Security Procedures and Protocols Sample Clauses

Security Procedures and Protocols. We may establish and inform you in writing about security features and methods to prevent unauthorized access to the CRS Software and the Central Reservation System. You will follow the commercially reasonable security procedures and protocols we establish. You shall not permit the PTU to be used to breach, attack, evade, destroy or invade the Central Reservation System in violation of the security procedures and protocols. You shall safeguard the User ID and Password we give you as a trade secret, revealed only to your employees on a need to know basis. You will immediately inform us if and when you believe that the User ID and Password have been lost, stolen, misappropriated or compromised and will follow our instructions regarding any replacement User ID and Password. We may incorporate in the CRS Software security features that disable or identify any computer other than the PTU that seeks access to the Central Reservation System.
AutoNDA by SimpleDocs
Security Procedures and Protocols. 4.11.1 The TPSP warrants that it shall always comply with all instructions or recommendations that the DFS Provider may issue from time to time regarding integration and security. The TPSP agrees that the DFS Provider is not responsible for the privacy, security or integrity of the TPSP’s Products. The TPSP shall be solely liable for setting up, maintaining, and regularly reviewing security arrangements concerning access to, and use of, the Services, APIs, File Upload Platform, White- Labeled App, Netbank Virtual, any element within the XxxX Program including information stored on the TPSP’s computing and communications systems, and authorized and designated TPSPs’ control of passwords, security devices and access to the Services, APIs, File Upload Platform, White-Labeled App, Netbank Virtual, and/or any element within the XxxX Program.

Related to Security Procedures and Protocols

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Security Procedure The Client acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Client from Security Procedures offered by State Street. The Client agrees that the Security Procedures are reasonable and adequate for its wire transfer transactions and agrees to be bound by any payment orders, amendments and cancellations, whether or not authorized, issued in its name and accepted by State Street after being confirmed by any of the selected Security Procedures. The Client also agrees to be bound by any other valid and authorized payment order accepted by State Street. The Client shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated in writing to State Street. The Client must notify State Street immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Client’s authorized personnel. State Street shall verify the authenticity of all instructions according to the Security Procedure.

  • FORM AND SECURITY PROCEDURES Proper Instructions may be in writing signed by the authorized individual or individuals or may be in a tested communication or in a communication utilizing access codes effected between electro-mechanical or electronic devices or may be by such other means and utilizing such intermediary systems and utilities as may be agreed to from time to time by the Custodian and the individual or organization giving the instruction, provided that the Fund has followed any security procedures agreed to from time to time by the applicable Fund and the Custodian including, but not limited to, the security procedures selected by the Fund by reference to the form of Funds Transfer Addendum hereto, the terms of which are part of this Agreement. The Custodian may agree to accept oral instructions, and in such case oral instructions will be considered Proper Instructions. The Fund shall cause all oral instructions to be confirmed in writing, but the Fund’s failure to do so shall not affect the Custodian’s authority to rely on the oral instructions.

  • Policies and Procedures i) The policies and procedures of the designated employer apply to the employee while working at both sites.

  • Compliance Policies and Procedures To assist the Fund in complying with Rule 38a-1 of the 1940 Act, BBH&Co. represents that it has adopted written policies and procedures reasonably designed to prevent violation of the federal securities laws in fulfilling its obligations under the Agreement and that it has in place a compliance program to monitor its compliance with those policies and procedures. BBH&Co will upon request provide the Fund with information about our compliance program as mutually agreed.

  • OPERATIONAL PROCEDURES In order to minimize operational problems, it will be necessary for trade information to be supplied in a secure manner by the Subadviser to the Fund’s Service Providers, including: JPMorgan Chase Bank, National Association (the “Custodian”), Virtus Fund Services (the “Fund Administrator”) BNY Mellon Investment Servicing (US) Inc., (the “Sub-Accounting Agent”), any Prime Broker to the Series, and all other Counterparties/Brokers as required. The Subadviser must furnish the Fund’s service providers with required daily information as to executed trades in a format and time-frame agreed to by the Subadviser, Custodian, Fund Administrator, Sub-Accounting Agent and Prime Broker/Counterparties and designated persons of the Fund. Trade information sent to the Custodian, Fund Administrator, Sub-Accounting Agent and Prime Broker/Counterparties must include all necessary data within the required timeframes to allow such parties to perform their obligations to the Series. The Sub-Accounting Agent specifically requires a daily trade blotter with a summary of all trades, in addition to trade feeds, including, if no trades are executed, a report to that effect. Daily information as to executed trades for same-day settlement and future trades must be sent to the Sub-Accounting Agent no later than 4:30 p.m. (Eastern Time) on the day of the trade each day the Fund is open for business. All other executed trades must be delivered to the Sub-Accounting Agent on Trade Date plus 1 by Noon (Eastern Time) to ensure that they are part of the Series’ NAV calculation. (The Subadviser will be responsible for reimbursement to the Fund for any loss caused by the Subadviser’s failure to comply with the requirements of this Schedule A.) On fiscal quarter ends and calendar quarter ends, all trades must be delivered to the Sub-Accounting Agent by 4:30 p.m. (Eastern Time) for inclusion in the financial statements of the Series. The data to be sent to the Sub-Accounting Agent and/or Fund Administrator will be as agreed by the Subadviser, Fund Administrator, Sub-Accounting Agent and designated persons of the Fund and shall include (without limitation) the following:

  • Claim Procedures Claim forms or claim information as to the subject policy can be obtained by contacting Benmark, Inc. (800-544-6079). When the Named Fiduciary has a claim which may be covered under the provisions described in the insurance policy, they should contact the office named above, and they will either complete a claim form and forward it to an authorized representative of the Insurer or advise the named Fiduciary what further requirements are necessary. The Insurer will evaluate and make a decision as to payment. If the claim is payable, a benefit check will be issued in accordance with the terms of this Agreement. In the event that a claim is not eligible under the policy, the Insurer will notify the Named Fiduciary of the denial pursuant to the requirements under the terms of the policy. If the Named Fiduciary is dissatisfied with the denial of the claim and wishes to contest such claim denial, they should contact the office named above and they will assist in making an inquiry to the Insurer. All objections to the Insurer's actions should be in writing and submitted to the office named above for transmittal to the Insurer.

  • Cooperation Procedures The Seller shall, in connection with the delivery of each Qualified Replacement Mortgage to the Custodian, on behalf of the Indenture Trustee, provide the Indenture Trustee with information set forth in the Schedules of Home Equity Loans with respect to such Qualified Replacement Mortgage.

Time is Money Join Law Insider Premium to draft better contracts faster.