Security Controls Annually, upon Fund’s reasonable request, DST shall provide Fund’s Chief Information Security Officer or his or her designee with a summary of its corporate information security policy and an opportunity to discuss DST’s information security measures, and a high level and non-confidential summary of any penetration testing related to the provision of in-scope services . DST shall review its Security Policy annually.
Disclosure Controls and Procedures; Deficiencies in or Changes to Internal Control Over Financial Reporting The Company has established and maintains disclosure controls and procedures (as defined in Rules 13a-15 and 15d-15 under the Exchange Act), which (i) are designed to ensure that material information relating to the Company, including its consolidated subsidiaries, is made known to the Company’s principal executive officer and its principal financial officer by others within those entities, particularly during the periods in which the periodic reports required under the Exchange Act are being prepared; (ii) have been evaluated by management of the Company for effectiveness as of the end of the Company’s most recent fiscal quarter; and (iii) are effective in all material respects to perform the functions for which they were established. Since the end of the Company’s most recent audited fiscal year, there have been no significant deficiencies or material weakness in the Company’s internal control over financial reporting (whether or not remediated) and no change in the Company’s internal control over financial reporting that has materially affected, or is reasonably likely to materially affect, the Company’s internal control over financial reporting. The Company is not aware of any change in its internal control over financial reporting that has occurred during its most recent fiscal quarter that has materially affected, or is reasonably likely to materially affect, the Company’s internal control over financial reporting.
Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.