SECURITY PROGRAM AND IDENTITY THEFT Sample Clauses

SECURITY PROGRAM AND IDENTITY THEFT. As a wholly owned subsidiary of AT&T, Inc., DIRECTV and its customers, operators, suppliers, affiliates and agents are bound by AT&T’s DEALER Information Security Requirements (“DISR”). DEALER shall comply with all applicable provisions of the DISR as contained in Schedule 7.3 of this Agreement. XXXXXX further agrees to comply with the terms and conditions of DISR, as may be changed from time-to-time by AT&T and/or DIRECTV in their sole discretion. DEALER shall cooperate fully with AT&T and DIRECTV, including by completing checklists or similar documentation, to ensure that Subscriber Information, AT&T and/or DIRECTV Derived Information, Software and/or computer systems DEALER develops, designs, supports and/or uses under this Agreement comply with the standards and requirements set forth in DISR. DEALER shall protect DIRECTV customer data by establishing, implementing and maintaining (i) a comprehensive written information security program reasonably designed to protect the security, confidentiality and integrity of DIRECTV customer data; and (ii) a written program for combating identity theft in connection with DEALER’s use of DIRECTV customer data, either as a component of its information security program or on a stand-alone basis.
AutoNDA by SimpleDocs
SECURITY PROGRAM AND IDENTITY THEFT. In addition, Operator shall, pursuant to the Operator Policies and Procedures, protect DIRECTV-customer data by establishing, implementing and maintaining: (i) a comprehensive written information security program reasonably designed to protect the security, confidentiality and integrity of DIRECTV-customer data (the "Security Program"); and (ii) a written program for combating identity theft in connection with Operator's use of DIRECTV-customer data, either as a component of the Security Program or on a stand-alone basis (the "Identity Theft Prevention Program"). * * * Confidential Treatment has been requested, the portion indicated has been redacted and the redacted portion has been separately filed with the Securities and Exchange Commission.
SECURITY PROGRAM AND IDENTITY THEFT. As a wholly owned subsidiary of AT&T, Inc.,DIRECTV and its customers, operators, suppliers, affiliates and agents are bound by AT&T’s DEALER Information Security Requirements (“DISR”). MSO DEALER shall comply with all applicable provisions of the DISR as contained in Schedule 7.3 of this Agreement. MSO DEALER further agrees to comply with the terms and conditions of DISR, as may be changed from time-to- time by AT&T and/or DIRECTV in their sole discretion. MSO DEALER shall cooperate fully with AT&T and DSI/DIRECTV, including by completing checklists or similar documentation, to ensure that Subscriber Information, AT&T and/or DIRECTV Derived Information, Software and/or computer systems MSO DEALER develops, designs, supports and/or uses under this Agreement comply with the standards and requirements set forth in DISR. MSO DEALER shall protect DSI/DIRECTV customer data by establishing, implementing and maintaining (i) a comprehensive written information security program reasonably designed to protect the security, confidentiality and integrity of DIRECTV customer data; and (ii) a written program for combating identity theft in connection with MSO DEALER’s use of DIRECTV customer data, either as a component of its information security program or on a stand-alone basis.

Related to SECURITY PROGRAM AND IDENTITY THEFT

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Security / Passwords 2.1. A digital certificate and/or an encryption key may be required to access certain Services. You may apply for a digital certificate and/or an encryption key by following the procedures set forth at xxxx://xxx.xxx.xxx/certs/. You also will need an identification code (ID) and password(s) (Password) to access the Services.

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Security Procedure The Client acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Client from Security Procedures offered by State Street. The Client agrees that the Security Procedures are reasonable and adequate for its wire transfer transactions and agrees to be bound by any payment orders, amendments and cancellations, whether or not authorized, issued in its name and accepted by State Street after being confirmed by any of the selected Security Procedures. The Client also agrees to be bound by any other valid and authorized payment order accepted by State Street. The Client shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated in writing to State Street. The Client must notify State Street immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Client’s authorized personnel. State Street shall verify the authenticity of all instructions according to the Security Procedure.

  • FORM AND SECURITY PROCEDURES Proper Instructions may be in writing signed by the authorized individual or individuals or may be in a tested communication or in a communication utilizing access codes effected between electro-mechanical or electronic devices or may be by such other means and utilizing such intermediary systems and utilities as may be agreed to from time to time by the Custodian and the individual or organization giving the instruction, provided that the Fund has followed any security procedures agreed to from time to time by the applicable Fund and the Custodian including, but not limited to, the security procedures selected by the Fund by reference to the form of Funds Transfer Addendum hereto, the terms of which are part of this Agreement. The Custodian may agree to accept oral instructions, and in such case oral instructions will be considered Proper Instructions. The Fund shall cause all oral instructions to be confirmed in writing, but the Fund’s failure to do so shall not affect the Custodian’s authority to rely on the oral instructions.

  • Identifying Information Issuer and Broker acknowledge that a portion of the identifying information set forth on Exhibit A is being requested by NCPS in connection with the USA Patriot Act, Pub.L.107-56 (the “Act”). To help the government fight the funding of terrorism and money laundering activities, Federal law requires all financial institutions to obtain, verify, and record information that identifies each person who opens an account. For a non-individual person such as a business entity, a charity, a Trust, or other legal entity, we ask for documentation to verify its formation and existence as a legal entity. We may also ask to see financial statements, licenses, identification and authorization documents from individuals claiming authority to represent the entity or other relevant documentation.

  • Customer Identification Program Notice To help the U.S. government fight the funding of terrorism and money laundering activities, U.S. Federal law requires each financial institution to obtain, verify, and record certain information that identifies each person who initially opens an account with that financial institution on or after October 1, 2003. Certain of PNC’s affiliates are financial institutions, and PNC may, as a matter of policy, request (or may have already requested) the Fund’s name, address and taxpayer identification number or other government-issued identification number, and, if such party is a natural person, that party’s date of birth. PNC may also ask (and may have already asked) for additional identifying information, and PNC may take steps (and may have already taken steps) to verify the authenticity and accuracy of these data elements.

  • Identifying Provisions For purposes of this Agreement, the following terms shall have the following respective meanings:

  • Third-Party Information; Privacy or Data Protection Laws Each Party acknowledges that it and members of its Group may presently have and, following the Effective Time, may gain access to or possession of confidential or proprietary information of, or personal information relating to, Third Parties (i) that was received under confidentiality or non-disclosure agreements entered into between such Third Parties, on the one hand, and the other Party or members of such Party’s Group, on the other hand, prior to the Effective Time; or (ii) that, as between the two Parties, was originally collected by the other Party or members of such Party’s Group and that may be subject to and protected by privacy, data protection or other applicable Laws. Each Party agrees that it shall hold, protect and use, and shall cause the members of its Group and its and their respective Representatives to hold, protect and use, in strict confidence the confidential and proprietary information of, or personal information relating to, Third Parties in accordance with privacy, data protection or other applicable Laws and the terms of any agreements that were either entered into before the Effective Time or affirmative commitments or representations that were made before the Effective Time by, between or among the other Party or members of the other Party’s Group, on the one hand, and such Third Parties, on the other hand.

  • Security and Safeguarding Information (a) Confidential Information that contains Non-Public Personal Information about customers is subject to the protections created by the Xxxxx-Xxxxx-Xxxxxx Act of 1999 (the “Act”) and under the standards for safeguarding Confidential Information, 16 CFR Part 314 (2002) adopted by Federal Trade Commission (“FTC”) (the “Safeguards Rule”). Additionally, state specific laws may regulate how certain confidential or personal information is safeguarded. The parties agree with respect to the Non-Public Personal Information to take all appropriate measures in accordance with the Act, and any state specific laws, as are necessary to protect the security of the Non-Public Personal Information and to specifically assure there is no disclosure of the Non-Public Personal Information other than as authorized under the Act, and any state specific laws, and this Agreement. With respect to Confidential Information, including Non-Public Personal Information and Personally Identifiable Financial Information as applicable, each of the parties agrees that:

Time is Money Join Law Insider Premium to draft better contracts faster.