Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks. (2) The Information Security Program shall require encryption of any Personal Information in electronic format while in transit or in storage, and enhanced controls and standards for transport and disposal of physical media containing Personal Information. DTI shall, and shall require its agents, contractors and subcontractors who access or use Personal Information or Confidential Information to, regularly test key controls, systems and procedures relating to the Information Security Program ("ISP Tests"). DTI shall advise the Funds of any material issues identified in the ISP Tests potentially affecting the Information Security Program. (3) DTI shall comply with its Information Security Program.
Default in Favor of Third Parties Borrower or any Grantor defaults under any loan, extension of credit, security agreement, purchase or sales agreement, or any other agreement, in favor of any other creditor or person that may materially affect any of Borrower's or any Grantor's property or Borrower's or any Grantor's ability to repay the Loans or perform their respective obligations under this Agreement or any of the Related Documents.
Security Program Contractor will develop and implement an effective security program for the Project Site, which program shall require the Contractor and subcontractors to take measures for the protection of their tools, materials, equipment, and structures. As between Contractor and Owner, Contractor shall be solely responsible for security against theft of and damage of all tools and equipment of every kind and nature and used in connection with the Work, regardless of by whom owned.
Third Party Servicer The Assuming Institution may perform any of its obligations and/or exercise any of its rights under this Single Family Shared-Loss Agreement through or by one or more Third Party Servicers, who may take actions and make expenditures as if any such Third Party Servicer was the Assuming Institution hereunder (and, for the avoidance of doubt, such expenses incurred by any such Third Party Servicer on behalf of the Assuming Institution shall be included in calculating Losses to the extent such expenses would be included in such calculation if the expenses were incurred by Assuming Institution); provided, however, that the use thereof by the Assuming Institution shall not release the Assuming Institution of any obligation or liability hereunder.
Links to Third Party Sites/Third Party Services xxx.xxxxxxxxxxxxxxxxxx.xxx may contain links to other websites ("Linked Sites"). The Linked Sites are not under the control of Company and Company is not responsible for the contents of any Linked Site, including without limitation any link contained in a Linked Site, or any changes or updates to a Linked Site. Company is providing these links to you only as a convenience, and the inclusion of any link does not imply endorsement by Company of the site or any association with its operators. Certain services made available via xxx.xxxxxxxxxxxxxxxxxx.xxx are delivered by third party sites and organizations. By using any product, service or functionality originating from the xxx.xxxxxxxxxxxxxxxxxx.xxx domain, you hereby acknowledge and consent that Company may share such information and data with any third party with whom Company has a contractual relationship to provide the requested product, service or functionality on behalf of xxx.xxxxxxxxxxxxxxxxxx.xxx users and customers.
Third Party Services Any services required for or contemplated by the performance of the above-referenced services by the Administrator to be provided by unaffiliated third parties (including independent auditors’ fees and counsel fees) may, if provided for or otherwise contemplated by the Financing Order and if the Issuer deems it necessary or desirable, be arranged by the Issuer or by the Administrator at the direction (which may be general or specific) of the Issuer. Costs and expenses associated with the contracting for such third-party professional services may be paid directly by the Issuer or paid by the Administrator and reimbursed by the Issuer in accordance with Section 2, or otherwise as the Administrator and the Issuer may mutually arrange.
Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.
Third Party Service Providers Unless otherwise prohibited by Apple in the Documentation or this Agreement, You are permitted to employ or retain a third party (“Service Provider”) to assist You in using the Apple Software and Services provided pursuant to this Agreement, including, but not limited to, engaging any such Service Provider to maintain and administer Your Applications’ servers on Your behalf, provided that any such Service Provider’s use of the Apple Software and Services or any materials associated therewith is done solely on Your behalf and only in accordance with these terms. Notwithstanding the foregoing, You may not use a Service Provider to submit an Application to the App Store or use TestFlight on Your behalf. You agree to have a binding written agreement with Your Service Provider with terms at least as restrictive and protective of Apple as those set forth herein. Any actions undertaken by any such Service Provider in relation to Your Applications or use of the Apple Software or Apple Services and/or arising out of this Agreement shall be deemed to have been taken by You, and You (in addition to the Service Provider) shall be responsible to Apple for all such actions (or any inactions). In the event of any actions or inactions by the Service Provider that would constitute a violation of this Agreement or otherwise cause any harm, Apple reserves the right to require You to cease using such Service Provider.
Third Party Providers Except for those terms and conditions that specifically apply to Third Party Providers, under no circumstances shall any other person be considered a third party beneficiary of this Agreement or otherwise entitled to any rights or remedies under this Agreement. Except as may be provided in Third Party Agreements, Company shall have no rights or remedies against Third Party Providers, Third Party Providers shall have no liability of any nature to the Company, and the aggregate cumulative liability of all Third Party Providers to the Company shall be $1.
Security Safeguards Contractor shall store and process District Data in accordance with commercial best practices, including implementing appropriate administrative, physical, and technical safeguards that are no less rigorous than those outlined in SANS Top 20 Security Controls, as amended, to secure such data from unauthorized access, disclosure, alteration, and use. Contractor shall ensure that all such safeguards, including the manner in which District Data is collected, accessed, used, stored, processed, disposed of and disclosed, comply with all applicable federal and state data protection and privacy laws, regulations and directives, including without limitation C.R.S. § 00-00-000 et seq., as well as the terms and conditions of this Addendum. Without limiting the foregoing, and unless expressly agreed to the contrary in writing, Contractor warrants that all electronic District Data will be encrypted in transmission and at rest in accordance with NIST Special Publication 800-57, as amended.