System Security Review All systems processing and/or storing County PHI or PI must have at least an annual system risk assessment/security review which provides assurance that administrative, physical, and technical controls are functioning effectively and providing adequate levels of protection. Reviews should include vulnerability scanning tools.
Contractor Security Clearance Customers may designate certain duties and/or positions as positions of “special trust” because they involve special trust responsibilities, are located in sensitive locations, or have key capabilities with access to sensitive or confidential information. The designation of a special trust position or duties is at the sole discretion of the Customer. Contractor or Contractor’s employees and Staff who, in the performance of this Contract, will be assigned to work in positions determined by the Customer to be positions of special trust, may be required to submit to background screening and be approved by the Customer to work on this Contract.
Predecessor Security The term “
Payment for Securities Sold, etc In its sole discretion and from time to time, the Custodian may credit the Fund Custody Account, prior to actual receipt of final payment thereof, with (i) proceeds from the sale of Securities which it has been instructed to deliver against payment, (ii) proceeds from the redemption of Securities or other assets of the Fund, and (iii) income from cash, Securities or other assets of the Fund. Any such credit shall be conditional upon actual receipt by Custodian of final payment and may be reversed if final payment is not actually received in full. The Custodian may, in its sole discretion and from time to time, permit the Fund to use funds so credited to the Fund Custody Account in anticipation of actual receipt of final payment. Any such funds shall be repayable immediately upon demand made by the Custodian at any time prior to the actual receipt of all final payments in anticipation of which funds were credited to the Fund Custody Account.
Successor Securities Administrator Any successor Securities Administrator appointed as provided in Section 8.17 hereof shall execute, acknowledge and deliver to the Trustee, the Depositor, the Seller, the Servicer and to its predecessor Securities Administrator an instrument accepting such appointment hereunder, and thereupon the resignation or removal of the predecessor Securities Administrator shall become effective, and such successor Securities Administrator without any further act, deed or conveyance, shall become fully vested with all the rights, powers, duties and obligations of its predecessor hereunder, with like effect as if originally named as Securities Administrator. The Depositor, the Seller, the Servicer, the Trustee and the predecessor Securities Administrator shall execute and deliver such instruments and do such other things as may reasonably be required for fully and certainly vesting and confirming in the successor Securities Administrator, all such rights, powers, duties and obligations. No successor Securities Administrator shall accept appointment as provided in this Section 8.18 unless at the time of such acceptance such successor Securities Administrator shall be eligible under the provisions of Section 8.16 hereof and the appointment of such successor Securities Administrator shall not result in a downgrading of the Classes of Certificates rated by the Rating Agencies, as evidenced by a letter from each Rating Agency. Upon acceptance of appointment by a successor Securities Administrator as provided in this Section 8.18, the successor Securities Administrator shall mail notice of such appointment hereunder to all Holders of Certificates at their addresses as shown in the Certificate Register and to the Rating Agencies.
Monitoring and Risk Assessment of Securities Depositories Prior to the placement of any assets of the Fund with a non-U.S. Securities Depository, the Custodian: (a) shall provide to the Fund or its authorized representative an assessment of the custody risks associated with maintaining assets within such Securities Depository; and (b) shall have established a system to monitor the custody risks associated with maintaining assets with such Securities Depository on a continuing basis and to promptly notify the Fund or its Investment Adviser of any material changes in such risk. In performing its duties under this subsection, the Custodian shall use reasonable care and may rely on such reasonable sources of information as may be available including but not limited to: (i) published ratings; (ii) information supplied by a Subcustodian that is a participant in such Securities Depository; (iii) industry surveys or publications; (iv) information supplied by the depository itself, by its auditors (internal or external) or by the relevant Foreign Financial Regulatory Authority. It is acknowledged that information procured through some or all of these sources may not be independently verifiable by the Custodian and that direct access to Securities Depositories is limited under most circumstances. Accordingly, the Custodian shall not be responsible for errors or omissions in its duties hereunder provided that it has performed its monitoring and assessment duties with reasonable care. The risk assessment shall be provided to the Fund or its Investment Advisor by such means as the Custodian shall reasonably establish. Advices of material change in such assessment may be provided by the Custodian in the manner established as customary between the Fund and the Custodian for transmission of material market information.
Restricted Global Security to Regulation S Global Security If a holder of a beneficial interest in a Restricted Global Security deposited with or on behalf of DTC wishes at any time to exchange its interest in such Restricted Global Security for an interest in a Regulation S Global Security, or to transfer its interest in such Restricted Global Security to a Person who wishes to take delivery thereof in the form of an interest in a Regulation S Global Security, such holder, provided such holder is not a U.S. person, may, subject to the rules and procedures of DTC, exchange or cause the exchange of such interest for an equivalent beneficial interest in the Regulation S Global Security. Upon receipt by the Trustee, as Certificate Registrar, of (I) instructions from DTC directing the Trustee, as Certificate Registrar, to be credited a beneficial interest in a Regulation S Global Security in an amount equal to the beneficial interest in such Restricted Global Security to be exchanged but not less than the minimum denomination applicable to such holder’s Certificates held through a Regulation S Global Security, (II) a written order given in accordance with DTC’s procedures containing information regarding the participant account of DTC and, in the case of a transfer pursuant to and in accordance with Regulation S, the Euroclear or Clearstream account to be credited with such increase and (III) a certificate in the form of Exhibit N-1 hereto given by the holder of such beneficial interest stating that the exchange or transfer of such interest has been made in compliance with the transfer restrictions applicable to the Global Securities, including that the holder is not a U.S. person, and pursuant to and in accordance with Regulation S, the Trustee, as Certificate Registrar, shall reduce the principal amount of the Restricted Global Security and increase the principal amount of the Regulation S Global Security by the aggregate principal amount of the beneficial interest in the Restricted Global Security to be exchanged, and shall instruct Euroclear or Clearstream, as applicable, concurrently with such reduction, to credit or cause to be credited to the account of the Person specified in such instructions a beneficial interest in the Regulation S Global Security equal to the reduction in the principal amount of the Restricted Global Security.
Log Reviews All systems processing and/or storing PHI COUNTY discloses to 11 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 12 must have a routine procedure in place to review system logs for unauthorized access.
Data Security Requirements Without limiting Contractor’s obligation of confidentiality as further described in this Contract, Contractor must establish, maintain, and enforce a data privacy program and an information and cyber security program, including safety, physical, and technical security and resiliency policies and procedures, that comply with the requirements set forth in this Contract and, to the extent such programs are consistent with and not less protective than the requirements set forth in this Contract and are at least equal to applicable best industry practices and standards (NIST 800-53).
Security Assessment If Accenture reasonably determines, or in good faith believes, that Supplier’s security practices or procedures do not meet Supplier’s obligations under the Agreement, then Accenture will notify Supplier of the deficiencies. Supplier will without unreasonable delay: (i) correct such deficiencies at its own expense; (ii) permit Accenture, or its duly authorized representatives, to assess Supplier’s security-related activities that are relevant to the Agreement; and (iii) timely complete a security questionnaire from Accenture on a periodic basis upon Accenture’s request. Security issues identified by Accenture will be assigned risk ratings and an agreed-to timeframe to remediate. Supplier will remediate all the security issues identified within the agreed to timeframes. Upon Supplier’s failure to remediate any high or medium rated security issues within the stated timeframes, Accenture may terminate the Agreement in accordance with Section 8 above.