Security of Information Unless otherwise specifically authorized by the DOH Chief Information Security Officer, Contractor receiving confidential information under this contract assures that: • Encryption is selected and applied using industry standard algorithms validated by the National Institute of Standards and Technology (NIST) Cryptographic Algorithm Validation Program against all information stored locally and off-site. Information must be encrypted both in-transit and at rest and applied in such a way that it renders data unusable to anyone but authorized personnel, and the confidential process, encryption key or other means to decipher the information is protected from unauthorized access. • It is compliant with the applicable provisions of the Washington State Office of the Chief Information Officer (OCIO) policy 141, Securing Information Technology Assets, available at: xxxxx://xxxx.xx.xxx/policy/securing-information-technology-assets. • It will provide DOH copies of its IT security policies, practices and procedures upon the request of the DOH Chief Information Security Officer. • DOH may at any time conduct an audit of the Contractor’s security practices and/or infrastructure to assure compliance with the security requirements of this contract. • It has implemented physical, electronic and administrative safeguards that are consistent with OCIO security standard 141.10 and ISB IT guidelines to prevent unauthorized access, use, modification or disclosure of DOH Confidential Information in any form. This includes, but is not limited to, restricting access to specifically authorized individuals and services through the use of: o Documented access authorization and change control procedures; o Card key systems that restrict, monitor and log access; o Locked racks for the storage of servers that contain Confidential Information or use AES encryption (key lengths of 256 bits or greater) to protect confidential data at rest, standard algorithms validated by the National Institute of Standards and Technology (NIST) Cryptographic Algorithm Validation Program (CMVP); o Documented patch management practices that assure all network systems are running critical security updates within 6 days of release when the exploit is in the wild, and within 30 days of release for all others; o Documented anti-virus strategies that assure all systems are running the most current anti-virus signatures within 1 day of release; o Complex passwords that are systematically enforced and password expiration not to exceed 120 days, dependent user authentication types as defined in OCIO security standards; o Strong multi-factor authentication mechanisms that assure the identity of individuals who access Confidential Information; o Account lock-out after 5 failed authentication attempts for a minimum of 15 minutes, or for Confidential Information, until administrator reset; o AES encryption (using key lengths 128 bits or greater) session for all data transmissions, standard algorithms validated by NIST CMVP; o Firewall rules and network address translation that isolate database servers from web servers and public networks; o Regular review of firewall rules and configurations to assure compliance with authorization and change control procedures; o Log management and intrusion detection/prevention systems; o A documented and tested incident response plan Any breach of this clause may result in termination of the contract and the demand for return of all personal information.
Preservation of Information; Communications to Holders The Trustee shall preserve, in as current a form as is reasonably practicable, the names and addresses of Holders contained in the most recent list furnished to the Trustee as provided in Section 701 and the names and addresses of Holders received by the Trustee in its capacity as Security Registrar. The Trustee may destroy any list furnished to it as provided in Section 701 upon receipt of a new list so furnished. The rights of Holders to communicate with other Holders with respect to their rights under this Indenture or under the Securities, and the corresponding rights and privileges of the Trustee, shall be as provided by the Trust Indenture Act. Every Holder of Securities, by receiving and holding the same, agrees with the Company and the Trustee that neither the Company nor the Trustee nor any agent of either of them shall be held accountable by reason of any disclosure of information as to names and addresses of Holders made pursuant to the Trust Indenture Act.
Accessibility of Information Technology Contractor represents and warrants that any software/ hardware/ communications system/ equipment (collectively “technology”), if any, provided under this Agreement adheres to the standards and/or specifications as may be set forth in the Section 508 of the Rehabilitation Act of 1973 standards guide and is fully compliant with WCAG 2.0 AA standards for accessibility and compliant with any applicable FCC regulations. Technology that will be used on a mobile device must also be navigable with Voiceover on iOS devices in addition to meeting WCAG 2.0 level AA. If portions of the technology or user experience are alleged to be non-compliant or non- accessible at any point, District will provide Contractor with notice of such allegation and Contractor shall use its best efforts to make the technology compliant and accessible. If a state or federal department, office or regulatory agency, or if any other third party administrative agency or organization (“Claimants”), make a claim, allegation, initiates legal or regulatory process, or if a court finds or otherwise determines that technology is non-compliant or non-accessible, Contractor shall indemnify, defend and hold harmless the District from and against any and all such claims, allegations, liabilities, damages, penalties, fees, costs (including but not limited to reasonable attorneys’ fees), arising out of or related to Xxxxxxxxx’ claims. Contractor shall also fully indemnify District for the full cost of any user accommodation that is found to be necessary due to an identifiable lack of accessibility in the Contractor’s technology. If necessary, an independent 3rd party accessibility firm using POUR standards (Perceivable, Operable, Understandable and Robust) may be used to validate the accessibility of the technology.
Use of Information Collected ICON may collect and may make use of personal information to assist in the operation of our website and to ensure delivery of the services you need and request. At times, we may find it necessary to use personally identifiable information (PII) as a means to keep you informed of other possible products and/or services that may be available to you from xxxxx://xxxx.xxxx.xxx. ICON may also be in contact with you in regards to completing surveys and/or research questionnaires related to your opinion of current or potential future services that may be offered. ICON does not now, but reserves the right in the future to sell, rent or lease any of our customer lists and/or names to any third party. ICON may deem it necessary to follow websites and/or pages that users may frequent in an effort to glean what types of services and/or products may be the most popular to customers or the public ICON may disclose your personal/organizational information, without prior notice to you, ONLY if required to do so in accordance with applicable laws and/or in a good faith belief that such action is deemed necessary or is required in an effort to: • Remain in compliance with any decrees, laws and/or statutes or in an effort to comply with any process which may be served upon ICON, and/or; • Maintain safeguard and/or preserve all the rights and/or property of ICON, and • Perform under demanding conditions in an effort to safeguard the personal safety of users of xxxxx://xxxx.xxxx.xxx and/or general public. All users and/or visitors to our website have the option to discontinue receiving communication from us and/or reserve the right to discontinue receiving communications by way of email or newsletters. To discontinue or unsubscribe to our website please send an email that you wish to unsubscribe/register to Xxxxxxx@xxxx.xxx. If you wish to unsubscribe/register or opt-out from any third- party websites, you must go to that specific website to unsubscribe and/or opt-out.
Preservation of Information; Communications to Noteholders (a) The Indenture Trustee shall preserve, in as current a form as is reasonably practicable, the names and addresses of the Holders of Notes contained in the most recent list furnished to the Indenture Trustee as provided in Section 7.1 and the names and addresses of the Holders of Notes received by the Indenture Trustee in its capacity as Note Registrar. The Indenture Trustee may destroy any list furnished to it as provided in Section 7.1 upon receipt of a new list so furnished. (b) Noteholders may communicate pursuant to TIA Section 312(b) with other Noteholders with respect to their rights under this Indenture or under the Notes. (c) The Issuer, the Indenture Trustee and the Note Registrar shall have the protection of TIA Section 312(c).
Treatment of Information (a) Certain of the Lenders may enter into this Agreement and take or not take action hereunder or under the other Loan Documents on the basis of information that does not contain material non-public information with respect to any of the Loan Parties or their securities (“Restricting Information”). Other Lenders may enter into this Agreement and take or not take action hereunder or under the other Loan Documents on the basis of information that may contain Restricting Information. Each Lender acknowledges that United States federal and state securities laws prohibit any person from purchasing or selling securities on the basis of material, non-public information concerning the issuer of such securities or, subject to certain limited exceptions, from communicating such information to any other Person. Neither the Administrative Agent nor any of its Affiliates shall, by making any Communications (including Restricting Information) available to a Lender, by participating in any conversations or other interactions with a Lender or otherwise, make or be deemed to make any statement with regard to or otherwise warrant that any such information or Communication does or does not contain Restricting Information nor shall the Administrative Agent or any of its Affiliates be responsible or liable in any way for any decision a Lender may make to limit or to not limit its access to Restricting Information. In particular, none of the Administrative Agent nor any of its Affiliates (i) shall have, and the Administrative Agent, on behalf of itself and each of its Affiliates, hereby disclaims, any duty to ascertain or inquire as to whether or not a Lender has or has not limited its access to Restricting Information, such Lender’s policies or procedures regarding the safeguarding of material, nonpublic information or such Lender’s compliance with applicable laws related thereto or (ii) shall have, or incur, any liability to any Loan Party or Lender or any of their respective Affiliates arising out of or relating to the Administrative Agent or any of its Affiliates providing or not providing Restricting Information to any Lender. (b) Each Lender acknowledges that circumstances may arise that require it to refer to Communications that might contain Restricting Information. Accordingly, each Lender agrees that it will nominate at least one designee to receive Communications (including Restricting Information) on its behalf and identify such designee (including such designee’s contact information) on such Lender’s Administrative Questionnaire. Each Lender agrees to notify the Administrative Agent from time to time of such Lender’s designee’s e-mail address to which notice of the availability of Restricting Information may be sent by electronic transmission. (c) Each Lender acknowledges that Communications delivered hereunder and under the other Loan Documents may contain Restricting Information and that such Communications are available to all Lenders generally. Each Lender that elects not to take access to Restricting Information does so voluntarily and, by such election, acknowledges and agrees that the Administrative Agent and other Lenders may have access to Restricting Information that is not available to such electing Lender. None of the Administrative Agent nor any Lender with access to Restricting Information shall have any duty to disclose such Restricting Information to such electing Lender or to use such Restricting Information on behalf of such electing Lender, and shall not be liable for the failure to so disclose or use, such Restricting Information. (d) The provisions of the foregoing clauses of this Section 10.09 are designed to assist the Administrative Agent, the Lenders and the Loan Parties, in complying with their respective contractual obligations and applicable law in circumstances where certain Lenders express a desire not to receive Restricting Information notwithstanding that certain Communications hereunder or under the other Loan Documents or other information provided to the Lenders hereunder or thereunder may contain Restricting Information. Neither the Administrative Agent nor any of its Affiliates warrants or makes any other statement with respect to the adequacy of such provisions to achieve such purpose nor does the Administrative Agent or any of its Affiliates warrant or make any other statement to the effect that an Loan Party’s or Lender’s adherence to such provisions will be sufficient to ensure compliance by such Loan Party or Lender with its contractual obligations or its duties under applicable law in respect of Restricting Information and each of the Lenders and each Loan Party assumes the risks associated therewith.
Confidential Nature of Information Each party agrees that it will treat in confidence all documents, materials and other information which it shall have obtained regarding the other party during the course of the negotiations leading to the consummation of the transactions contemplated hereby (whether obtained before or after the date of this Agreement), the investigation provided for herein and the preparation of this Agreement and other related documents, and, if the transactions contemplated hereby are not consummated, each party will return to the other party all copies of nonpublic documents and materials which have been furnished in connection therewith. Such documents, materials and information shall not be communicated to any third Person (other than, in the case of Buyer, to its counsel, accountants, financial advisors or lenders, and in the case of Seller, to its counsel, accountants or financial advisors). No other party shall use any confidential information in any manner whatsoever except solely for the purpose of evaluating the proposed purchase and sale of the Purchased Assets; provided, however, that after the Closing Buyer may use or disclose any confidential information included in the Purchased Assets or otherwise reasonably related to the Business or the Purchased Assets. The obligation of each party to treat such documents, materials and other information in confidence shall not apply to any information which (i) is or becomes available to such party from a source other than the other party, (ii) is or becomes available to the public other than as a result of disclosure by such party or its agents, (iii) is required to be disclosed under applicable law or judicial process, but only to the extent it must be disclosed, or (iv) such party reasonably deems necessary to disclose to obtain any of the consents or approvals contemplated hereby.
Disclosure of Information to Third Parties We may disclose information to third parties about your Card or the transactions you make: (a) where it is necessary for completing transactions; (b) to verify either a transaction you make or the existence and condition of your Card to a third party; (c) to utilize services of third parties and affiliate entities who assist us in providing the Card and related services; (d) to comply with government agency rules or court orders; (e) if you give us your permission; (f ) if you owe us money or there are legal proceedings in connection with your Card, information may be released to attorneys, accounts, collection bureaus, financial institutions, and others involved in collection, adjustment, settlement or reporting; (g) to protect against potential fraud and other crimes; or (h) when otherwise permitted by law. We may also share information about you and your Card, based on our transactions and experiences with you, with our parent, affiliate, and subsidiary companies. You authorize us to make such credit, employment and investigative inquiries, as we deem appropriate in connection with the issuance and use of the Card. We can furnish information concerning the Card or creditable to consumer reporting agencies and others who may properly receive that information.
Safeguarding Customer Information The Servicer has implemented and will maintain security measures designed to meet the objectives of the Interagency Guidelines Establishing Standards for Safeguarding Customer Information published in final form on February 1, 2001, 66 Fed. Reg. 8616 and the rules promulgated thereunder, as amended from time to time (the “Guidelines”). The Servicer shall promptly provide the Master Servicer, the Trustee and the NIMS Insurer information reasonably available to it regarding such security measures upon the reasonable request of the Master Servicer, the Trustee and the NIMS Insurer which information shall include, but not be limited to, any Statement on Auditing Standards (SAS) No. 70 report covering the Servicer’s operations, and any other audit reports, summaries of test results or equivalent measures taken by the Servicer with respect to its security measures to the extent reasonably necessary in order for the Seller to satisfy its obligations under the Guidelines.
Availability of Information To make DHCS PI and PII available to the DHCS and/or 15 COUNTY for purposes of oversight, inspection, amendment, and response to requests for records, 16 injunctions, judgments, and orders for production of DHCS PI and PII. If CONTRACTOR receives 17 DHCS PII, upon request by COUNTY and/or DHCS, CONTRACTOR shall provide COUNTY and/or 18 DHCS with a list of all employees, contractors and agents who have access to DHCS PII, including 19 employees, contractors and agents of its subcontractors and agents.