Protection of Sensitive Data and Access Control Sample Clauses

Protection of Sensitive Data and Access Control. The ACH Security Framework Rule requires non-consumer Originators, Participating DFls, Third-Party Service Providers, and Third-party Senders to establish, implement, and, as appropriate, update security policies, procedures, and systems related to the initiation, processing, and storage of Entries. These policies, procedures, and systems must:  Protect the confidentiality and integrity of Protected information;  Protect against anticipated threats or hazards to the security or integrity of Protected information; and  Protect against unauthorized use of Protected Information that could result in substantial harm to a natural person The amendment defines "Protected Information” as the non-public personal information, including financial information, of a natural person used to create, or contained within, an Entry and any related Addenda Record. This not only covers financial information, but also includes sensitive non-financial information (such as health information) that may be incorporated into the Entry or any related Addenda Record. This Rule applies to consumer information only, which is consistent with existing regulations and also with the approach of aligning the ACH Security Framework with existing industry regulations and guidance. However, impacted ACH participants may wish to apply the rule so that it covers all customers. Security policies, procedures, and systems of ACH participants covered by this Rule must include controls on system access that comply with applicable regulatory guidelines. The systems impacted include all systems used by the ACH participate to initiate, process, and store Entries.
AutoNDA by SimpleDocs

Related to Protection of Sensitive Data and Access Control

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage.

  • Data Access and Proprietary Information 6.1 The Fund acknowledges that the databases, computer programs, screen formats, report formats, interactive design techniques, and documentation manuals furnished to the Fund by the Transfer Agent as part of the Fund’s ability to access certain Fund Confidential Information maintained by the Transfer Agent on databases under the control and ownership of the Transfer Agent or other third party (“Data Access Services”) constitute copyrighted, trade secret, or other proprietary information of substantial value to the Transfer Agent or other third party (collectively, “Transfer Agent Proprietary Information”). In no event shall Transfer Agent Proprietary Information be deemed Fund Confidential Information. The Fund agrees to treat all Transfer Agent Proprietary Information as proprietary to the Transfer Agent and further agrees that it shall not divulge any Transfer Agent Proprietary Information to any person or organization except as may be provided hereunder. Without limiting the foregoing, the Fund agrees for itself and its employees and agents to: (a) Use such programs and databases (i) solely on the Fund’s computers or on computers of Federated Services Company or its affiliates (collectively, “Fund Computers”), or (ii) solely from equipment at the location agreed to between the Fund and the Transfer Agent and (iii) solely in accordance with the Transfer Agent’s applicable user documentation; (b) Refrain from copying or duplicating in any way (other than in the normal course of performing processing on the Fund Computers), the Transfer Agent Proprietary Information; (c) Refrain from obtaining unauthorized access to any portion of the Transfer Agent Proprietary Information, and if such access is inadvertently obtained, to inform Transfer Agent in a timely manner of such fact and dispose of such information in accordance with the Transfer Agent’s instructions; (d) Refrain from causing or allowing information transmitted from the Transfer Agent’s computer to the Fund’s terminal to be retransmitted to any other computer terminal or other device except as expressly permitted by the Transfer Agent (such permission not to be unreasonably withheld); (e) Allow the Fund to have access only to those authorized transactions as agreed to between the Fund and the Transfer Agent; and (f) Honor all reasonable written requests made by the Transfer Agent to protect at the Transfer Agent’s expense the rights of the Transfer Agent in the Transfer Agent Proprietary Information at common law, under federal copyright law and under other federal or state law. 6.2 The Fund shall take reasonable efforts to advise its employees of their obligations pursuant to this Section 6. The obligations of this Section shall survive any earlier termination of this Agreement. 6.3 If the Fund notifies the Transfer Agent that any of the Data Access Services do not operate in material compliance with the most recently issued user documentation for such services, the Transfer Agent shall use its best efforts in a timely manner to correct such failure. Organizations from which the Transfer Agent may obtain certain data included in the Data Access Services are solely responsible for the contents of such data and the Fund agrees to make no claim against the Transfer Agent arising out of the contents of such third-party data, including, but not limited to, the accuracy thereof; provided, however, that the Fund shall be entitled to insist that the Transfer Agent, and the Transfer Agent for the benefit of the Fund shall, enforce any and all rights under applicable contracts for the Data Access Services. SUBJECT TO THE FOREGOING OBLIGATIONS OF THE TRANSFER AGENT, DATA ACCESS SERVICES AND ALL COMPUTER PROGRAMS AND SOFTWARE SPECIFICATIONS USED IN CONNECTION THEREWITH ARE PROVIDED ON AN AS IS, AS AVAILABLE BASIS. EXCEPT AS OTHERWISE PROVIDED HEREIN TO THE CONTRARY, THE TRANSFER AGENT EXPRESSLY DISCLAIMS ALL WARRANTIES INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. 6.4 If the transactions available to the Fund include the ability to originate Proper Instructions through electronic instructions to the Transfer Agent in order to: (i) effect the transfer or movement of cash or Shares; or (ii) transmit Shareholder information or other information, then in such event the Transfer Agent shall be entitled to rely on the validity and authenticity of such Proper Instructions without undertaking any further inquiry as long as such Proper Instruction is undertaken in conformity with applicable security procedures.

  • Power Supply Information and Access to Information POWER SUPPLY INFORMATION

  • Information and Access (a) The Company and Parent each shall (and shall cause its Subsidiaries to, and shall use its commercially reasonable efforts to cause, its and their respective Representatives to), upon the reasonable request by the other, furnish to the other, as promptly as practicable, with all information concerning itself, its Representatives and such other matters as may be necessary or advisable in connection with the Schedule 14D-9 or Schedule TO (including with respect to Parent, information concerning the Investors) and any information or documentation to effect the expiration of all waiting periods under applicable Antitrust Laws and all filings, notices, reports, consents, registrations, approvals, permits and authorizations, made or sought by or on behalf of Parent, the Company or any of their respective Affiliates to or from any third party, including any Governmental Entity, in each case necessary or advisable in connection with the Transactions and, with respect to the information supplied in writing by or on behalf of Parent, its Affiliates or its or their respective Representatives for inclusion in or incorporation by reference into the Schedule 14D-9, including with respect to the Investors. Each of Parent and the Company acknowledges and agrees that such information supplied by it pursuant to this Section 7.8(a) (as applicable) will be correct and complete in all material respects at the time so supplied. (b) In addition to and without limiting the rights and obligations set forth in Section 7.8(a), the Company shall (and shall cause its Subsidiaries to), upon reasonable prior notice, afford Parent and its Representatives reasonable access, during normal business hours, from the date of this Agreement and continuing until the earlier of the Effective Time and the termination of this Agreement pursuant to Article IX, to the Company Employees, agents, properties, offices and other facilities, Contracts, books and records, and, during such period, the Company shall (and shall cause its Subsidiaries to) furnish promptly to Parent all other information and documents concerning or regarding its businesses, properties and assets and personnel as may reasonably be requested by or on behalf of Parent; provided, however, that, subject to compliance with the obligations set forth in Section 7.8(c): (i) neither the Company nor any of its Subsidiaries shall be required to provide such access or furnish such information or documents to the extent doing so would, in the reasonable opinion of the Company’s outside legal counsel result in (A) a violation of applicable Law, (B) the breach of any contractual confidentiality obligations in any Contract with a third party entered into prior to the date of this Agreement or following the date of this Agreement in compliance with Section 7.1 and Section 7.2; (C) waive the protection of any attorney-client privilege or protection (including attorney-client privilege, attorney work-product protections and confidentiality protections) or any other applicable privilege or protection concerning pending or threatened Proceedings, in any material respect; or (D) such information or documents are reasonably pertinent to any adverse Proceeding between the Company and its Affiliates, on the one hand, and Parent and its Affiliates, on the other hand (subject to any rules or guidelines of discovery applicable to such adverse Proceeding); and (ii) in no event shall the work papers of the Company’s and its Subsidiaries’ independent accountants and auditors be accessible to Parent or any of its Representative unless and until such accountants and auditors have provided a consent related thereto in form and substance reasonably acceptable to such auditors or independent accountants. Any investigation conducted pursuant to the access contemplated by this Section 7.8(b) will be conducted in a manner that does not unreasonably interfere with the conduct of the business of the Company and its Subsidiaries and that would not reasonably be expected to create a risk of damage or destruction to any property or assets of the Company or its Subsidiaries. Any access to the properties of the Company and its Subsidiaries shall be subject to the Company’s reasonable security measures and insurance requirements and shall not include the right to perform any “invasive” testing or soil, air or groundwater sampling, including any Phase II environmental assessments. All requests for such access or information made pursuant to this Section 7.8(b) shall be initially directed to the Person set forth on Section 7.8(b) of the Company Disclosure Schedule, which Person may be replaced by the Company at any time by providing written notice to Parent, and any access granted in connection with a request made pursuant to this Section 7.8(b) shall be supervised by such Persons. (c) In the event that the Company objects to any request submitted pursuant to Section 7.8(b) on the basis of one or more of the matters set forth in clause (i) of Section 7.8(b), it must do so by providing Parent, in reasonable detail, the nature of what is being prevented and/or withheld and the reasons and reasonable support therefor, and prior to preventing such access or withholding such information or documents from Parent and its Representatives, the Company shall cooperate with Parent to make appropriate substitute arrangements to permit reasonable disclosure that does not suffer from any of the impediments expressly set forth in clause (i) of Section 7.8(b) (other than clause (D)) including through the use of commercially reasonable efforts to take such actions and implement appropriate and mutually agreeable measures to as promptly as practicable permit such access and the furnishing of such information and documents in a manner to remove the basis for the objection, including by arrangement of appropriate “counsel-to-counsel” disclosure, clean room procedures, redaction and other customary procedures, entry into a customary joint defense agreement and, with respect to the contractual confidentiality obligations contemplated by clause (i)(B) of Section 7.8(b), obtaining a waiver with respect to or consent under such contractual confidentiality obligations. (d) Without limiting the generality of the other provisions of this Section 7.8, the Company and Parent, as each deems advisable and necessary, after consultation with their respective outside legal counsel, may reasonably designate competitively sensitive information and documents (including those that relate to valuation of the Company or Parent (as the case may be)) as “Outside Counsel Only Information.” Such information and documents shall only be provided to the outside legal counsel of the Company or Parent (as the case may be), or subject to such other similar restrictions mutually agreed to by the Company and Parent, and subject to any amendment, supplement or other modification to the Confidentiality Agreement or additional confidentiality or joint defense agreement between or among the Company and Parent; provided, however, that, subject to any applicable Laws relating to the exchange of information, the outside legal counsel receiving such information and documents may prepare one or more reports summarizing the results of any analysis of any such shared information and documents, and disclose such reports, other summaries or aggregated information derived from such shared information and documents to Representatives of such outside legal counsel’s client. (e) No access or information provided to Parent or any of its Representatives or to the Company or any of its Representatives following the date of this Agreement, whether pursuant to this Section 7.8 or otherwise, shall affect or be deemed to affect, modify or waive the representations and warranties of the Parties set forth in this Agreement and, for the avoidance of doubt, all information and documents disclosed or otherwise made available pursuant to Section 7.5, Section 7.6, this Section 7.8 or otherwise in connection with this Agreement and the Transactions shall be governed by the terms and conditions of the Confidentiality Agreement mutatis mutandis as if Parent were Counterparty (as defined in the Confidentiality Agreement) and subject to applicable Laws relating to the exchange or sharing of information and any restrictions or requirements imposed by any Governmental Entity; provided, that, in the event of a conflict, the provisions of Section 7.13 shall override any conflicting provisions of the Confidentiality Agreement, and any Person who is a potential source of, or may provide, equity, debt or any other type of financing to Parent or any of its Representatives in connection with the Transactions shall be deemed a “Representative” for purposes of the Confidentiality Agreement without the prior written consent of the Company.

  • Verizon OSS Information 8.5.1 Subject to the provisions of this Section 8 and Applicable Law, Verizon grants to Reconex a non-exclusive license to use Verizon OSS Information. 8.5.2 All Verizon OSS Information shall at all times remain the property of Verizon. Except as expressly stated in this Section 8, Reconex shall acquire no rights in or to any Verizon OSS Information. 8.5.2.1 The provisions of this Section 8.5.2 shall apply to all Verizon OSS Information, except (a) Reconex Usage Information, (b) CPNI of Reconex, and (c) CPNI of a Verizon Customer or a Reconex Customer, to the extent the Customer has authorized Reconex to use the Customer Information. 8.5.2.2 Verizon OSS Information may be accessed and used by Reconex only to provide Telecommunications Services to Reconex Customers. 8.5.2.3 Reconex shall treat Verizon OSS Information that is designated by Verizon, through written or electronic notice (including, but not limited to, through the Verizon OSS Services), as “Confidential” or “Proprietary” as Confidential Information of Verizon pursuant to Section 10 of the Agreement. 8.5.2.4 Except as expressly stated in this Section 8, this Agreement does not grant to Reconex any right or license to grant sublicenses to other persons, or permission to other persons (except Reconex’s employees, agents or contractors, in accordance with Section 8.5.2.5 below, to access, use or disclose Verizon OSS Information. 8.5.2.5 Reconex’s employees, agents and contractors may access, use and disclose Verizon OSS Information only to the extent necessary for Reconex’s access to, and use and disclosure of, Verizon OSS Information permitted by this Section 8. Any access to, or use or disclosure of, Verizon OSS Information by Reconex’s employees, agents or contractors, shall be subject to the provisions of this Agreement, including, but not limited to, Section 10 of the Agreement and Section 8.5.2.3 above. 8.5.2.6 Reconex’s license to use Verizon OSS Information shall expire upon the earliest of: (a) the time when the Verizon OSS Information is no longer needed by Reconex to provide Telecommunications Services to Reconex Customers; (b) termination of the license in accordance with this Section 8; or (c) expiration or termination of the Agreement. 8.5.2.7 All Verizon OSS Information received by Reconex shall be destroyed or returned by Reconex to Verizon, upon expiration, suspension or termination of the license to use such Verizon OSS Information. 8.5.3 Unless sooner terminated or suspended in accordance with the Agreement or this Section 8 (including, but not limited to, Section 2.2 of the Agreement and Section 8.6.1 below), Reconex’s access to Verizon OSS Information through Verizon OSS Services shall terminate upon the expiration or termination of the Agreement. 8.5.3.1 Verizon shall have the right (but not the obligation) to audit Reconex to ascertain whether Reconex is complying with the requirements of Applicable Law and this Agreement with regard to Reconex’s access to, and use and disclosure of, Verizon OSS Information. 8.5.3.2 Without in any way limiting any other rights Verizon may have under the Agreement or Applicable Law, Verizon shall have the right (but not the obligation) to monitor Reconex’s access to and use of Verizon OSS Information which is made available by Verizon to Reconex pursuant to this Agreement, to ascertain whether Reconex is complying with the requirements of Applicable Law and this Agreement, with regard to Reconex’s access to, and use and disclosure of, such Verizon OSS Information. The foregoing right shall include, but not be limited to, the right (but not the obligation) to electronically monitor Reconex’s access to and use of Verizon OSS Information which is made available by Verizon to Reconex through Verizon OSS Facilities. 8.5.3.3 Information obtained by Verizon pursuant to this Section 8.5.3.3 shall be treated by Verizon as Confidential Information of Reconex pursuant to Section 10 of the Agreement; provided that, Verizon shall have the right (but not the obligation) to use and disclose information obtained by Verizon pursuant to this Section 8.5.3.3 to enforce Verizon’s rights under the Agreement or Applicable Law.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization.

  • Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • Physical Access Control Unauthorized persons are prevented from gaining physical access to premises, buildings or rooms where data processing systems that process and/or use Personal Data are located.

  • Substance Abuse Treatment Information Substance abuse treatment information shall be maintained in compliance with 42 C.F.R. Part 2 if the Party or subcontractor(s) are Part 2 covered programs, or if substance abuse treatment information is received from a Part 2 covered program by the Party or subcontractor(s).

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!