Information Security Audit Sample Clauses

Information Security Audit. BNY Mellon shall conduct penetration testing (including through a reputable third party recognized by the information security industry), at least once every rolling 12-month period, to review and assess the adequacy of BNY Mellon’s information security measures, and BNY Mellon shall, at Voya’s request, provide Voya with evidence that such testing has been performed.
AutoNDA by SimpleDocs
Information Security Audit. In addition to the audit rights granted in clause 13 above, NTT (and its representatives) will have the right to audit Supplier’s premises and information security program, upon reasonable advance notice, in order to confirm Supplier’s compliance with the terms set out in this Part 3.
Information Security Audit. Upon prior written notice and at a mutually acceptable time, Client or Client representatives (e.g., external audit consultants or regulators) may audit, test and/or inspect the Accenture’s Data Protection Procedures and the Accenture’s facilities to assure Client Confidential Information is adequately protected. This information security audit is in addition to other audit rights granted herein. The Parties will mutually agree upon the scope of such audits, tests or inspections, which may extend to Accenture subcontractor and Pre-Approved Subcontractors listed in the applicable SOW locations and other Accenture resources (other systems, environmental support, recovery processes, data centers, backup locations, call centers etc.) used to support the systems and handling of Confidential Information, provided that Client shall not be provided access to the data of any other Accenture client or to personal data of Accenture Personnel. Accenture shall inform Client of any internal auditing capability it possesses and permit Client to consult on a confidential basis with such auditors at all reasonable times. Accenture shall promptly take action at its expense to correct all issues identified by an information security audit that, Client, in its reasonable discretion, identifies as requiring correction.
Information Security Audit. Cognizant Group agrees that, subject to the provisions set forth in Section 12.06, an NAIC Auditor may from time-to-time conduct penetration testing and on-site inspections to review and assess the adequacy of Cognizant Group’s information security measures and Cognizant Group shall, at no additional cost or expense to NAIC Group, promptly remedy all deficiencies found as a result of such assessment.
Information Security Audit. (a) TSYS will use commercially reasonable security measures to safeguard its computer systems and physical facilities against (i) the unauthorized destruction, loss, alteration of, or access to COMPANY’s Confidential Information, whether such information is at or on TSYS’ systems or facilities or in transit; and (ii) interruption or disruption of the Services being provided hereunder to COMPANY. TSYS reserves the right to make changes in its security infrastructure and procedures from time to time, so long as TSYS maintains compliance with applicable Laws and Regulations as defined in Section 10.3 of this Agreement.
Information Security Audit. Notwithstanding the foregoing, Supplier agrees that, subject to the provisions set forth in Section 12.04, a Voya Auditor may from time-to-time conduct on-site inspections to review and assess the adequacy of Supplier's information security measures and Supplier shall, at no additional cost or expense to Voya Group, promptly remedy all deficiencies found as a result of such assessment.

Related to Information Security Audit

  • Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Information Regarding Collateral (a) Not effect any change, (i) in any Loan Party’s legal name, (ii) in the location of any Loan Party’s chief executive office, (iii) in any Loan Party’s organizational structure, (iv) in any Loan Party’s Federal Taxpayer Identification Number or organizational identification number, if any (except as may be required by applicable Legal Requirements, in which case, Borrower shall promptly notify the Administrative Agent of such change), or (v) in any Loan Party’s jurisdiction of organization (in each case, including by merging with or into any other entity, reorganizing, dissolving, liquidating, reorganizing or organizing in any other jurisdiction), until (A) it shall have given the Collateral Agent and the Administrative Agent not less than 30 days’ prior written notice (in the form of an Officers’ Certificate) of its intention so to do, clearly describing such change and providing such other information in connection therewith as the Collateral Agent or the Administrative Agent may reasonably request and (B) it shall have taken all action reasonably satisfactory to the Collateral Agent to maintain the validity, enforceability, perfection and priority of the security interest of the Collateral Agent for the benefit of the Secured Parties in the Collateral, if applicable. Each Loan Party shall promptly provide the Collateral Agent with certified Organizational Documents reflecting any of the changes described in the preceding sentence. Each Loan Party shall promptly notify the Collateral Agent of any change in the location of any office in which it maintains books or records relating to Collateral owned by it or any office or facility at which Collateral is located (including the establishment of any such new office or facility), other than changes in location to a Mortgaged Property or a leased property subject to a Landlord Access Agreement.

  • Examination of Mortgage Loan Files and Due Diligence Review The Mortgage Loan Seller shall reasonably cooperate with any examination of the Mortgage Files for, and any other documents and records relating to, the Mortgage Loans, that may be undertaken by or on behalf of the Purchaser on or before the Closing Date. The fact that the Purchaser has conducted or has failed to conduct any partial or complete examination of any of the Mortgage Files for, and/or any of such other documents and records relating to, the Mortgage Loans, shall not affect the Purchaser’s right to pursue any remedy available in equity or at law for a breach of the Mortgage Loan Seller’s representations and warranties made pursuant to Section 4, except as expressly set forth in Section 5.

Time is Money Join Law Insider Premium to draft better contracts faster.