Systems Security and Breach Notification Sample Clauses

Systems Security and Breach Notification. (a) If any Party or any of its respective Subsidiaries (such Party together with its Subsidiaries, the “Accessing Party”) has or is given access to the computer system(s), facilities, networks (including voice or data networks) or software (collectively, “Systems”) used by another Party or any of such other Party’s Subsidiaries (such other Party and its Subsidiaries, the “Granting Party”) in connection with the provision of the Services, the Accessing Party shall comply with the Granting Party’s written information security regulations (including any policies, procedures, requirements and instructions) as they exist at the time the Accessing Party is accessing the Systems, which shall be provided by the Granting Party upon execution of this Agreement and prior to the Accessing Party being granted access to the Granting Party’s Systems.
AutoNDA by SimpleDocs
Systems Security and Breach Notification. (a) If any Party or with regard to CIBC, its Affiliates, or with regard to FCIB, other FCIB Group members (as the case may be, an “Accessing Party”) has or is given access to the computer system(s), facilities, networks (including voice or data networks) or software (collectively, “Systems”) used by the other Party or with regard to CIBC, its Affiliates, and with regard to FCIB, other FCIB Group members (as the case may be, a “Granting Party”) in connection with the provision of the Services, the Accessing Party shall comply with the Granting Party’s written information security regulations (including any policies, procedures, requirements and instructions) as amended from time to time by the Granting Party, which shall be provided by the Granting Party upon execution of this Agreement and prior to the Accessing Party being granted access to the Granting Party’s Systems, and on amendment by the Granting Party as applicable.

Related to Systems Security and Breach Notification

  • Cybersecurity and Data Protection The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate in all material respects for, and operate and perform as required in connection with, the operation of the business of the Company and its Subsidiaries as currently conducted and, to the Company’s knowledge, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with the business of the Company and its Subsidiaries as currently conducted, and, to the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect.

  • Security and Safeguarding Information (a) Confidential Information that contains Non-Public Personal Information about customers is subject to the protections created by the Xxxxx-Xxxxx-Xxxxxx Act of 1999 (the “Act”) and under the standards for safeguarding Confidential Information, 16 CFR Part 314 (2002) adopted by Federal Trade Commission (“FTC”) (the “Safeguards Rule”). Additionally, state specific laws may regulate how certain confidential or personal information is safeguarded. The parties agree with respect to the Non-Public Personal Information to take all appropriate measures in accordance with the Act, and any state specific laws, as are necessary to protect the security of the Non-Public Personal Information and to specifically assure there is no disclosure of the Non-Public Personal Information other than as authorized under the Act, and any state specific laws, and this Agreement. With respect to Confidential Information, including Non-Public Personal Information and Personally Identifiable Financial Information as applicable, each of the parties agrees that:

  • Responsibility and Control Notwithstanding any other provision of this Agreement, it is understood and agreed that the Trust reserves the right to direct, approve or disapprove any action hereunder taken on its behalf by the Subadviser, provided, however, that the Subadviser shall not be liable for any losses to the Trust resulting from the Trust’s direction, or from the Trust’s disapproval of any action proposed to be taken by the Subadviser.

  • INFORMATION SECURITY SCHEDULE All capitalized terms not defined in this Information Security Schedule (this “Security Schedule”) shall have the meanings ascribed to them in the Transfer Agency and Service Agreement by and between DST and each of the funds listed on Exhibit A thereto (each such fund, or series thereof, severally, and not jointly, the “Fund”) dated March 1, 2022 (the “Agreement”). DST and Fund hereby agree that DST shall maintain and comply with an information security policy (“Security Policy”) that satisfies the requirements set forth below; provided, that, because information security is a highly dynamic space (where laws, regulations and threats are constantly changing), DST reserves the right to make changes to its information security controls at any time and at the sole discretion of DST in a manner that it believes does not materially reduce the protection it applies to Fund Data. From time to time, DST may subcontract services performed under the Agreement (to the extent provided for under the Agreement) or provide access to Fund Data or its network to a subcontractor or other third party; provided, that, such subcontractor or third party implements and maintains security measures DST believes are at least as stringent as those described in this Security Schedule. For the purposes of this Schedule “prevailing industry practices and standards” refers to standards among financial institutions, including mutual funds, and third parties providing financial services to financial institutions.

  • Security and Access The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities Information Technology and Access Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Access Resources or other Company property or materials by others.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Security Against Unauthorized Use of Funds’ Recordkeeping Systems Financial Intermediary agrees to provide such security as is necessary to prevent any unauthorized use of the Funds’ recordkeeping system, accessed via (a) the world wide web or any URL maintained by the Funds or JPMDS, (b) a networking/data access arrangement or (c) computer hardware or software provided to Financial Intermediary by JPMDS.

  • OWNERSHIP AND PROTECTION OF INTELLECTUAL PROPERTY AND CONFIDENTIAL INFORMATION 4.1 All information, ideas, concepts, improvements, discoveries, works of authorship, and inventions, whether patentable or copyrightable or not, which are conceived, reduced to practice, authored, made, developed or acquired by Employee, individually or in conjunction with others, in the scope of Employee's employment by Employer or any of its affiliates, and/or during the term of Employee’s employment (whether during business hours or otherwise and whether on Employer's premises or otherwise) which relate to the business, products or services of Employer or its affiliates (including, without limitation, all such information relating to any corporate opportunities, research, financial and sales data, pricing and trading terms, evaluations, opinions, interpretations, acquisition prospects, the identity of customers or their requirements, the identity of key contacts within the customer's organizations or within the organization of acquisition prospects, or marketing and merchandising techniques, prospective names, and marks), and all documents, things, writings and items of any type or in any media embodying any of the foregoing (collectively, “Developments”), and any and all proprietary rights of any kind thereto, including without limitation all rights relating to patents, copyrights, trade secrets, and trademarks, shall be the sole and exclusive property of Employer or its affiliates, as the case may be. Employee hereby assigns to Employer any and all rights Employee might otherwise have in and to any such Developments, and any and all proprietary rights of any kind thereto, including without limitation all rights relating to patents, copyrights, trade secrets, and trademarks.

  • Information Security 10.1 The Transfer Agent shall maintain reasonable safeguards for maintaining in confidence any and all Fund Confidential Information, including, without limitation, the policies and procedures described in Section 10.2. The Transfer Agent shall not, at any time, use any such Fund Confidential Information for any purpose other than as specifically authorized by this Agreement, or in writing by the Fund.

  • Security and Collateral To secure the payment when due of the Notes and all other obligations of the Company under this Agreement or any Rate Hedging Agreement to the Lenders and the Agent, the Company shall execute and deliver, or cause to be executed and delivered, to the Lenders and the Agent Security Documents granting the following:

Time is Money Join Law Insider Premium to draft better contracts faster.