Service Center Security Procedures Sample Clauses

Service Center Security Procedures. 8 4.5 Service Performance Standards...........................................................................8 4.6 Facilities..............................................................................................9 4.7 Communication...........................................................................................9 4.8 Meetings................................................................................................9 4.9 Notification............................................................................................9 4.10 Liberty Authorization...................................................................................9
AutoNDA by SimpleDocs
Service Center Security Procedures. During the Initial Term, the Renewal Term, if any, and the Transfer Assistance Period, if any, TPA shall maintain and enforce security procedures at the Service Centers that are at least as rigorous as those security procedures in effect at the Service Centers, as applicable, as of October 31, 2004, which security procedures are set forth in Exhibit 4.4 (the "Security Procedures").
Service Center Security Procedures. During the Term and the Renewal Term, Liberty shall maintain and enforce security procedures at the Service Center that are at least as rigorous as those security procedures in effect at the Service Center as of the date of this Agreement, which security procedures are set forth in Exhibit F (the "Security Procedures").
Service Center Security Procedures. Administrator shall maintain and enforce security procedures for each of the facilities used by Administrator (and for each approved subcontractor) and for all Administrator Software in performing the Services, which, at a minimum, shall comply with the provisions described below, a copy or summary of which will be made available to Customer from time to time, as requested, for inspection (the “Security Procedures”). 5.2.1 Administrator shall maintain in effect Security Procedures that are in place as of the Effective Date which address Administrator’s on-going assessment of: (a) the reasonably foreseeable internal and external threats that could result in unauthorized disclosure, misuse, alteration, or disruption of Administrator’s IT infrastructure or Customer Confidential Information; (b) the estimated likelihood and potential damage of the foregoing threats, taking into account the nature of Customer Content; and (c) the expected sufficiency of policies, procedures, Administrator’s IT infrastructure, and other arrangements in place to control risks. 5.2.2 Administrator shall maintain in effect and revise as appropriate Security Procedures to control the risks as identified above, commensurate with industry standards, Applicable Laws and the nature of Administrator’s IT infrastructure and Customer Confidential Information maintained or processed therein. Further, for Customer Confidential Information under the control of Administrator, Administrator shall maintain the appropriate: (a) access controls to access Customer Confidential Information, including controls to authenticate and permit access only to authorized personnel and controls to prevent access by unauthorized individuals, including those who may seek access through fraudulent means; (b) access restrictions at physical locations used to provide Services containing Customer Confidential Information designed to permit access only to authorized personnel; (c) encryption of electronic Customer Confidential Information while in transit from inside Administrator’s secure environment to outside Administrator’s secure environment on networks, systems, or accessible media by unauthorized individuals; (d) masking of agreed portions of Consumer Confidential Information in Administrator’s custody or control when such information is being utilized for system development and testing purposes; (e) procedures designed to ensure that changes to Administrator’s IT infrastructure are consistent with Administrat...
Service Center Security Procedures. ALLIANCE-ONE shall maintain and enforce reasonable security procedures for each of the facilities used by ALLIANCE-ONE (and for each approved subcontractor) and for all ALLIANCE-ONE Software Products and Systems in performing the Services, which shall comply with applicable industry standards and security regulations. Upon written request by NOLHGA or CUSTOMER, ALLIANCE-ONE will make its security procedures available for NOLHGA’s or CUSTOMER’s inspection.

Related to Service Center Security Procedures

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Security Procedure The Client acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Client from Security Procedures offered by State Street. The Client agrees that the Security Procedures are reasonable and adequate for its wire transfer transactions and agrees to be bound by any payment orders, amendments and cancellations, whether or not authorized, issued in its name and accepted by State Street after being confirmed by any of the selected Security Procedures. The Client also agrees to be bound by any other valid and authorized payment order accepted by State Street. The Client shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated in writing to State Street. The Client must notify State Street immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Client’s authorized personnel. State Street shall verify the authenticity of all instructions according to the Security Procedure.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Safety and Security Procedures Contractor shall maintain and enforce, at the Contractor Work Locations, industry-standard safety and physical security policies and procedures. While at each Court Work Location, Contractor shall comply with the safety and security policies and procedures in effect at such Court Work Location.

  • WARRANTY PROCEDURES You need proof of purchase for warranty service.

  • Safety Procedures The Contractor shall: (a) comply with all applicable safety regulations according to Attachment H; (b) take care for the safety of all persons entitled to be on the Site; (c) use reasonable efforts to keep the Site and Works clear of unnecessary obstruction so as to avoid danger to these persons; (d) provide fencing, lighting, guarding and watching of the Works until completion and taking over under clause 10 [Employer's Taking Over]; and (e) provide any Temporary Works (including roadways, footways, guards and fences) which may be necessary, because of the execution of the Works, for the use and protection of the public and of owners and occupiers of adjacent land.

  • Billing Procedures The Supporting Party will xxxx the Protecting Party for actual costs incurred for Assistance by Hire. Reimbursements will be limited to the provisions of the Agreement and the applicable OP, regardless of whether or not it is authorized on the Resource Order or other documentation produced by the incident. Reimbursable costs may include transportation, salary, overtime, per diem and other approved expenses of Supporting agency personnel. Rates and conditions of use for the equipment and personnel are documented in the OP. Parties shall submit a xxxx within 90 days of the incident. Parties must use their own invoice form for billing under this Agreement to avoid any confusion with other services that may have been ordered under other agreements. Invoices must identify Supporting Party’s name, address, and Taxpayer Identification Number (Department only), fire name, order and request number, and xxxx number and amount. Invoice supporting documentation must include description of services performed, period of services performed, and any applicable cost share agreements. Supporting documentation will itemize details of billing, listing personnel, equipment, travel and per diem, aircraft, supplies and purchases as approved in the attached AOP. It will also include itemized deductions for maintenance and repair of equipment. Department invoices will include “Record of Activities” (FSLA-5) and U.S. Forest Service invoices will include transaction register. Invoices for services under this agreement must be sent to: Name: Xxxx Xxxxxx-Xxxxx, ECC Manager Address: 0000 Xxxxxxxxx Xxxxx Xxxx, Xxxxx, Xxx: Xxxxxxxxxx, XX 00000 Telephone: (000) 000-0000 FAX: (000) 000-0000 Email: xxxxxxxxxxxx@xx.xxx.xx Name: Spalding Community Service District Address: 000-000 Xxxxxxxx Xxx Xxxx, Xxxxx, Xxx: Xxxxxxxxxx, XX 00000 Telephone: (000) 000-0000 FAX: (000) 000-0000 Email: xxxxxxxxxxxxx@xxxxxxx.xxx All bills will have a payment due date 30 days upon receipt. Contested Xxxxxxxx: Written notice that a xxxx is contested will be mailed to the Party within 30 days of receipt of the invoice and will fully explain the contested items. Contested items should be resolved no later than 60 days following receipt of the written notice. Parties are responsible for facilitating resolution of contested xxxxxxxx. Billing requirements and rates are documented in the attached OP.

  • Procurement procedures 11.1 The Recipient must secure the best value for money and shall act in a fair, open and non-discriminatory manner in all purchases of goods and services.

  • Security Program Contractor will develop and implement an effective security program for the Project Site, which program shall require the Contractor and subcontractors to take measures for the protection of their tools, materials, equipment, and structures. As between Contractor and Owner, Contractor shall be solely responsible for security against theft of and damage of all tools and equipment of every kind and nature and used in connection with the Work, regardless of by whom owned.

  • Security Safeguards Contractor shall store and process District Data in accordance with commercial best practices, including implementing appropriate administrative, physical, and technical safeguards that are no less rigorous than those outlined in SANS Top 20 Security Controls, as amended, to secure such data from unauthorized access, disclosure, alteration, and use. Contractor shall ensure that all such safeguards, including the manner in which District Data is collected, accessed, used, stored, processed, disposed of and disclosed, comply with all applicable federal and state data protection and privacy laws, regulations and directives, including without limitation C.R.S. § 00-00-000 et seq., as well as the terms and conditions of this Addendum. Without limiting the foregoing, and unless expressly agreed to the contrary in writing, Contractor warrants that all electronic District Data will be encrypted in transmission and at rest in accordance with NIST Special Publication 800-57, as amended.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!