Security Reports. Nectar HR agrees to maintain records in accordance with reasonable industry standards and shall provide Client with copies of its relevant systems management and records on Client’s written request.
Security Reports. Customer acknowledges that Provider is regularly audited against the standards defined in the Security Policy by independent third-party auditors. Upon written request, Provider will give Customer, on a confidential basis, a summary copy of its then-current Report so that Customer can verify Provider’s compliance with the standards defined in the Security Policy.
Security Reports. Customised reports for volatile countries are available upon request which will give security advice tailored to protect the Insured Person during a specific trip. These reports are available within 48 hours of making the request. The Policyholder may receive a maximum of two reports in any given calendar month, thereafter an additional fee will apply.
Security Reports. Upon Customer's written request, (and execution of a mutual non-disclosure agreement if such information is required prior to execution of this MSA), deepwatch will provide Customer with the most recent copy of either the SOC Report, PCI Report, and/or TRUSTe Certification. These reports, and any analyses, reports, summaries, and/or information related to or derived from such reports, are considered deepwatch's Confidential Information (as defined below).
Security Reports. The following information will be included in the service management report: • Vulnerability Report • Intrusion Detection Report • Incident Management Report
Security Reports. Upon Customer’s request, Retrium shall make available for Customer’s review copies of certifications or reports demonstrating Retrium’s compliance with this Addendum and the prevailing data security standards applicable to the processing of Customer Personal Data.
Security Reports. As soon as available and in any event within 45 days after the end of each of the first three fiscal quarters of each fiscal year of Parent, Form 10Qs of Parent shall have been delivered to Trustee (with copies for each Lender) and within 90 days after the end of each fiscal year of Parent, Form 10K of Parent shall have been delivered to Trustee (with copies for each Lender). (i)
Security Reports. 12.2.1. The Participants will provide a written security report to WA Police immediately upon becoming aware that a Security Incident has or may have occurred.
Security Reports. 46.22 The SRSS Provider must Notify the Department immediately if it becomes aware that a Security Incident has occurred.
Security Reports. 5. 1 Without prejudice to any audit rights which the Client may have, the Contractor shall, at its own costs, evaluate the Data Processing activities, the Data Processing System and the security measures on a regular basis, being at least once every year, and on that basis provide the Client with a yearly written security report. The Contractor shall provide the written security report to the Client at least within two weeks after finalizing the evaluation. The evaluation will be executed by an independent third party (expert) according to adequate and by the Client accepted audit standards.