SECOND AMENDMENT TO PARTICIPATION AGREEMENT
SECOND AMENDMENT TO
THIS SECOND AMENDMENT (“Amendment”) amends the Participation Agreement dated August 27, 2010 (together with any prior amendments thereto, the “Agreement”), which is hereby incorporated by reference, and is made as of the Amendment Effective Date of October 1, 2020, by and between EQUITABLE FINANCIAL LIFE INSURANCE COMPANY OF AMERICA (formerly known as MONY Life Insurance Company of America) (the “Company”); LORD XXXXXX SERIES FUND, INC. (the “Fund”); and LORD XXXXXX DISTRIBUTOR LLC (the “Distributor”).
WHEREAS, the Company, the Fund, and the Distributor incorporated additional terms into the Agreement through an amendment with effective date of November 29, 2018;
WHEREAS, the Company, the Fund, and the Distributor desire to further amend the Agreement by updating the Agreement’s confidentiality language; and
WHEREAS, on or prior to June 15, 2020, Company changed its registered name from AXA Equitable Life Insurance Company to Equitable Financial Life Insurance Company.
NOW, THEREFORE, in consideration of the Agreement and the mutual covenants contained herein, the parties hereto agree as follows:
1. | Section 12.1 of the Agreement is hereby deleted in its entirety and replaced with the following language |
12.1. The parties agree to comply with the confidentiality and information security requirements set forth under Schedule E.
2. | Schedule E - Confidentiality and Information Security Requirements. Schedule E is hereby attached to this Amendment and incorporated into the Agreement and given full force and effect as if it had been included in the Agreement in full text. |
3. | The remaining terms and conditions of the Agreement not modified herein shall remain in full force and effect. |
4. | This Amendment may be executed in two or more counterparts, each of which shall be deemed an original, but all of which together shall constitute only one instrument. |
5. | This Amendment and the provisions herein contained shall be binding upon and inure to the benefit of the Fund and the Distributor and the Company and their respective successors and assigns. |
Signature Blocks on Following Page
IN WITNESS WHEREOF, the parties hereto have signed this Amendment.
EQUITABLE FINANCIAL LIFE INSURANCE COMPANY OF AMERICA: |
LORD XXXXXX SERIES FUND, INC.: |
By: |
|
By: |
|
Name: Xxxxxxx Xxxxxxxxx | Name: Xxxxxxxx X. Xxxxxxx | |||||||
Title: Senior Vice President | Title: Vice President and Secretary | |||||||
Date Signed: 10/7/2020 | 6:44 PM EDT | Date Signed: 10/1/20 |
LORD XXXXXX DISTRIBUTOR LLC, BY ITS | ||||||||
ITS MANAGING MEMBER, LORD, XXXXXX & CO. LLC |
By: |
|
Name: Xxxxxxxx X. Xxxxxxx | ||||||||
Title: Member | ||||||||
Date Signed: 10/1/20 |
SCHEDULE E
Confidentiality and Information Security
1 Defined. As used herein, the Fund and the Distributor’s “Confidential Information” will mean will mean information or materials about the Fund and/or the Distributor or any of their affiliates, whether or not proprietary to the Fund and/or the Distributor or any of their affiliates, whether disclosed intentionally by or acquired unintentionally from the Fund and/or the Distributor, any affiliate, any of their other service providers, agents or representatives or any director, officer or employee of any of the foregoing, whether in written, electronic, visual or oral form, regardless of how transmitted, and whether or not marked “confidential” or “proprietary,” including, without limitation information concerning past, present or prospective products, assets, services, systems, customers, employees, financial professionals, shareholders, agents, representatives, finances, books and/or records, business affairs and/or relationships, business plans, trade secrets, methods of operations, distribution and/or marketing strategies and/or procedures or other internal matters. As used herein, the Company “Confidential Information” will mean information or materials about the Company or any of its affiliates, whether or not proprietary to the Company or any of its affiliates, whether disclosed intentionally by or acquired unintentionally from the Company, any affiliate, any of its other service providers, agents or representatives or any director, officer or employee of any of the foregoing, whether in written, electronic, visual or oral form, regardless of how transmitted, and whether or not marked “confidential” or “proprietary,” including, without limitation information concerning past, present or prospective products, assets, services, systems, customers, employees, financial professionals, shareholders, agents, representatives, finances, books and/or records, business affairs and/or relationships, business plans, trade secrets, methods of operations, distribution and/or marketing strategies and/or procedures or other internal matters. The Company’s Confidential Information also includes any personal, financial or identifying information of an individual person including, without limitation, any past, present or prospective individuals who are customers, directors, officers, employees, financial professionals, shareholders, agents or representatives of the Company or any of its affiliates, such as name, address, telephone numbers, sex, age, social security number, account and/or employee numbers, finances, business, health, employment, credit standing, history, hobbies and personal relations and any list, description or other grouping directly or indirectly derived in whole or part therefrom. (“Personal Information”) and information, directly or indirectly, derived by or on behalf of the Fund or the Distributor from the Company Confidential Information, using the Company Confidential Information exclusively or combined with other information, and information obtained by the Fund and the Distributor from third parties to expand upon, support or elucidate the Company’s Confidential Information and summaries and analyses of or involving the Company’s Confidential Information.
2 Obligations. The party receiving (“Receiving Party”) Confidential Information of the other party (“Disclosing Party”) will exercise at least the same degree of care with respect to the Disclosing Party’s Confidential Information that the Receiving Party exercises to protect its own Confidential Information, but in no event shall the Receiving Party use less than reasonable care. The Receiving Party will only use or reproduce the Disclosing Party’s Confidential Information to the extent necessary to enable the Receiving Party to fulfill its obligations under this Agreement. Further, the Receiving Party may disclose the Disclosing Party’s Confidential Information to the directors, officers and/or employees of Receiving Party who have a need to know such information (and only to the extent necessary) in order to fulfill the purposes contemplated by this Agreement (“Qualified Staff Persons”), provided that Receiving Party has first informed such Qualified Staff Persons of the obligations imposed by this Section and remains liable at all times for the acts or omissions of its Qualified Staff Persons. Further, the Company will have the right to provide this Agreement, or any Work Order, to an affiliate.
3 Nondisclosure. Receiving Party shall not disclose Confidential Information to any other person, including without limitation any of its subsidiaries, affiliates, authorized subcontractors or other agents or representatives except such persons who have a need to know such information in order to fulfill the purposes contemplated by this Agreement. Any breach of confidentiality by such person shall be deemed to be a breach by Receiving Party of Receiving Party’s obligations hereunder.
4 Information Security Program. The Fund and the Distributor warrant and represent that each has adopted and implemented, and covenant that each will maintain, a comprehensive information security program (“The Fund and the Distributor’s Information Security Programs”) incorporating administrative, technical, and physical safeguards: (a) to ensure the confidentiality of Personal Information in its possession or control; (b) to protect against any anticipated threats or hazards to the security or integrity of Personal Information; (c) to protect against unauthorized access to or use of Personal Information, including without limitation programs to train the Fund and the Distributor’s personnel and agents in safeguarding the same, (d) to prevent the loss, destruction or alteration of the Company’s Confidential Information, and (e) to, upon written request, destroy all electronic and hard-copy materials containing the Company Confidential Information that the Fund or the Distributor are permitted or required to destroy hereunder in a safe and secure manner.
5 Reviews. The Fund and the Distributor shall periodically audit and review each of their Information Security Programs to ensure its continued effectiveness to safeguard the Company’s Personal Information as required herein and determine whether adjustments are necessary in light of circumstances including, without limitation, changes in technology, information systems, new or revised regulations, industry best practices or changing threats or hazards to the Company’s Personal Information. Upon reasonable request by the Company, the Fund or the Distributor shall permit the Company or its representative the right to audit the Fund or the Distributor’s Information Security Programs and its data security policies and procedures via a questionnaire based due diligence assessment to confirm the Fund or the Distributor’s compliance with the requirements of this Agreement with respect thereto.
6 Incident Management. The Fund and the Distributor shall:
a. Provide the Company with the name and contact information for an employee of the Fund and the Distributor who shall serve as the Company’s primary security contact and shall be available to assist the Company at all reasonable times including business hours as a contact in resolving obligations associated with a security breach; and
b. Notify the Company Chief Privacy Officer at XxxxxxxXxxxxx@xxxxxxxxx.xxx of a security breach or unauthorized data exposures as soon as practicable, once the Fund or the Distributor becomes aware of any such breach but in no event later than in the time required by applicable state and federal laws and regulations.
7 Mitigation. The Fund and the Distributor understand and acknowledge that any security breach of Personal Information may impose obligations on the Company to notify affected individuals as well as regulators of such security breach and take steps, among others, to mitigate any adverse impact or other harm to its customers and/or prospective customers arising from such security breach. The Fund and the Distributor agree to reasonably cooperate with and assist the Company in meeting all such obligations.
8 Nonconfidential Information. Notwithstanding anything to the contrary herein, Receiving Party shall have no obligation to preserve the confidentiality of any Confidential Information which:
a. is or becomes publicly known (other than through unauthorized disclosure by the Disclosing Party) and is available to Receiving Party without use of or reference to any of Disclosing Party’s Confidential Information;
b. at the time of disclosure to Receiving Party, is already in the possession of or known to Receiving Party and is available to Receiving Party without use of or reference to any of Disclosing Party’s Confidential Information and is not subject to any other confidentiality undertaking;
c. is disclosed to Receiving Party by any person or entity other than Disclosing Party and is available to Receiving Party without use of or reference to any of Disclosing Party’s Confidential Information and is not subject to any other confidentiality undertaking; or
d. is developed by Receiving Party without use of or reference to any Confidential Information or any other information subject to a confidentiality undertaking.
The foregoing exceptions shall not apply to Personal Information.
9 Government Disclosures. In the event that Receiving Party becomes legally compelled by a court of competent jurisdiction or by a governmental body to disclose any Confidential Information, Receiving Party will give Disclosing Party prompt written notice of such requirement, together with a copy of such demand, to enable Disclosing Party to seek a protective order or other remedy. In the event that Disclosing Party elects not to seek or is unable to obtain a protective order or other remedy, Receiving Party will only disclose that portion of the Disclosing Party’s Confidential Information which it is advised in writing by its legal counsel is legally required to be disclosed and will make reasonable efforts to obtain assurance that confidential treatment will be accorded such Confidential Information.
10 Return of Confidential Information. Except as otherwise expressly provided in this Agreement, upon written request, Receiving Party will, and will cause all others in possession to, return to Disclosing Party (or such third party or Parties as Disclosing Party may designate in writing) all documents and materials (and all copies thereof) containing Confidential Information, whether in hardcopy, electronic form or otherwise, promptly following termination of this Agreement, with or without cause. The Receiving Party will certify in writing that it has fully complied with its obligations under this Section within seven (7) days after its receipt of a request from the Disclosing Party for such a certification.
11 Third-Party Suppliers, Sub-contractors, Sub-servicers and/or Hosting Providers:
The Fund and the Distributor warrant and represent that each will ensure its third-party suppliers, sub-contractors, sub-servicers and/or Hosting provider adhere to the Fund and the Distributor’s obligation of ensuring its continued effectiveness to safeguard the Company Confidential Information and maintenance of a comprehensive security program, including incorporation of administrative, technical and physical safeguards as detailed in the Information Security Program Section. The Fund or the Distributor shall regularly monitor and perform due diligence regarding their third-party suppliers’, sub-contractors’, sub-servicers’ and/or hosting providers’ controls to ensure the effectiveness of their respective internal control environments.