Examples of Information Security Schedule in a sentence
All capitalized terms not defined in this Information Security Schedule (this “Security Schedule”) shall have the meanings ascribed to them in the Transfer Agency and Service Agreement by and between DST and each of the funds listed on Exhibit A thereto (each such fund, or series thereof, severally, and not jointly, the “Fund”) dated March 1, 2022 (the “Agreement”).
All capitalized terms not defined in this Information Security Schedule (this “Security Schedule”) shall have the meanings ascribed to them in the Transfer Agency and Service Agreement by and between Transfer Agent and each of the funds listed on Exhibit A thereto (each such fund, or series thereof, severally, and not jointly, the “Fund”) dated January 31, 2017 (the “Agreement”).
In addition to requirements set forth in the Agreement, Supplier shall handle, treat, store, access (or limit access), and otherwise protect Company Confidential Information in accordance with the terms of this Information Security Schedule.
DST agrees that such information security program will, at a minimum, comply with Exhibit C (Information Protection Program) and Exhibit E (Client Information Security Schedule) (collectively, the “Standards”) each of which is made a part of this Agreement and applies to the Services.
Without limiting the foregoing, DST agrees to comply with the Client Information Security Schedule attached hereto, and implement and maintain a written information security program (which may be modified by DST from time to time, provided that at all times it contains measures that will be no less rigorous than those described in the Client Information Security Schedule attached hereto).
We may amend the Jamf Information Security Schedule with written notice to you, provided that we will not modify it in a way that materially degrades or lessens the security measures we take.
If after completion of the Security Assessment, Customer reasonably determines, or in good faith believes, that Jamf’s security practices and procedures do not meet Jamf’s obligations pursuant to the Agreement or this Information Security Schedule, then Customer will notify Jamf of the perceived deficiencies.
For purposes of this Information Security Schedule, the term “Security” means Provider’s technological, physical, administrative and procedural safeguards, including but not limited to policies, procedures, standards, controls, hardware, software, firmware and physical security measures, the function or purpose of which is, in whole or part, to protect the confidentiality, integrity or availability of information and data) satisfactory to Company to protect EIS and Company’s Confidential Information.
If Accenture reasonably determines, or in good faith believes, that Provider’s security practices and procedures do not meet Provider’s obligations pursuant to the Agreement or this Information Security Schedule, then Accenture may notify Provider of the deficiencies.
Thus, the latency can be significantly reduced by linking into Q-RAM in-process.We invoke the algorithm a total of 50 times in 5 second in- tervals over a period of 250 seconds, and measure average CPU utilization.