Personal Information; Information Security Sample Clauses

Personal Information; Information Security. (a) Each of the Transfer Agent and BFDS acknowledges that the Funds and CDI are subject to the requirements of Regulation S-P promulgated by the SEC, as from time to time amended, including 17 CFR 248.30 regarding procedures to safeguard customer records and information, including Customer Data, and the disposal of consumer report information and records. Each of the Funds, CSSI and CDI acknowledges that the Transfer Agent and BFDS are subject to 17 CFR 248.30(b) of Regulation S-P regarding the disposal of consumer report information and records. Accordingly, BFDS, as the designated service provider for the Transfer Agent, shall develop and maintain (in furtherance of all of the services provided under this Agreement) policies and procedures for safeguarding any Fund or CDI Customer Data received, processed, stored or disposed of by BFDS constituting customer records and information (including, without limitation, any Customer NPI and consumer report information) (collectively, "personal information"). BFDS shall cause such policies and procedures to be reasonably designed to (i) ensure the security and confidentiality of the personal information; (ii) protect against anticipated threats or hazards to the security and integrity of the personal information; and (iii) protect against unauthorized access to or use of the personal information that could result in substantial harm or inconvenience to any customer of a Fund or CDI, as applicable. From time to time, in accordance with its own review or in response changes in applicable law, BFDS shall revise such policies and procedures in order that the services provided by BFDS hereunder are consistent with any law, rule or regulation applicable to its transfer agency business. (b) At the request of a Fund, CSSI or CDI, as applicable, and not less than once during each year of the term of this Agreement, the Transfer Agent and/or BFDS shall meet with the Fund, CSSI and CDI, as applicable, and deliver to the Fund, CSSI and CDI a presentation regarding the policies and procedures in place under Section 7.7(a) of this Agreement. On an annual basis, BFDS shall provide to the Fund, CSSI and CDI, as applicable, upon request, an agreed upon procedures report (or any successor report) of a third party independent auditing firm that shall address, among other topics, BFDS' compliance with policies and procedures for safeguarding personal information including Customer Data. (c) In performing the Data Access Services or ...
AutoNDA by SimpleDocs
Personal Information; Information Security. Each of the Transfer Agent and BFDS acknowledges that the Funds and CDI are subject to the requirements of Regulation S-P promulgated by the SEC, as from time to time amended, including 17 CFR 248.30 regarding procedures to safeguard customer records and information, including Customer Data, and the disposal of consumer report information and records. Each of the Funds, CSSI and CDI acknowledges that the Transfer Agent and BFDS are subject to 17 CFR 248.30(b) of Regulation S-P regarding the disposal of consumer report information and records. Accordingly, BFDS, as the designated service provider for the Transfer Agent, shall develop and maintain (in furtherance of all of the services provided under this Agreement) policies and procedures for safeguarding any Fund or CDI Customer Data received, processed, stored or disposed of by BFDS constituting customer records and information (including, without limitation, any Customer NPI and consumer report information) (collectively, "personal information"). BFDS shall cause such policies and procedures to be reasonably designed to (i) ensure the security and confidentiality of the personal information; (ii) protect against anticipated threats or hazards to the security and integrity of the personal information; and (iii) protect against unauthorized access to or use of the personal information that could result in substantial harm or inconvenience to any customer of a Fund or CDI, as applicable. From time to time, in accordance with its own review or in response changes in applicable law, BFDS shall revise such policies and procedures in order that the services provided by BFDS hereunder are consistent with any law, rule or regulation applicable to its transfer agency business.
Personal Information; Information Security. (a) The Transfer Agent shall develop and maintain as part of the Data Access Services (and in furtherance of all of the services provided under this Agreement) policies and procedures for safeguarding any Customer Data received, processed or stored by the Transfer Agent constituting customer records and information (including, without limitation, any consumer report information) subject to the requirements of Sectiones.248.30 of Regulation S-P promulgated by the United States Securities and Exchange Commission, as from time to time amended (collectively, "personal information"); the Transfer Agent shall cause such policies and procedures to be reasonably designed to (a) insure the security and confidentiality of the personal information; (b) protect against anticipated

Related to Personal Information; Information Security

  • Personal Information 23.1 Subject to any applicable laws, the Licensee authorises XXXXX to: 23.1.1 use any Personal Information that SAMRO for the purposes of processing, executing and administering the Agreement; calculating Licence Fees; collecting the Licence Fees; 23.1.2 informing the Licensee of any SAMRO news and information or information relating to the Agreement; 23.1.3 informing the Licensee of any amendment, Tariff amendment or General Amendment to this Agreement. 23.1.4 access the Licensees Personal Information from credit bureaux relating to the Licensees payment profile for purposes of financial risk assessment, fraud prevention and debtor tracing and that we may disclose the necessary Personal Information to any such credit bureaux. 23.1.5 obtain, capture store, process, analyse and use the Licensees personal information for SAMRO marketing purposes in relation to XXXXX’s business of managing its Repertoire.

  • Personal Information security breach Supplier/Service Provider’s Obligations a) The Supplier/Service Provider shall notify the Information Officer of Transnet, in writing as soon as possible after it becomes aware of or suspects any loss, unauthorised access or unlawful use of any personal data and shall, at its own cost, take all necessary remedial steps to mitigate the extent of the loss or compromise of personal data and to restore the integrity of the affected Goods/Services as quickly as is possible. The Supplier/Service Provider shall also be required to provide Transnet with details of the persons affected by the compromise and the nature and extent of the compromise, including details of the identity of the unauthorised person who may have accessed or acquired the personal data. b) The Supplier/Service Provider shall provide on-going updates on its progress in resolving the compromise at reasonable intervals until such time as the compromise is resolved. c) Where required, the Supplier/Service Provider may be required to notify the South African Police Service; and/or the State Security Agency and where applicable, the relevant regulator and/or the affected persons of the security breach. Any such notification shall always include sufficient information to allow the persons to take protective measures against the potential consequences of the compromise. d) The Supplier/Service Provider undertakes to co‑operate in any investigation relating to security which is carried out by or on behalf of Transnet including providing any information or material in its possession or control and implementing new security measures.

  • Privacy and Personal Information (a) This clause 14 applies where this agreement amounts to a “service arrangement” under the Information Privacy Act 2009 (Qld). (b) For the purpose of this clause 14, Personal Information has the meaning given in the Information Privacy Act 2009 (Qld). (c) If the Recipient collects or has access to Personal Information in order to undertake the Activity, the Recipient must: (i) comply with Parts 1 and 3 of Chapter 2 of the Information Privacy Act 2009 (Qld) in relation to the discharge of its obligations under this agreement (including its obligations regarding Reports), as if the Recipient was the Department; (ii) ensure that Personal Information is protected against loss and against unauthorised access, use, modification, disclosure or other misuse; (iii) not use Personal Information other than for the purposes of undertaking the Activity, unless required or authorised by law; (iv) not disclose Personal Information without the consent of the Department, unless required or authorised by law; (v) not transfer Personal Information outside of Australia without the consent of the Department; (vi) ensure that access to Personal Information is restricted to those of the Recipient's employees and officers who require access in order to perform their duties; (vii) ensure that the Recipient's officers and employees do not access, use or disclose Personal Information other than in the performance of their duties; (viii) ensure that the Recipient's subcontractors who have access to Personal Information comply with obligations the same as those imposed on the the Recipient under this clause 14; (ix) fully co-operate with the Department to enable the Department to respond to applications for access to, or amendment of a document containing an individual’s Personal Information and to privacy complaints; and (x) comply with such other privacy and security measures as the Department reasonably advises the Recipient in writing from time to time. (d) The Recipient must immediately notify the Department on becoming aware of any breach, suspected breach or complaint alleging something that would, if proved, be a breach of clause 14(c) and provide full details of the breach, suspected breach or complaint. (e) On request by the Department, the Recipient must obtain from its Representatives engaged for the purposes of this agreement, an executed deed of privacy in a form acceptable to the Department.

  • YOUR PERSONAL INFORMATION 17.1 We collect certain information about the purchaser and the users of the Card in order to operate the Card programme. IDT Financial Services Limited is the data controllers of Your personal data, and will manage and protect Your personal data in accordance with applicable law.IDT Financial Services Limited receives card services from First Data Slovakia s.r.o., which acts as a data processor for IDT Financial Services Limited. 17.2 We may transfer Your personal data outside the EEA to Our commercial partners where necessary to provide Our services to You, such as customer service, account administration, financial reconciliation, or where the transfer is necessary as a result of Your request, such as the processing of any international transaction. When We transfer personal data outside the EEA, We will take steps to ensure that Your personal data is afforded substantially similar protection as personal data processed within the EEA. Please be aware that not all countries have laws to protect personal data in a manner equivalent to that of the EEA. Your use of Our products and services will indicate to Us that You agree to the transfer of Your personal data outside the EEA. If You withdraw Your consent to the processing of Your personal data or its transfer outside the EEA, which You can do by using the contact details in clause 15, We will not be able to provide Our services to You. Therefore, such withdrawal of consent will be deemed to be a termination of the Agreement. 17.3 Unless You have provided Your explicit permission, Your personal data will not be used for marketing purposes by Us or Our commercial partners (unless You have independently provided Your consent to them directly), nor will it be shared with third parties unconnected with the Card scheme. 17.4 You have the right to request details of the personal information that is held about You, and You may receive this by writing to our Customer Service Center. 17.5 Please refer to the Privacy Policy of IDT Financial Services Limited xxxx://xxx.xxxxxxxxxx.xxx/privacypolicy.pdf for full details, which You accept by accepting the Agreement.

  • Nonpublic Personal Information Notwithstanding any provision herein to the contrary, the Sub-Adviser agrees on behalf of itself and its directors, shareholders, officers, and employees (1) to treat confidentially and as proprietary information of the Adviser and the Trust (a) all records and other information relative to each Fund’s prior, present, or potential shareholders (and clients of said shareholders) and (b) any Nonpublic Personal Information, as defined under Section 248.3(t) of Regulation S-P (“Regulation S-P”), promulgated under the Gxxxx-Xxxxx-Xxxxxx Act (the “G-L-B Act”), and (2) except after prior notification to and approval in writing by the Adviser or the Trust, not to use such records and information for any purpose other than the performance of its responsibilities and duties hereunder, or as otherwise permitted by Regulation S-P or the G-L-B Act, and if in compliance therewith, the privacy policies adopted by the Trust and communicated in writing to the Sub-Adviser. Such written approval shall not be unreasonably withheld by the Adviser or the Trust and may not be withheld where the Sub-Adviser may be exposed to civil or criminal contempt or other proceedings for failure to comply after being requested to divulge such information by duly constituted authorities.

  • Information The Buyer and its advisors, if any, have been, and for so long as the Note remain outstanding will continue to be, furnished with all materials relating to the business, finances and operations of the Company and materials relating to the offer and sale of the Securities which have been requested by the Buyer or its advisors. The Buyer and its advisors, if any, have been, and for so long as the Note remain outstanding will continue to be, afforded the opportunity to ask questions of the Company. Notwithstanding the foregoing, the Company has not disclosed to the Buyer any material nonpublic information and will not disclose such information unless such information is disclosed to the public prior to or promptly following such disclosure to the Buyer. Neither such inquiries nor any other due diligence investigation conducted by Buyer or any of its advisors or representatives shall modify, amend or affect Buyer’s right to rely on the Company’s representations and warranties contained in Section 3 below. The Buyer understands that its investment in the Securities involves a significant degree of risk. The Buyer is not aware of any facts that may constitute a breach of any of the Company's representations and warranties made herein.

  • KYC Information (i) Upon the reasonable request of the Lender made at least 1 day prior to the Closing Date, the Borrower shall have provided to the Lender the documentation and other information so requested in connection with applicable “know your customer” and anti-money-laundering rules and regulations, including the PATRIOT Act, in each case at least five days prior to the Closing Date. (ii) [reserved].

  • PERSONAL INFORMATION PRIVACY AND SECURITY CONTRACT 11 Any reference to statutory, regulatory, or contractual language herein shall be to such language as in 12 effect or as amended. 13 A. DEFINITIONS

  • Security of Confidential Information Each party possessing Confidential Information of the other party will maintain all such Confidential Information under secure conditions, using reasonable security measures and in any event not less than the same security procedures used by such party for the protection of its own Confidential Information of a similar kind.

  • Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!