Power of third party Security Provider Sample Clauses

Power of third party Security Provider. The third party Security Provider has a power and all necessary authorization to own and/or to provide the Security in terms of the provisions of this Agreement.
AutoNDA by SimpleDocs

Related to Power of third party Security Provider

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Security Program Contractor will develop and implement an effective security program for the Project Site, which program shall require the Contractor and subcontractors to take measures for the protection of their tools, materials, equipment, and structures. As between Contractor and Owner, Contractor shall be solely responsible for security against theft of and damage of all tools and equipment of every kind and nature and used in connection with the Work, regardless of by whom owned.

  • Third Party Servicer The Assuming Institution may perform any of its obligations and/or exercise any of its rights under this Single Family Shared-Loss Agreement through or by one or more Third Party Servicers, who may take actions and make expenditures as if any such Third Party Servicer was the Assuming Institution hereunder (and, for the avoidance of doubt, such expenses incurred by any such Third Party Servicer on behalf of the Assuming Institution shall be included in calculating Losses to the extent such expenses would be included in such calculation if the expenses were incurred by Assuming Institution); provided, however, that the use thereof by the Assuming Institution shall not release the Assuming Institution of any obligation or liability hereunder.

  • Links to Third Party Sites/Third Party Services xxxxxxxxxx.xxx may contain links to other websites ("Linked Sites"). The Linked Sites are not under the control of CURLYWORLD and CURLYWORLD is not responsible for the contents of any Linked Site, including without limitation any link contained in a Linked Site, or any changes or updates to a Linked Site. CURLYWORLD is providing these links to you only as a convenience, and the inclusion of any link does not imply endorsement by CURLYWORLD of the site or any association with its operators. Certain services made available via xxxxxxxxxx.xxx are delivered by third party sites and organizations. By using any product, service or functionality originating from the xxxxxxxxxx.xxx domain, you hereby acknowledge and consent that CURLYWORLD may share such information and data with any third party with whom CURLYWORLD has a contractual relationship to provide the requested product, service or functionality on behalf of xxxxxxxxxx.xxx users and customers.

  • SECURITY PROCESSES If requested by an Authorized User as part the Request for Quote process, Contractor shall complete a Consensus Assessment Initiative Questionnaire (CAIQ) including on an annual basis thereafter, if requested by the Authorized User. The CAIQ is available at Cloud Security Alliance (xxxxx://xxxxxxxxxxxxxxxxxxxxx.xxx/). The CAIQ may be used to assist the Authorized User in building the necessary assessment processes when engaging with Contractors. In addition to a request for a CAIQ, Contractor shall cooperate with all reasonable Authorized User requests for a Written description of Contractor’s physical/virtual security and/or internal control processes. The Authorized User shall have the right to reject any Contractor’s RFQ response or terminate an Authorized User Agreement when such a request has been denied. For example, Federal, State and local regulations and/or laws may require that Contractors operate within the Authorized User’s regulatory environment. In order to ensure that security is adequate and free of gaps in control coverage, the Authorized User may require information from the Contractor’s Service Organization Controls (SOC) audit report.

  • Third Party Services Any services required for or contemplated by the performance of the above-referenced services by the Administrator to be provided by unaffiliated third parties (including independent auditors’ fees and counsel fees) may, if provided for or otherwise contemplated by the Financing Order and if the Issuer deems it necessary or desirable, be arranged by the Issuer or by the Administrator at the direction (which may be general or specific) of the Issuer. Costs and expenses associated with the contracting for such third-party professional services may be paid directly by the Issuer or paid by the Administrator and reimbursed by the Issuer in accordance with Section 2, or otherwise as the Administrator and the Issuer may mutually arrange.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Third Party Service Providers Unless otherwise prohibited by Apple in the Documentation or this Agreement, You are permitted to employ or retain a third party (“Service Provider”) to assist You in using the Apple Software and Services provided pursuant to this Agreement, including, but not limited to, engaging any such Service Provider to maintain and administer Your Applications’ servers on Your behalf, provided that any such Service Provider’s use of the Apple Software and Services or any materials associated therewith is done solely on Your behalf and only in accordance with these terms. Notwithstanding the foregoing, You may not use a Service Provider to submit an Application to the App Store or use TestFlight on Your behalf. You agree to have a binding written agreement with Your Service Provider with terms at least as restrictive and protective of Apple as those set forth herein. Any actions undertaken by any such Service Provider in relation to Your Applications or use of the Apple Software or Apple Services and/or arising out of this Agreement shall be deemed to have been taken by You, and You (in addition to the Service Provider) shall be responsible to Apple for all such actions (or any inactions). In the event of any actions or inactions by the Service Provider that would constitute a violation of this Agreement or otherwise cause any harm, Apple reserves the right to require You to cease using such Service Provider.

  • Third Party Providers Except for those terms and conditions that specifically apply to Third Party Providers, under no circumstances shall any other person be considered a third party beneficiary of this Agreement or otherwise entitled to any rights or remedies under this Agreement. Except as may be provided in Third Party Agreements, Company shall have no rights or remedies against Third Party Providers, Third Party Providers shall have no liability of any nature to the Company, and the aggregate cumulative liability of all Third Party Providers to the Company shall be $1.

  • Security Safeguards (1) Each party acknowledges that it is solely responsible for determining and communicating to the other the appropriate technological, physical, and organizational security measures required to protect Personal Data.

Time is Money Join Law Insider Premium to draft better contracts faster.