Use and Controls Sample Clauses

Use and Controls 
AutoNDA by SimpleDocs

Related to Use and Controls

  • Export Controls Both Parties will adhere to all applicable laws, regulations and rules relating to the export of technical data and will not export or re-export any technical data, any products received from the other Party or the direct product of such technical data to any proscribed country listed in such applicable laws, regulations and rules unless properly authorized.

  • Access Controls The system providing access to PHI COUNTY discloses to 20 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 21 must use role based access controls for all user authentications, enforcing the principle of least privilege.

  • Audit Controls a. System Security Review. CONTRACTOR must ensure audit control mechanisms that record and examine system activity are in place. All systems processing and/or storing PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have at least an annual system risk assessment/security review which provides assurance that administrative, physical, and technical controls are functioning effectively and providing adequate levels of protection. Reviews should include vulnerability scanning tools.

  • Agreement Controls In the event that any term of any of the Loan Documents other than this Agreement conflicts with any express term of this Agreement, the terms and provisions of this Agreement shall control to the extent of such conflict.

  • Controls Each party will maintain commercially reasonable administrative, technical, and physical controls designed to protect data in its possession or under its control from unauthorised access, accidental loss and unauthorised modification. You are responsible for implementing administrative, technical, and physical controls that are appropriate for your business.

  • TIA Controls If any provision of this Indenture limits, qualifies, or conflicts with another provision which is required to be included in this Indenture by the TIA, the required provision shall control.

  • Internal Controls and Compliance with the Xxxxxxxx-Xxxxx Act Except as set forth in the General Disclosure Package, the Company, its subsidiaries and the Company’s Board of Directors (the “Board”) are in compliance with all applicable provisions of Xxxxxxxx-Xxxxx and Exchange Rules. The Company maintains a system of internal controls, including, but not limited to, disclosure controls and procedures, internal controls over accounting matters and financial reporting, an internal audit function and legal and regulatory compliance controls (collectively, “Internal Controls”) that comply with the applicable Securities Laws and are sufficient to provide reasonable assurances that (i) transactions are executed in accordance with management’s general or specific authorizations, (ii) transactions are recorded as necessary to permit preparation of financial statements in conformity with U.S. Generally Accepted Accounting Principles (“GAAP”) and to maintain accountability for assets, (iii) access to assets is permitted only in accordance with management’s general or specific authorization, and (iv) the recorded accounting for assets is compared with the existing assets at reasonable intervals and appropriate action is taken with respect to any differences. The Internal Controls are, or upon consummation of the offering of the Offered Securities will be, overseen by the Audit Committee (the “Audit Committee”) of the Board in accordance with Exchange Rules. The Company has not publicly disclosed or reported to the Audit Committee or the Board, and within the next 135 days the Company does not reasonably expect to publicly disclose or report to the Audit Committee or the Board, a significant deficiency, material weakness, change in Internal Controls or fraud involving management or other employees who have a significant role in Internal Controls, any violation of, or failure to comply with, the Securities Laws, or any matter which, if determined adversely, would result in a Material Adverse Effect.

  • Personal Controls a. Employee Training. All workforce members who assist in the performance of functions or activities on behalf of COUNTY in connection with Agreement, or access or disclose PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, must complete information privacy and security training, at least annually, at CONTRACTOR’s expense. Each workforce member who receives information privacy and security training must sign a certification, indicating the member’s name and the date on which the training was completed. These certifications must be retained for a period of six (6) years following the termination of Agreement.

  • Xxxxxxxx-Xxxxx; Disclosure Controls The Company is in compliance in all material respects with all of the provisions of the Xxxxxxxx-Xxxxx Act of 2002 which are applicable to it. The Company maintains disclosure controls and procedures (as such term is defined in Rule 13a-15(e) and 15d-15(e) under the Exchange Act), and such disclosure controls and procedures are effective.

  • Technical Safeguards 1. USAC and DSS will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data, so unauthorized persons cannot retrieve any data by computer, remote terminal, or other means. 2. USAC and DSS will strictly limit authorization to these electronic data areas necessary for the authorized user to perform their official duties. All data in transit will be encrypted using algorithms that meet the requirements of the Federal Information Processing Standard (FIPS) Publication 140-2 or 140-3 (when applicable). 3. Authorized system users will be identified by User ID and password, and individually tracked to safeguard against the unauthorized access and use of the system. System logs of all user actions will be saved, tracked and monitored periodically. 4. USAC will transmit data to DSS via encrypted secure file delivery system. For each request, a response will be sent back to USAC to indicate success or failure of transmission.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!