Information Security Program Overview Sample Clauses

Information Security Program Overview. A. During the term of the Agreement, BNY Mellon will implement and maintain an information security program (“ISP”) with written policies and procedures reasonably designed to protect the confidentiality, availability and integrity of the Customer’s Confidential Information provided to BNY Mellon in accordance with the Agreement and when in BNY Mellon’s possession or under BNY Mellon’s control (“Customer Data”). The ISP will include administrative, technical and physical safeguards, appropriate to the type of Customer Data concerned, reasonably designed to: (i) maintain the integrity, confidentiality and availability of Customer Data; (ii) protect against anticipated threats or hazards to the security or integrity of Customer Data; (iii) protect against unauthorized access to or use of Customer Data that could result in substantial harm or inconvenience to the Customer or its customers, and (iv) provide for secure disposal of Customer Data.
AutoNDA by SimpleDocs
Information Security Program Overview. A. During the term of the Agreement, BNYM will implement and maintain an information security program (“ISP”) with written policies and procedures reasonably designed to protect the confidentiality, availability and integrity of the Fund’s Confidential Information provided to BNYM in accordance with the Agreement and when in BNYM’s possession or under BNYM’s control (“Customer Data”). The ISP will include administrative, technical and physical safeguards, appropriate to the type of Customer Data concerned, reasonably designed to: (i) maintain the integrity, confidentiality and availability of Customer Data; (ii) protect against anticipated threats or hazards to the security or integrity of Customer Data; (iii) protect against unauthorized access to or use of Customer Data that could result in substantial harm or inconvenience to the Fund or its customers, and (iv) provide for secure disposal of Customer Data.
Information Security Program Overview. A. During the term of the Agreement, BNY Mellon will implement and maintain an information security program (“ISP”) with written policies and procedures reasonably designed to protect the confidentiality and integrity of the Funds’ Confidential Information provided to BNY Mellon in accordance with the Agreement and when in BNY Mellon’s possession or under BNY Mellon’s control (“Customer Data”). The ISP will include administrative, technical and physical safeguards, appropriate to the type of Customer Data concerned, reasonably designed to: (i) maintain the integrity, confidentiality and availability of Customer Data; (ii) protect against anticipated threats or hazards to the security or integrity of Customer Data; (iii) protect against unauthorized access to or use of Customer Data that could result in substantial harm or inconvenience to the Funds, (iv) provide for secure disposal of Customer Data, and (v) comply with other privacy and cybersecurity laws applicable to BNY Mellon in connection with the services provided under this Agreement.

Related to Information Security Program Overview

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Personal Information security breach Supplier/Service Provider’s Obligations

  • Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.

  • Security Program Contractor will develop and implement an effective security program for the Project Site, which program shall require the Contractor and subcontractors to take measures for the protection of their tools, materials, equipment, and structures. As between Contractor and Owner, Contractor shall be solely responsible for security against theft of and damage of all tools and equipment of every kind and nature and used in connection with the Work, regardless of by whom owned.

  • Program Overview A. Goals of the Choice Neighborhoods Program. The Choice Neighborhoods Program employs a comprehensive approach to neighborhood transformation. The program transforms neighborhoods of concentrated poverty into mixed-income neighborhoods of long-term viability by revitalizing severely distressed public and/or assisted housing; improving access to economic opportunities; and investing and leveraging investments in well-functioning services, effective schools and education programs, public assets, public transportation, and improved access to jobs. Choice Neighborhoods ensures that current residents benefit from this transformation by preserving affordable housing in the neighborhood or providing the choice to move to affordable housing in another neighborhood of opportunity. The purpose of this grant is to implement a Transformation Plan that has been developed through a local planning process and furthers the goals of the Choice Neighborhoods Program. The core goals of Choice Neighborhoods are:

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Review of Documentation The Depositor, by execution and delivery hereof, acknowledges receipt of the Mortgage Files pertaining to the Mortgage Loans listed on the Mortgage Loan Schedule, subject to review thereof by Xxxxx Fargo Bank National Association, LaSalle Bank National Association, Deutsche Bank National Trust Company and U.S. Bank National Association as applicable (each, a “Custodian” and, together, the “Custodians”), for the Depositor. Each Custodian is required to review, within 45 days following the Closing Date, each applicable Mortgage File. If in the course of such review the related Custodian identifies any Material Defect, the Seller shall be obligated to cure such Material Defect or to repurchase the related Mortgage Loan from the Depositor (or, at the direction of and on behalf of the Depositor, from the Trust Fund), or to substitute a Qualifying Substitute Mortgage Loan therefor, in each case to the same extent and in the same manner as the Depositor is obligated to the Trustee and the Trust Fund under Section 2.02(c) of the Trust Agreement.

  • Contractor Information The Contractor will provide up to date information for each of the following in the form and manner specified by OGS:

  • Licensed Documentation If commercially available, Licensee shall have the option to require the Contractor to deliver, at Contractor’s expense: (i) one (1) hard copy and one (1) master electronic copy of the Documentation in a mutually agreeable format; (ii) based on hard copy instructions for access by downloading from the Internet

  • Safety and Security Procedures Contractor shall maintain and enforce, at the Contractor Work Locations, industry-standard safety and physical security policies and procedures. While at each Court Work Location, Contractor shall comply with the safety and security policies and procedures in effect at such Court Work Location.

Time is Money Join Law Insider Premium to draft better contracts faster.