Provider’s Information Security Policies. Without limiting the generality of the foregoing, Provider’s information security policies shall provide for (i) continual assessment and re-assessment of the risks to the security of BFA Data and systems acquired or maintained by Provider and its agents and contractors in connection with the Services, including (A) identification of internal and external threats that could result in a Data Security Breach, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of BFA Data, and (C) assessment of the sufficiency of policies, procedures, effectiveness of controls, and information systems of Provider and its agents and contractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.
Appears in 6 contracts
Samples: Master Services Agreement (BlackRock ETF Trust), Master Services Agreement (iShares Ethereum Trust), Master Services Agreement (iShares Bitcoin Trust)
Provider’s Information Security Policies. Without limiting the generality of the foregoing, Provider’s information security policies shall provide for (i) continual assessment and re-assessment of the risks to the security of BFA BTC Data and systems acquired or maintained by Provider and its agents and contractors in connection with the Services, including (A) identification of internal and external threats that could result in a Data Security Breach, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of BFA BTC Data, and (C) assessment of the sufficiency of policies, procedures, effectiveness of controls, and information systems of Provider and its agents and contractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.
Appears in 3 contracts
Samples: Custody Services Agreement (iShares U.S. ETF Trust), Custody Services Agreement (iSHARES TRUST), Custody Services Agreement (iShares, Inc.)
Provider’s Information Security Policies. Without limiting the generality of the foregoing, Provider’s information security policies shall provide for (i) continual assessment and re-assessment reassessment of the risks to the security of BFA Data and systems acquired or maintained by Provider and its agents and contractors in connection with the Services, including (A) identification of internal and external threats that could result in a Data Security Breach, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of BFA Data, and (C) assessment of the sufficiency of policies, procedures, effectiveness of controls, and information systems of Provider and its agents and contractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.
Appears in 1 contract