Information Security Assessment (or Third Party Information security Assessment) Sample Clauses

Information Security Assessment (or Third Party Information security Assessment). If either Party to this contract, stores or has in its possession or control any PCI Data and/or PII, such Party shall permit representatives of the other Party, upon prior notice and at reasonable times, to examine and verify compliance with such Party’s obligations under the Agreement with respect to: (a) the safeguarding and use of PCI Data and/or PII; and (b) the detection, prevention, and mitigation of an actual or attempted theft or misappropriation of PCI Data and/or PII. Each examination and verification may include conducting information security assessments of such Party and its practices and procedures. Such examinations or assessments will be limited to infrastructure, technologies, Systems and applications that are being used to service the Program. Information security assessments will consist of (x) security questionnaires requiring responses from such Party, or their respective personnel, (y) visits to locations where (or from where) PCI Data and/or PII is stored, processed, administered or otherwise accessed in support of the Program. The Party conducting and reviewing the information security questionnaires shall conduct the assessments in a manner that does not unreasonably interfere with the business operations of the Party being assessed. The Party conducting the assessment shall detail all findings in a notice to the Party being assessed and shall work with the Party being assessed to identify a reasonable and cost effective means for remediating the problems and addressing the concerns to the mutual satisfaction of the Parties.
AutoNDA by SimpleDocs

Related to Information Security Assessment (or Third Party Information security Assessment)

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • INFORMATION SECURITY SCHEDULE All capitalized terms not defined in this Information Security Schedule (this “Security Schedule”) shall have the meanings ascribed to them in the Transfer Agency and Service Agreement by and between DST and each of the funds listed on Exhibit A thereto (each such fund, or series thereof, severally, and not jointly, the “Fund”) dated March 1, 2022 (the “Agreement”). DST and Fund hereby agree that DST shall maintain and comply with an information security policy (“Security Policy”) that satisfies the requirements set forth below; provided, that, because information security is a highly dynamic space (where laws, regulations and threats are constantly changing), DST reserves the right to make changes to its information security controls at any time and at the sole discretion of DST in a manner that it believes does not materially reduce the protection it applies to Fund Data. From time to time, DST may subcontract services performed under the Agreement (to the extent provided for under the Agreement) or provide access to Fund Data or its network to a subcontractor or other third party; provided, that, such subcontractor or third party implements and maintains security measures DST believes are at least as stringent as those described in this Security Schedule. For the purposes of this Schedule “prevailing industry practices and standards” refers to standards among financial institutions, including mutual funds, and third parties providing financial services to financial institutions.

  • Information Security 10.1 The Transfer Agent shall maintain reasonable safeguards for maintaining in confidence any and all Fund Confidential Information, including, without limitation, the policies and procedures described in Section 10.2. The Transfer Agent shall not, at any time, use any such Fund Confidential Information for any purpose other than as specifically authorized by this Agreement, or in writing by the Fund.

  • Third Party Information I understand, in addition, that the Company has received and in the future will receive from third parties confidential or proprietary information (“Third Party Information”) subject to a duty on the Company’s part to maintain the confidentiality of such information and to use it only for certain limited purposes. During the term of my employment and thereafter, I will hold Third Party Information in the strictest confidence and will not disclose to anyone (other than Company personnel who need to know such information in connection with their work for the Company) or use, except in connection with my work for the Company, Third Party Information unless expressly authorized by an officer of the Company in writing.

  • Access to Information; Independent Investigation Prior to the execution of this Agreement, the Subscriber has had the opportunity to ask questions of and receive answers from representatives of the Company concerning an investment in the Company, as well as the finances, operations, business and prospects of the Company, and the opportunity to obtain additional information to verify the accuracy of all information so obtained. In determining whether to make this investment, Subscriber has relied solely on Subscriber’s own knowledge and understanding of the Company and its business based upon Subscriber’s own due diligence investigation and the information furnished pursuant to this paragraph. Subscriber understands that no person has been authorized to give any information or to make any representations which were not furnished pursuant to this Section 2 and Subscriber has not relied on any other representations or information in making its investment decision, whether written or oral, relating to the Company, its operations and/or its prospects.

  • Information Regarding the Collateral (a) Furnish to the Administrative Agent at least thirty (30) days prior written notice of any change in: (i) any Loan Party’s name or in any trade name used to identify it in the conduct of its business or in the ownership of its properties; (ii) the location of any Loan Party’s chief executive office, its principal place of business, any office in which it maintains books or records relating to Collateral owned by it or any office or facility at which Collateral owned by it is located (including the establishment of any such new office or facility); (iii) any Loan Party’s organizational structure or jurisdiction of incorporation or formation; or (iv) any Loan Party’s Federal Taxpayer Identification Number or organizational identification number assigned to it by its state of organization. The Loan Parties agree not to effect or permit any change referred to in the preceding sentence unless all filings have been made under the UCC or otherwise that are required in order for the Collateral Agent to continue at all times following such change to have a valid, legal and perfected first priority security interest in all the Collateral for its own benefit and the benefit of the other Credit Parties.

  • Property Information (A) To the knowledge of Borrower, the Collateral Properties include sufficient on-site parking to comply with Applicable Law; (B) the Collateral Properties currently abut completed and dedicated public thoroughfares or otherwise benefit from recorded and insurable easements sufficient to provide access (both ingress and egress) to and from the Collateral Properties and such dedicated public thoroughfares; and (C) to the knowledge of Borrower, no archaeological ruins, discoveries or specimens, or cemeteries exist on any Collateral Property.

  • Intellectual Property and Information Technology (a) Section 5.20(a) of the Company Disclosure Schedule contains a true and complete list, as of the date of this Agreement, of all Company Products.

  • Agreements Regarding Collateral and Field Examination Reports (ll) Lien Releases;

  • Access to Certain Documentation and Information Regarding the Collateral; Audits The Collateral Custodian shall provide to the Administrative Agent access to the Required Asset Documents and all other documentation regarding the Collateral including in such cases where the Administrative Agent is required in connection with the enforcement of the rights or interests of the Secured Parties, or by applicable statutes or regulations, to review such documentation, such access being afforded without charge but only (i) upon two Business Days prior written request, (ii) during normal business hours and (iii) subject to the Servicer’s and Collateral Custodian’s normal security and confidentiality procedures. Prior to the Closing Date and periodically thereafter at the discretion of the Administrative Agent, the Administrative Agent may review the Servicer’s collection and administration of the Collateral in order to assess compliance by the Servicer with the Credit and Collection Policy, as well as with this Agreement and may conduct an audit of the Collateral, Required Asset Documents in conjunction with such a review. Such review shall be reasonable in scope and shall be completed in a reasonable period of time. Without limiting the foregoing provisions of this Section 8.10, from time to time on request of the Administrative Agent, the Collateral Custodian shall permit certified public accountants or other auditors acceptable to the Administrative Agent to conduct, at the Servicer’s expense, a review of the Required Asset Documents and all other documentation regarding the Collateral.

Time is Money Join Law Insider Premium to draft better contracts faster.