Public Data Security Sample Clauses

Public Data Security. Contractor agrees to protect and maintain the security of Public Data with protection that is at least as good as or better than that maintained by the State of Utah which will be provided by an Eligible User upon Contractor’s request. These security measures included but are not limited to maintaining secure environments that are patched and up to date with all appropriate security updates as designated (ex. Microsoft Notification). Eligible User reserves the right to determine if Contractor’s level of protection adequately meets the Eligible User’s security requirements.
AutoNDA by SimpleDocs
Public Data Security. Contractor agrees to protect and maintain the security of Public Data with protection that is at least as good as or better than that maintained by the State of Utah which will be provided by an Eligible User upon Contractor’s request. These security measures included but are not limited to maintaining secure environments that are patched and up to date with all appropriate security updates as designated (ex. Microsoft Notification). Eligible User reserves the right to determine if Contractor’s level of protection adequately meets the Eligible User’s security requirements. Public Data Transmission: Contractor agrees that any and all transmission or exchange of system application data with the Eligible Users and State of Utah and/or any other parties expressly designated by the State of Utah, shall take place via secure means (ex. HTTPS or FTPS).
Public Data Security. When Contractor expressly agrees to provide security services (e.g., Managed Security Services), Contractor agrees to protect and maintain the security of Public Data with protection that is at least as good as or better than that maintained by the State of Utah which will be provided by an Eligible User upon Contractor’s request. These security measures included but are not limited to maintaining secure environments that are patched and up to date with all appropriate security updates as designated (ex. Microsoft Notification). Eligible User reserves the right to determine if Contractor’s level of protection adequately meets the Eligible User’s security requirements.

Related to Public Data Security

  • Electronic Data 7.1.1 The parties recognize that Contract Documents, including drawings, specifications and three-dimensional modeling (such as Building Information Models) and other Work Product may be transmitted among Owner, Design-Builder and others in electronic media as an alternative to paper hard copies (collectively “Electronic Data”).

  • New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.

  • Electronic Data Interchange (EDI This standard establishes the data contents of the Invoice Transaction Set (810) for use within the context of an EDI environment. This transaction set can be used for invoicing via the AN for catalog and non-catalog goods and services.

  • Electronic Data Interchange If both Parties elect to facilitate business activities hereunder by electronically sending and receiving data in agreed formats (also referred to as Electronic Data Interchange or “EDI”) in substitution for conventional paper-based documents, the terms and conditions of this Agreement shall apply to such EDI activities.

  • Reports Filed with Securities and Exchange Commission (a) The Depositor shall prepare or cause to be prepared the initial current report on Form 8-K. Within 15 days after each Distribution Date, the Trustee shall, in accordance with industry standards, file with the Commission via the Electronic Data Gathering and Retrieval System (“XXXXX”), a Form 8-K with a copy of the monthly statement to be furnished by the Trustee to the Certificateholders for such Distribution Date as an exhibit thereto. Prior to January 30 in each year commencing in 2006, the Trustee shall, in accordance with industry standards, file a Form 15 Suspension Notice with respect to the Trust Fund, if applicable. Prior to (i) March 15, 2006 and (ii) unless and until a Form 15 Suspension Notice shall have been filed, prior to March 15 of each year thereafter, the Master Servicer shall provide the Trustee with a Master Servicer Certification, together with a copy of the annual independent accountant’s servicing report and annual statement of compliance to be delivered by the Master Servicer pursuant to Sections 3.13 and 3.14. Prior to (i) March 31, 2006 and (ii) unless and until a Form 15 Suspension Notice shall have been filed, March 31 of each year thereafter, the Trustee shall, subject to subsection (d) below, file a Form 10-K, in substance conforming to industry standards, with respect to the Trust Fund. Such Form 10-K shall include the Master Servicer Certification and other documentation provided by the Master Servicer pursuant to the second preceding sentence and the Form 10-K certification signed by the Depositor. The Depositor hereby grants to the Trustee a limited power of attorney to execute and file each such document on behalf of the Depositor. Such power of attorney shall continue until either the earlier of (i) receipt by the Trustee from the Depositor of written termination of such power of attorney and (ii) the termination of the Trust Fund. The Depositor agrees to promptly furnish to the Trustee, from time to time upon request, such further information, reports and financial statements within its control related to this Agreement, the Mortgage Loans as the Trustee reasonably deems appropriate to prepare and file all necessary reports with the Commission. The Trustee shall have no responsibility to file any items other than those specified in this Section 3.16; provided, however, the Trustee will cooperate with the Depositor in connection with any additional filings with respect to the Trust Fund as the Depositor deems necessary under the Securities Exchange Act of 1934, as amended (the “Exchange Act”). Copies of all reports filed by the Trustee under the Exchange Act shall be sent to: the Depositor c/o Bear, Xxxxxxx & Co. Inc., Attn: Managing Director-Analysis and Control, Xxx Xxxxxxxxx Xxxxxx Xxxxx, Xxxxxxxx, Xxx Xxxx 00000 3859. Fees and expenses incurred by the Trustee in connection with this Section 3.16 shall not be reimbursable from the Trust Fund. (b) In connection with the filing of any 10-K hereunder, the Trustee shall sign a certification (in the form attached hereto as Exhibit K) for the Depositor regarding certain aspects of the Form 10-K certification signed by the Depositor, provided, however, that the Trustee shall not be required to undertake an analysis of any accountant’s report attached as an exhibit to the Form 10-K. (c) The Trustee shall indemnify and hold harmless the Depositor and its officers, directors and affiliates from and against any losses, damages, penalties, fines, forfeitures, reasonable and necessary legal fees and related costs, judgments and other costs and expenses arising out of or based upon a breach of the Trustee’s obligations under this Section 3.16 or the Trustee’s negligence, bad faith or willful misconduct in connection therewith. The Depositor shall indemnify and hold harmless the Trustee and its officers, directors and affiliates from and against any losses, damages, penalties, fines, forfeitures, reasonable and necessary legal fees and related costs, judgments and other costs and expenses arising out of or based upon a breach of the obligations of the Depositor under this Section 3.16 or the Depositor’s negligence, bad faith or willful misconduct in connection therewith. The Master Servicer shall indemnify and hold harmless the Trustee and the Depositor and their respective officers, directors and affiliates from and against any losses, damages, penalties, fines, forfeitures, reasonable and necessary legal fees and related costs, judgments and other costs and expenses arising out of or based upon a breach of the obligations of the Master Servicer under this Section 3.16 or the Master Servicer’s negligence, bad faith or willful misconduct in connection therewith. If the indemnification provided for herein is unavailable or insufficient to hold harmless the Depositor or the Trustee, as applicable, then the defaulting party, in connection with a breach of its respective obligations under this Section 3.16 or its respective negligence, bad faith or willful misconduct in connection therewith, agrees that it shall contribute to the amount paid or payable by the other parties as a result of the losses, claims, damages or liabilities of the other party in such proportion as is appropriate to reflect the relative fault and the relative benefit of the Depositor on the one hand and the Trustee on the other. (d) Nothing shall be construed from the foregoing subsections (a), (b) and (c) to require the Trustee or any officer, director or Affiliate thereof to sign any Form 10-K or any certification contained therein. Furthermore, the inability of the Trustee to file a Form 10-K as a result of the lack of required information as set forth in Section 3.16(a) or required signatures on such Form 10-K or any certification contained therein shall not be regarded as a breach by the Trustee of any obligation under this Agreement. (e) Notwithstanding the provisions of Section 11.01, this Section 3.16 may be amended without the consent of the Certificateholders.

  • CONFIDENTIAL PORTION OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION Schedule A to Arbitration Agreement

  • Intercept and Referral Announcements 6.1 When a Customer changes its service provider from Verizon to KDL, or from KDL to Verizon, and does not retain its original telephone number, the Party formerly providing service to such Customer shall provide a referral announcement (“Referral Announcement”) on the abandoned telephone number which provides the Customer’s new number or other appropriate information, to the extent known to the Party formerly providing service. Notwithstanding the foregoing, a Party shall not be obligated under this Section to provide a Referral Announcement if the Customer owes the Party unpaid overdue amounts or the Customer requests that no Referral Announcement be provided. 6.2 Referral Announcements shall be provided, in the case of business Customers, for a period of not less than one hundred and twenty (120) days after the date the Customer changes its telephone number, and, in the case of residential Customers, not less than thirty (30) days after the date the Customer changes its telephone number; provided that if a longer time period is required by Applicable Law, such longer time period shall apply. Except as otherwise provided by Applicable Law, the period for a referral may be shortened by the Party formerly providing service if a number shortage condition requires reassignment of the telephone number. 6.3 This referral announcement will be provided by each Party at no charge to the other Party; provided that the Party formerly providing service may xxxx the Customer its standard Tariff charge, if any, for the referral announcement.

  • Picnic Day 49.1 The Parties agree that Building Industry Picnic Day will continue to apply during the life of this Agreement in accordance with the following: (a) The first Monday in December of each year shall be the building industry picnic day, except in Mildura. The second Monday in December shall be the building industry picnic day within an area of 25 kilometres from Mildura. (b) All Employees shall, as far as practicable, be given and shall take this day as Picnic Day without deduction of pay. (c) Any Employee required to work on this day shall be paid at the rate of double time and a half; provided that an Employee who attends for work as required on this day shall be paid for not less than four hours work. (d) The Employer may require from an Employee evidence of their attendance at the picnic and the production of the butt of a ticket issued for the picnic shall be sufficient evidence of such attendance. Where such evidence is requested by the Employer payment need not be made unless the evidence is produced. This requirement only applies so long as all Employees remain eligible to obtain a ticket for Picnic Day regardless of whether or not they are a Union member.

  • Data Security and Unauthorized Data Release The Requester and Approved Users, including the Requester’s IT Director, acknowledge NIH’s expectation that they have reviewed and agree to manage the requested controlled-access dataset(s) and any Data Derivatives of controlled-access datasets according to NIH’s expectations set forth in the current NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy and the Requester’s IT security requirements and policies. The Requester, including the Requester’s IT Director, agree that the Requester’s IT security requirements and policies are sufficient to protect the confidentiality and integrity of the NIH controlled-access data entrusted to the Requester. If approved by NIH to use cloud computing for the proposed research project, as outlined in the Research and Cloud Computing Use Statements of the Data Access Request, the Requester acknowledges that the IT Director has reviewed and understands the cloud computing guidelines in the NIH Security Best Practices for Controlled-Access Data Subject to the NIH GDS Policy. The Requester and PI agree to notify the appropriate DAC(s) of any unauthorized data sharing, breaches of data security, or inadvertent data releases that may compromise data confidentiality within 24 hours of when the incident is identified. As permitted by law, notifications should include any known information regarding the incident and a general description of the activities or process in place to define and remediate the situation fully. Within 3 business days of the DAC notification, the Requester agrees to submit to the DAC(s) a detailed written report including the date and nature of the event, actions taken or to be taken to remediate the issue(s), and plans or processes developed to prevent further problems, including specific information on timelines anticipated for action. The Requester agrees to provide documentation verifying that the remediation plans have been implemented. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. NIH, or another entity designated by NIH may, as permitted by law, also investigate any data security incident or policy violation. Approved Users and their associates agree to support such investigations and provide information, within the limits of applicable local, state, tribal, and federal laws and regulations. In addition, Requester and Approved Users agree to work with the NIH to assure that plans and procedures that are developed to address identified problems are mutually acceptable and consistent with applicable law.

  • Securities and Exchange Commission Filings To the extent permitted by law, the Servicer is authorized to execute and, on the request of the Issuer or the Administrator, will prepare, execute and file, on behalf of the Issuer, any Securities and Exchange Commission filings required to be filed by the Issuer under Section 7.3 of the Indenture.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!