Security and Recovery Sample Clauses

Security and Recovery. The Contractor shall maintain risk control procedures to protect against unauthorized access of both computer resources and data to reduce erroneous or fraudulent ACH transfer activities. The Contractor shall further maintain a robust, alternate ACH service resumption plan, which addresses events affecting the Contractor’s site, the STS Data Center and the State’s offices. Such risk control procedures and service resumption plan shall be developed by the Contractor and the State and shall be included in the Operating Procedures described in Section A.2 above. Such plan shall provide for timeframe(s) and procedures for resumption of ACH processing in the event of a disaster, which affects the Contractor’s primary service delivery office(s). The plan shall also require the Contractor to coordinate with STS and the State’s Disaster Recovery site vendor to assure the redirection of the ACH communications link to the State’s Disaster Recovery hot site along with any State leased circuits and the availability of encrypted transmission capability to the State Disaster Recovery site due to an event requiring STS to shift State operations to its Disaster Recovery site. The plan shall also include a plan for the physical exchange of ACH files with the State in the event that electronic delivery is not feasible.
AutoNDA by SimpleDocs
Security and Recovery. The Contractor shall maintain risk control procedures to protect against unauthorized access of both computer resources and data to reduce erroneous or fraudulent wire transfer activities. The Contractor shall further maintain a robust, alternate wire transfer service resumption plan, which addresses events affecting the Contractor’s site, the Strategic Technology Solutions (STS) Data Center and the State’s offices. Such risk control procedures and service resumption plan shall be developed by the Contractor and the State and shall be included in the Operating Procedures described in Section A.2 above. Such plan shall provide for the timeframe and procedures for resumption of wire transfer processing in the event of a disaster, which affects the Contractor’s primary service delivery office(s). The plan shall also require the Contractor to coordinate with STS and the State’s Disaster Recovery site vendor to assure the redirection of the wire transfer communications link to the State’s Disaster Recovery hot site along with any State leased circuits and the availability of encrypted transmission capability to the State Disaster Recovery site due to an event requiring STS to shift State operations to its Disaster Recovery site. The plan shall also include a plan for the physical exchange of wire transfer files, or an alternate communication method with the State, in the event that electronic delivery is not feasible.
Security and Recovery. The Contractor shall maintain risk control procedures to protect against unauthorized access of both computer resources and data to reduce erroneous or fraudulent custodial trade activities. The Contractor shall further maintain a robust, alternate service resumption plan, which addresses events affecting the Contractor’s site, the STS Data Center and the State’s offices. Such risk control procedures and service resumption plan shall be developed by the Contractor and the State and shall be included in the Operating Procedures described in Section A.2 above. Such plan shall provide for resumption of custody services and processing in the event of a disaster, which affects the Contractor’s primary service delivery office(s). The plan shall also require the Contractor to coordinate with STS and the State’s Disaster Recovery site vendor to assure the redirection of the custodial trade communications link to the State’s Disaster Recovery hot site along with any State leased circuits and the availability of encrypted transmission capability to the State Disaster Recovery site due to an event requiring STS to shift State operations to its Disaster Recovery site. The plan shall also include a plan for the physical exchange of custodial trade files, or an alternate communication method with the State, in the event that electronic delivery is not feasible.

Related to Security and Recovery

  • Security and Charge 14.1 In consideration of the Contractor agreeing to supply the Materials, the Client charges all of its rights, title and interest (whether joint or several) in any land, realty or other assets capable of being charged, owned by the Client either now or in the future, to secure the performance by the Client of its obligations under these terms and conditions (including, but not limited to, the payment of any money).

  • Security and Safety A. The Contractor warrants it is and shall remain in compliance with all applicable local, state and federal laws, regulations, codes and ordinances relating to fire, construction, building, health, food service and safety, including but not limited to the Hotel and Motel Fire Safety Act of 1990, Public Law 101-391. The Judicial Council may terminate this Agreement, pursuant to the termination for cause provision set forth herein, without penalty or prejudice if the Contractor fails to comply with the foregoing requirements.

  • Use, Security, and Retention Local Agency shall use, hold and maintain State Confidential Information in compliance with any and all applicable laws and regulations in facilities located within the United States, and shall maintain a secure environment that ensures confidentiality of all State Confidential Information wherever located. Local Agency shall provide the State with access, subject to Local Agency’s reasonable security requirements, for purposes of inspecting and monitoring access and use of State Confidential Information and evaluating security control effectiveness. Upon the expiration or termination of this Agreement, Local Agency shall return State Records provided to Local Agency or destroy such State Records and certify to the State that it has done so, as directed by the State. If Local Agency is prevented by law or regulation from returning or destroying State Confidential Information, Local Agency warrants it will guarantee the confidentiality of, and cease to use, such State Confidential Information.

  • UNION SECURITY AND CHECKOFF 5:01 It shall be a condition of continued employment for all employees including probationary employees, as defined in Article 2, to become members and maintain membership in good standing in the Union.

  • Security and Privacy 3. Security and privacy policies for the Genesys Cloud Service addressing use of Customer Data, which are incorporated by reference, are located at xxxxx://xxxx.xxxxxxxxxxx.xxx/articles/Genesys Cloud-security-compliance/.

  • Security and Validation Procedures The Scheduling Coordinator shall apply to the Meter Data of the Scheduling Coordinator Metered Entities that it represents the security and validation procedures prescribed by the relevant Local Regulatory Authority. If the relevant Local Regulatory Authority has not prescribed any such procedures, the Scheduling Coordinator shall apply the procedures set forth in the CAISO Tariff. Meter Data submitted by a Scheduling Coordinator for Scheduling Coordinator Metered Entities shall conform to these standards unless the CAISO has, at its discretion, exempted the Scheduling Coordinator from these standards.

  • Security and Data Transfers Party shall comply with all applicable State and Agency of Human Services' policies and standards, especially those related to privacy and security. The State will advise the Party of any new policies, procedures, or protocols developed during the term of this agreement as they are issued and will work with the Party to implement any required. Party will ensure the physical and data security associated with computer equipment, including desktops, notebooks, and other portable devices, used in connection with this Agreement. Party will also assure that any media or mechanism used to store or transfer data to or from the State includes industry standard security mechanisms such as continually up-to-date malware protection and encryption. Party will make every reasonable effort to ensure media or data files transferred to the State are virus and spyware free. At the conclusion of this agreement and after successful delivery of the data to the State, Party shall securely delete data (including archival backups) from Party’s equipment that contains individually identifiable records, in accordance with standards adopted by the Agency of Human Services. Party, in the event of a data breach, shall comply with the terms of Section 7 above.

  • Security and Data Privacy Each party will comply with applicable data privacy laws governing the protection of personal data in relation to their respective obligations under this Agreement. Where Siemens acts as Customer’s processor of personal data provided by Customer, the Data Privacy Terms available at xxxxx://xxx.xxxxxxx.xxx/dpt/sw, including the technical and organizational measures described therein, apply to the use of the relevant Learning Services and are incorporated herein by reference.

  • UNION SECURITY AND DUES 3.01 All employees will be required to pay Union dues or the equivalent of Union Dues as a condition of employment, and that amount shall be deducted from the wages of each employee employed in any position within the bargaining unit described in Article 2 of this Agreement.

  • UNION SECURITY AND CHECK-OFF 5.01 All present seniority employees who are currently members of the Union will be required to continue to be members of the Union as a condition of employment for the duration of this Agreement.

Time is Money Join Law Insider Premium to draft better contracts faster.