Permissible Requests by Covered Entity Covered Entity shall not request Business Associate to use or disclose PHI in any manner that would not be permissible under the HIPAA Standards if done by the Covered Entity, except that Business Associate may use and disclose PHI for data aggregation, and management and administrative activities of Business Associate, as permitted under this Section of the Contract.
Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks. (2) The Information Security Program shall require encryption of any Personal Information in electronic format while in transit or in storage, and enhanced controls and standards for transport and disposal of physical media containing Personal Information. DTI shall, and shall require its agents, contractors and subcontractors who access or use Personal Information or Confidential Information to, regularly test key controls, systems and procedures relating to the Information Security Program ("ISP Tests"). DTI shall advise the Funds of any material issues identified in the ISP Tests potentially affecting the Information Security Program. (3) DTI shall comply with its Information Security Program.
Third Party Requests In the event Apple receives a third party request for Your or Your End User’s Content or Personal Data (“Third Party Request”), Apple will (i) notify You, to the extent permitted by law, of its receipt of the Third Party Request; and (ii) notify the requester to address such Third Party Request to You. Unless otherwise required by law or the Third Party Request, You will be responsible for responding to the Request. O. School Official Status Under FERPA (20 U.S.C. § 1232g). If You are an educational agency, or organization, or acting on behalf of an educational agency, or organization, to which regulations under the U.S. Family Education Rights and Privacy Act (FERPA) apply, Apple acknowledges that for the purposes of this Agreement, Your Institution’s Personal Data may include personally identifiable information from education records that are subject to FERPA (“FERPA Records”). To
Information Request The Owner Trustee shall provide any information regarding the Issuer in its possession reasonably requested by the Servicer, the Administrator, the Seller or any of their Affiliates, in order to comply with or obtain more favorable treatment under any current or future law, rule, regulation, accounting rule or principle.
Third Party Request Should a Third Party, including, but not limited to law enforcement, former employees of the LEA, current employees of the LEA, and government entities, contact Provider with a request for data held by the Provider pursuant to the Services, the Provider shall redirect the Third Party to request the data directly from the LEA and shall cooperate with the LEA to collect the required information. Provider shall notify the LEA in advance of a compelled disclosure to a Third Party, unless legally prohibited. The Provider will not use, disclose, compile, transfer, sell the Student Data and/or any portion thereof to any third party or other entity or allow any other third party or other entity to use, disclose, compile, transfer or sell the Student Data and/or any portion thereof, without the express written consent of the LEA or without a court order or lawfully issued subpoena. Student Data shall not constitute that information that has been anonymized or de-identified, or anonymous usage data regarding a student’s use of Provider’s services.
Information Requests The parties hereto shall provide any information reasonably requested by the Servicer, the Issuer, the Seller or any of their Affiliates, in order to comply with or obtain more favorable treatment under any current or future law, rule, regulation, accounting rule or principle.
Suspension or Debarment Certification Read the instructions in the attribute above and then answer the following accurately. Vendor certifies that neither it nor its principals are presently debarred, suspended, proposed for debarment, declared ineligible, or voluntarily excluded from participation in this transaction by any Federal department or agency. Does Vendor certify? Yes, Vendor certifies criminal history record information regarding covered employees. Contractors must certify to the district that they have complied. Covered employees with disqualifying criminal histories are prohibited from serving at a school district pursuant to this law.
Completion of a Utilisation Request (a) Each Utilisation Request is irrevocable and will not be regarded as having been duly completed unless: (i) the proposed Utilisation Date is a Business Day within the Availability Period; (ii) the currency and amount of the Utilisation comply with Clause 5.3 (Currency and amount); and (iii) the proposed Interest Period complies with Clause 9 (Interest Periods). (b) Only one Loan may be requested in each Utilisation Request.
NON-SUSPENSION OR DEBARMENT CERTIFICATION The City of Xxxxxx is prohibited from contracting with or making prime or sub-awards to parties that are suspended or debarred or whose principals are suspended or debarred from Federal, State, or City of Xxxxxx Contracts. By accepting a Contract with the City, the Vendor certifies that its firm and its principals are not currently suspended or debarred from doing business with the Federal Government, as indicated by the General Services Administration List of Parties Excluded from Federal Procurement and Non-Procurement Programs, the State of Texas, or the City of Xxxxxx.
Delivery of a Utilisation Request The Borrower may utilise the Facility by delivery to the Agent of a duly completed Utilisation Request not later than the Specified Time.