REQUIRED SECURITY OPERATIONAL PROCEDURES FOR E-DISCLOSURE EXERCISES Sample Clauses

REQUIRED SECURITY OPERATIONAL PROCEDURES FOR E-DISCLOSURE EXERCISES. The Supplier shall have appropriate policies, processes and procedures in place to ensure the operational security of their infrastructure as follows. Vulnerability management (patch management) The Supplier shall ensure that any exploitable vulnerability is managed. To that end the Supplier shall have a defined policy and supporting process to identify vulnerabilities, and prioritise and mitigate those vulnerabilities. The Supplier’s policy shall specify specific patch application periods and a process for auditing compliance. As a minimum, critical vulnerabilities shall be patched within 14 days, important vulnerabilities within 30 days and other vulnerabilities within 60 days. Where the Supplier knows that a vulnerability is being actively exploited then mitigatory action (e.g. patch applied) shall be taken immediately. Where a Supplier is unable to deploy a patch within the above minimum timescales then the Supplier shall take alternative mitigatory action within the same timescales including for example, but not limited to, disabling or reducing access to the vulnerable service. Secure configuration The Supplier shall ensure that all IT systems, software and services are appropriately configured to reduce the level of inherent vulnerability. In particular the Supplier shall ensure that applications, services, processes and ports not required are disabled by default. The Supplier shall ensure that default passwords are changed immediately, especially for any administrative functions. The Supplier shall keep configuration control of applications installed and technology that it uses. All changes and new versions of applications shall be recorded and managed (including a formal approval and documentation process) by the Supplier. The Supplier shall ensure that devices, systems and services have the capability to detect, isolate and respond to malicious software. Physical security The Supplier shall ensure that appropriately secure accommodation and appropriate policies and practices governing its use are in place to protect personnel, hardware, programs, networks and data from loss, damage or compromise. For services processing SECRET and TOP SECRET information, the Supplier’s accommodation from where the e-Disclosure service will be hosted must be in accordance with the requirements specified in: xxxxx://xxx.xxx.xx/government/publications/security-requirements-for-list-x-contractors Protective monitoring and intrusion detection The Supplier shall collec...

Related to REQUIRED SECURITY OPERATIONAL PROCEDURES FOR E-DISCLOSURE EXERCISES

  • Relationship Disclosure Form The purpose of this form is to document any relationships between a bidder to an Orange County solicitation and the Mayor or any other member of Orange County, Florida. This form shall be completed and submitted with the applicable bid to an Orange County solicitation.

  • WHO WILL REVIEW THE INFORMATION DISCLOSED ON THE RELATIONSHIP DISCLOSURE FORM AND ANY UPDATES?

  • Human and Financial Resources to Implement Safeguards Requirements The Borrower shall make available necessary budgetary and human resources to fully implement the EMP and the RP.

  • Transactions Requiring Disclosure to FINRA 2.17.1 Finder’s Fees. There are no claims, payments, arrangements, agreements or understandings relating to the payment of a finder’s, consulting or origination fee by the Company or any Insider with respect to the sale of the Securities hereunder or any other arrangements, agreements or understandings of the Company or to the Company’s knowledge, assuming reasonable inquiry, any Insider that may affect the Underwriters’ compensation, as determined by FINRA.

  • Risk Disclosure Statement Counterparty represents and warrants that it has received, read and understands the OTC Options Risk Disclosure Statement provided by Dealer and a copy of the most recent disclosure pamphlet prepared by The Options Clearing Corporation entitled “Characteristics and Risks of Standardized Options”.

  • COMPLIANCE WITH POLICIES AND PROCEDURES During the period that Executive is employed with the Company hereunder, Executive shall adhere to the policies and standards of professionalism set forth in the policies and procedures of the Company and IAC as they may exist from time to time.

  • Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls: (i) Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). (ii) Limit information system access to the types of transactions and functions that authorized users are permitted to execute. (iii) Verify and control/limit connections to and use of external information systems. (iv) Control information posted or processed on publicly accessible information systems. (v) Identify information system users, processes acting on behalf of users, or devices. (vi) Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. (vii) Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse. (viii) Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals. (ix) Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices. (x) Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems. (xi) Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. (xii) Identify, report, and correct information and information system flaws in a timely manner. (xiii) Provide protection from malicious code at appropriate locations within organizational information systems. (xiv) Update malicious code protection mechanisms when new releases are available. (xv) Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.

  • Pending Procedures and Examinations The Registration Statement is not the subject of a pending proceeding or examination under Section 8(d) or 8(e) of the 1933 Act, and the Company is not the subject of a pending proceeding under Section 8A of the 1933 Act in connection with the offering of the Securities.

  • Operational Procedures In order to minimize operational problems, it will be necessary for trade information to be supplied in a secure manner by the Subadviser to the Fund’s Service Providers, including: JPMorgan Chase Bank, National Association (the “Custodian”), Virtus Fund Services (the “Fund Administrator”) BNY Mellon Investment Servicing (US) Inc., (the “Sub-Accounting Agent”), any Prime Broker to the Series, and all other Counterparties/Brokers as required. The Subadviser must furnish the Fund’s service providers with required daily information as to executed trades in a format and time-frame agreed to by the Subadviser, Custodian, Fund Administrator, Sub-Accounting Agent and Prime Broker/Counterparties and designated persons of the Fund. Trade information sent to the Custodian, Fund Administrator, Sub-Accounting Agent and Prime Broker/Counterparties must include all necessary data within the required timeframes to allow such parties to perform their obligations to the Series. The Sub-Accounting Agent specifically requires a daily trade blotter with a summary of all trades, in addition to trade feeds, including, if no trades are executed, a report to that effect. Daily information as to executed trades for same-day settlement and future trades must be sent to the Sub-Accounting Agent no later than 4:30 p.m. (Eastern Time) on the day of the trade each day the Fund is open for business. All other executed trades must be delivered to the Sub-Accounting Agent on Trade Date plus 1 by Noon (Eastern Time) to ensure that they are part of the Series’ NAV calculation. (The Subadviser will be responsible for reimbursement to the Fund for any loss caused by the Subadviser’s failure to comply with the requirements of this Schedule A.) On fiscal quarter ends and calendar quarter ends, all trades must be delivered to the Sub-Accounting Agent by 4:30 p.m. (Eastern Time) for inclusion in the financial statements of the Series. The data to be sent to the Sub-Accounting Agent and/or Fund Administrator will be as agreed by the Subadviser, Fund Administrator, Sub-Accounting Agent and designated persons of the Fund and shall include (without limitation) the following:

  • Performance of Services in Accordance with Regulatory Requirements; Furnishing of Books and Records In performing the services set forth in this Agreement, the Manager: A. shall conform with the 1940 Act and all rules and regulations thereunder, with all other applicable federal, state and foreign laws and regulations, with any applicable procedures adopted by the Trust’s Board of Trustees, and with the provisions of the Trust’s Registration Statement filed on Form N-1A as supplemented or amended from time to time; B. will make available to the Trust, promptly upon request, any of the Fund’s books and records as are maintained under this Agreement, and will furnish to regulatory authorities having the requisite authority any such books and records and any information or reports in connection with the Manager’s services under this Agreement that may be requested in order to ascertain whether the operations of the Trust are being conducted in a manner consistent with applicable laws and regulations.