Security and Internal Controls Sample Clauses

Security and Internal Controls. You agree to the following: a) take reasonable steps to safeguard original Checks; b) keep Checks in a safe and secure area; c) limit access to original Checks and to the information contained on such Checks; d) limit access to your mobile device; e) prohibit sharing of, and access to userids and passwords; f) immediately contact Avadian if security of the system and/or original Checks is breached in any way;
AutoNDA by SimpleDocs
Security and Internal Controls. In accordance with Acquia’s Security Annex incorporated herein by reference, Acquia shall (i) maintain a security framework of policies, procedures, and controls that includes administrative, physical, and technical safeguards for protection of the security and integrity of the Subscription Services, and of the Customer Data contained within the Subscription Services, using the capabilities of currently available technologies and in accordance with prevailing industry practices and standards, (ii) access and use the Customer Data solely to perform its obligations in accordance with the terms of this Agreement, and (iii) perform periodic testing by independent third party audit organizations, which include with Service Organization Controls 1 (SOC 1), SOC 2 audits and ISO 27001 certification or surveillance audits performed annually. In no event during the Subscription Term shall Acquia materially diminish the protections provided by the controls set forth in Acquia’s then-current Security Annex.
Security and Internal Controls. Nuvolo will maintain administrative, physical, and technical safeguards for protection of the security, confidentiality and integrity of Customer Data in its possession, using the capabilities of currently available technologies and in accordance with prevailing industry practices and standards. Those safeguards will include, but will not be limited to, measures for preventing access, use, modification or disclosure of Customer Data by Nuvolo personnel except (a) to provide Support Services; (b) to provide Professional Services; (c) as compelled by law in accordance with Section 8, or (d) as otherwise required for meeting its obligations hereunder.
Security and Internal Controls. In accordance with TrackTrace RX’s Security policies, TrackTrace RX shall (i) maintain a security framework of policies, procedures, and controls that includes administrative, physical, and technical safeguards for protection of the security and integrity of the Subscription Services, and of the Customer Data contained within the Subscription Services, using the capabilities of currently available technologies and in accordance with prevailing industry practices and standards, (ii) access and use the Customer Data solely in accordance with the terms of this Agreement. In no event during the Subscription Term shall TrackTrace RX materially diminish the protections provided by the controls set forth in TrackTrace RX’s then-current Security policies.
Security and Internal Controls. In accordance with PathMatch’s Security Annex incorporated herein by reference, PathMatch shall (i) maintain a security framework of policies, procedures, and controls that includes administrative, physical, and technical safeguards for protection of the security and integrity of the Subscription Services, and of the Customer Data contained within the Subscription Services, using the capabilities of currently available technologies and in accordance with prevailing industry practices and standards, (ii) access and use the Customer Data solely to perform its obligations in accordance with the terms of this Agreement, and
Security and Internal Controls. You agree to the following: a) take reasonable steps to safeguard original Checks;

Related to Security and Internal Controls

  • Internal Controls The Company shall maintain a system of internal accounting controls sufficient to provide reasonable assurances that: (i) transactions are executed in accordance with management’s general or specific authorization; (ii) transactions are recorded as necessary in order to permit preparation of financial statements in accordance with GAAP and to maintain accountability for assets; (iii) access to assets is permitted only in accordance with management’s general or specific authorization; and (iv) the recorded accountability for assets is compared with existing assets at reasonable intervals and appropriate action is taken with respect to any differences.

  • Internal Control Effective control and accountability must be maintained for all cash, real and personal property, and other assets. Grantee must adequately safeguard all such property and must provide assurance that it is used solely for authorized purposes. Grantee must also have systems in place that provide reasonable assurance that the information is accurate, allowable, and compliant with the terms and conditions of this Agreement. 2 CFR 200.303.

  • Financial Controls At all times, the Charter School shall maintain appropriate governance and managerial procedures and financial controls which procedures and controls shall include, but not be limited to: (1) commonly accepted accounting practices and the capacity to implement them (2) a checking account; (3) adequate payroll procedures; (4) procedures for the creation and review of monthly and quarterly financial reports, which procedures shall specifically identify the individual who will be responsible for preparing such financial reports in the following fiscal year; (5) internal control procedures for cash receipts, cash disbursements and purchases; and (6) maintenance of asset registers and financial procedures for grants in accordance with applicable state and federal law.

  • Financial Reports Borrower shall furnish to Agent the financial statements and reports listed hereinafter (the “Financial Statements”):

  • Audit Controls a. System Security Review. CONTRACTOR must ensure audit control mechanisms that record and examine system activity are in place. All systems processing and/or storing PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have at least an annual system risk assessment/security review which provides assurance that administrative, physical, and technical controls are functioning effectively and providing adequate levels of protection. Reviews should include vulnerability scanning tools.

  • Personal Controls a. Employee Training. All workforce members who assist in the performance of functions or activities on behalf of COUNTY in connection with Agreement, or access or disclose PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, must complete information privacy and security training, at least annually, at CONTRACTOR’s expense. Each workforce member who receives information privacy and security training must sign a certification, indicating the member’s name and the date on which the training was completed. These certifications must be retained for a period of six (6) years following the termination of Agreement.

  • Financial Reporting Requirements The Charter School shall follow the financial requirements of the Charter Schools Section of the Department’s Financial Management for Georgia Local Units of Administration Manual. The Charter School shall submit all information required by the State Accounting Office for inclusion in the State of Georgia Comprehensive Annual Financial Report.

  • Access Controls The system providing access to PHI COUNTY discloses to 20 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 21 must use role based access controls for all user authentications, enforcing the principle of least privilege.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!