Requests for Information The Grantee shall fully and promptly comply with all reporting requirements and requests for information issued by the Department or its authorized designee. The Grantee shall provide such information in the format requested by the Department. The Grantee shall ensure that its staff, interns, volunteers, and subcontractors comply in a timely and complete manner with all the Department’s requests for information. The Grantee shall comply in a timely manner with requests by the Department or its authorized designee for financial information, records, and documents related to evaluating costs of programs and ser vices provided by the Grantee’s probation department. The Grantee shall timely submit any files or records of the Grantee’s juvenile probation department, or any facility or program operated by or under the authority of the Grantee, requested by the Department or its authorized designee as a part of the monitoring, auditing, or investigatory process.
Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.
Mobile Subscriber Information You authorize your wireless carrier to disclose information about your account, such as subscriber status, payment method and device details, if available, to support identity verification, fraud avoidance and other uses in support of transactions for the duration of your business relationship with us. This information may also be shared with other companies to support your transactions with us and for identity verification and fraud avoidance purposes.
Personal Information security breach a) Each Party shall notify the other party in writing as soon as possible after it becomes aware of or suspects any loss, unauthorised access or unlawful use of any personal information and shall, at its own cost, take all necessary remedial steps to mitigate the extent of the loss or compromise of personal information and to restore the integrity of the affected personal information as quickly as is possible. The Parties shall also be required to provide each other with details of the persons affected by the compromise and the nature and extent of the compromise, including details of the identity of the unauthorised person who may have accessed or acquired the personal information. b) The Parties shall provide on-going updates on the progress in resolving the compromise at reasonable intervals until such time as the compromise is resolved. c) Where required, the Parties must notify the South African Police Service; and/or the State Security Agency and the Information Regulator and the affected persons of the security breach. Any such notification shall always include sufficient information to allow the persons to take protective measures against the potential consequences of the compromise. d) The Parties undertake to co‑operate in any investigations relating to security which is carried out by or on behalf of the other including providing any information or material in its possession or control and implementing new security measures.