Security Controls. Annually, upon Fund’s reasonable request, DST shall provide Fund’s Chief Information Security Officer or his or her designee with a summary of its corporate information security policy and an opportunity to discuss DST’s information security measures, and a high level and non-confidential summary of any penetration testing related to the provision of in-scope services . DST shall review its Security Policy annually.
Security Controls. Annually, upon Fund’s reasonable request, Transfer Agent shall provide Fund’s Chief Information Security Officer or his or her designee with a copy of its corporate information security controls that form the basis for Transfer Agent’s Security Policy and an opportunity to discuss Transfer Agent’s information security measures, and a high level summary of any vulnerability testing conducted by Transfer Agent on its information security controls, with a qualified member of Transfer Agent’s information technology management team. Transfer Agent shall review its Security Policy annually.
Security Controls. You must implement and maintain safeguards and security controls that are reasonable for the size, nature and maturity of your business and industry to protect Verification Data and Stripe Data against unauthorised access, use and disclosure. If you fail to do so, in addition to all other remedies available to Stripe, Stripe may suspend or restrict your access to the Stripe Identity Services and Verification Data.
Security Controls. Apple will assist You to ensure Your compliance with Your obligations with regards to the security of Personal Data, including, if applicable, Your Institution’s obligations, under Article 32 of the GDPR, by implementing the Security Procedures set forth in section 3F of this Agreement and by maintaining the ISO 27001 Certification and ISO 27018 Certification. Apple will make available for review by Institution the certificates issued in relation to the ISO 27001 Certification and ISO 27018 Certification following a request by You or Your Institution under this Section 3G.
Security Controls. Prior to State Street having access to Client Data, then annually and upon Client’s reasonable request, State Street shall provide Client’s Chief Information Security Officer or his or her designee with a copy of its corporate information security controls that form the basis for State Street’s Security Policy and an opportunity to discuss State Street’s information security measures with a qualified member of State Street’s information technology management team.
Security Controls. Provider represents and warrants that any software licensed hereunder shall not contain any virus, worm, Trojan Horse, tracking software or be capable of identifying non-approved users or tracking any approved user, or any undocumented software locks or drop dead devices that would render inaccessible or impair in any way the operation of the software or any other hardware, software or data for which the software is designed to work with.
Security Controls. The Contractor shall implement the following security controls on each workstation or portable computing device (e.g., laptop computer) containing confidential, personal, or sensitive data:
(A) Network-based firewall and/or personal firewall;
(B) Continuously updated anti-virus software; and
(C) Patch management process including installation of all operating system/software vendor security patches.
Security Controls. If the Contract authorizes Provider to access, transmit, use, or store data for the GLO, then in accordance with Section 2054.138 of the Texas Government Code, Provider certifies that it will comply with the security controls required under this Contract and will maintain records and make them available to the GLO as evidence of Provider’s compliance with the required controls.
Security Controls. 2.1 Provider will store and process Data in accordance with commercially reasonable practices. This includes appropriate administrative, physical, and technical safeguards to secure Data from unauthorized access, disclosure, and use.
2.2 Provider will conduct periodic risk assessments and remediate any identified security vulnerabilities in a timely manner.
2.3 Provider will also have a written incident response plan, to include immediate (within one (1) business day) notification of APS in the event of a security or privacy incident involving Data. Provider agrees to share its incident response plan upon request.
Security Controls. Contractor shall implement security controls in accordance with the City’s Security Policy and Standards or any other acceptable standard to assess any solution prior to first release or release of any major improvement or enhancement. Contractor’s solution must be audited by a third party at least once a year and results shall be share with City along with regular updates on risk mitigation.