Security Programs Compliance Sample Clauses

Security Programs Compliance. 3.2.1. Entity will comply with the applicable requirements of the Payment Card Industry Data Security Standards (“PCI DSS”), including the Cardholder Information Security Program (CISP) of Visa, the Site Data Protection Program (SDP) of Mastercard, the Data Security DISC Program and the PCI DSS regulations of Discover’s network, and the security programs of any other Payment Network, and any modifications to, or replacements of, such programs that may occur from time to time. Each Entity considered a Level 4 merchant under PCI DSS (determined based on Transaction volume) must validate its PCI DSS compliance on an annual basis, with initial validation to occur no later than ninety (90) days after Entity’s Approval. 3.2.2. Entity hereby certifies that it (and any Representatives that it may utilize to submit Transactions to ARC) complies and will comply with the PCI DSS and Entity hereby agrees to pay any fines and penalties that may be assessed by a Payment Brand as a result of Entity’s noncompliance with the requirements of PCI DSS, any data breaches, or by its failure to accurately validate its compliance. Entity will review and monitor the PCI DSS and other related Rules in order to determine the timeframes and mandates for compliance under PCI DSS. The foregoing is an ongoing obligation during the initial term of this Agreement and any renewal term. Entity acknowledges and understands that Entity may be prohibited from participating in Payment Brand programs if it is determined that Entity is non-compliant with these requirements. 3.2.3. The following lists certain (but not all) of the current PCI DSS requirements, all
AutoNDA by SimpleDocs
Security Programs Compliance. Each Party will comply with the applicable requirements of the Security Programs. (b) PCI-DSS Attestation. Company may review Provider’s current PCI-DSS compliance status on the Payment Network websites as available. Provider will undergo an annual assessment of its compliance with the Security Programs and, if applicable to the Services provided under the Agreement, the Payment Application Data Security Standards. At Company’s written request, Provider will provide to Company a written attestation of Provider’s updated/renewed compliance with the security requirements related to Cardholder Data promulgated by the Payment Card Industry Security Standards Council.
Security Programs Compliance. 5.3.1. At all times while the Agreement is in effect, Entity shall comply with any and all applicable requirements of PCI Security Standards. Entity is solely responsible for ensuring compliance with all PCI Security Standards. 5.3.2. Entity hereby agrees to pay any and all fines and penalties that may be assessed by a Payment Brand on ARC as a result of Entity’s noncompliance with the requirements of PCI Security Standards, Entity’s data breaches, or by Entity’s failure to accurately validate its compliance with PCI Security Standards. 5.3.3. Entity acknowledges and agrees that Entity may be prohibited from participating in Payment Brand programs if it is determined that Entity is non- compliant with the PCI Security Standards. 5.3.4. Each Entity shall validate its PCI Security Standards on an annual basis, with initial validation to occur no later than ninety (90) days after Approval.
Security Programs Compliance. Sponsored Merchant will comply with the applicable requirements of the Payment Card Industry Data Security Standards (“PCI-DSS”), including the Cardholder Information Security Program (CISP) of Visa, the Site Data Protection Program (SDP) of MasterCard, the Data Security DISC Program and the PCI-DSS regulations of Discover’s network, and the security programs of any other Payment Network, and any modifications to, or replacements of, such programs that may occur from time to time.
Security Programs Compliance. Elavon and Company will each comply with the applicable requirements of the Security Programs.
Security Programs Compliance. Each Party will comply with the applicable requirements of the Security Programs.

Related to Security Programs Compliance

  • Security Program Contractor will develop and implement an effective security program for the Project Site, which program shall require the Contractor and subcontractors to take measures for the protection of their tools, materials, equipment, and structures. As between Contractor and Owner, Contractor shall be solely responsible for security against theft of and damage of all tools and equipment of every kind and nature and used in connection with the Work, regardless of by whom owned.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks. (2) The Information Security Program shall require encryption of any Personal Information in electronic format while in transit or in storage, and enhanced controls and standards for transport and disposal of physical media containing Personal Information. DTI shall, and shall require its agents, contractors and subcontractors who access or use Personal Information or Confidential Information to, regularly test key controls, systems and procedures relating to the Information Security Program ("ISP Tests"). DTI shall advise the Funds of any material issues identified in the ISP Tests potentially affecting the Information Security Program. (3) DTI shall comply with its Information Security Program.

  • Safety Program The Contractor shall design a specific safety program for the Work for the site(s). The Contractor shall establish and require all Subcontractors to establish reasonable safety programs. The Contractor shall also submit its standard monthly safety reports to the Owner and Design Professional. No imposition of responsibility on the Contractor for safety under this Contract shall relieve any subcontractor of its responsibility for safety of persons or property on or near the Project Site. The Contractor shall include in his plant he names of the person in charge of Safety.

  • Federal Medicaid System Security Requirements Compliance Party shall provide a security plan, risk assessment, and security controls review document within three months of the start date of this Agreement (and update it annually thereafter) in order to support audit compliance with 45 CFR 95.621 subpart F, ADP System Security Requirements and Review Process.

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Program Compliance The School Board shall be responsible for monitoring the program to provide technical assistance and to ensure program compliance.

  • Safety and Security Procedures Contractor shall maintain and enforce, at the Contractor Work Locations, industry-standard safety and physical security policies and procedures. While at each Court Work Location, Contractor shall comply with the safety and security policies and procedures in effect at such Court Work Location.

  • OSHA Compliance To the extent applicable to the services to be performed under this Agreement, Contractor represents and warrants, that all articles and services furnished under this Agreement meet or exceed the safety standards established and promulgated under the Federal Occupational Safety and Health Law (Public Law 91-596) and its regulations in effect or proposed as of the date of this Agreement.

  • Security Policies IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!