mail Notification Development Implementation E-mail notification to Investors that provided consent for compliance documents made available on-line. Designing, coding, constructing, software integration and unit testing software solutions. Updating email templates. Print analysis involves the developing and deploying of print resources. Preparing and creating the Project Requirements Document, Input Data Map, Document Type map, and other documents required under the System Development Life Cycle (SDLC). Managing project software Events. One time additional implementation set up fee separate from on-boarding fee. $[ ] 0.29000 Per Hour $[ ] 150.00 One-Time TBD *The fees are subject to an increase on each anniversary of the agreement in an amount not less than the annual percentage change in the Consumer Price Index for all Urban Consumers (“CPI-U”) in the Kansas City, Missouri-Kansas Standard Metropolitan Statistical Area, All Items, Base 1982-1984=100, as last reported by the U.S. Bureau of Labor Statistics for the 12 calendar months immediately preceding such anniversary. The fees presented in this Exhibit A are subject to change unless this Services Attachment is agreed to and executed by the Parties no later than December 31, 2016. All capitalized terms not defined in this DST Systems, Inc. (“DST”) Client Information Security Schedule (this “Security Schedule”) shall have the meanings ascribed to them in the Agency Agreement by and between DST and Federated Project and Trade Finance Tender Fund (“Client”) dated December 6, 2016 (the “Agreement”). DST and Client hereby agree that DST shall maintain and comply with an information security policy (“Security Policy”) that is reasonably designed to satisfy the requirements set forth below; provided, that, because information security is a highly dynamic space (where laws, regulations and threats are constantly changing), DST reserves the right to make changes to its information security controls at any time and at the sole discretion of DST in a manner that it believes does not materially reduce the protection it applies to Client Data (as defined below). From time to time, DST may subcontract services performed under the Agreement (to the extent provided for under the Agreement) or provide access to Client Data or its network to a subcontractor or other third party; provided, that, in DST’s reasonable discretion, such subcontractor or third party implements and maintains security measures DST believes are at least as stringent as those described in this Security Schedule.

Appears in 1 contract

Sources: Agency Agreement (Federated Hermes Project & Trade Finance Tender Fund)