Information Security Safeguards Sample Clauses

Information Security Safeguards. Bank has established, and during the term of this Agreement Bank shall maintain, a Corporate Information Security Program (the “Information Security Program”) at each applicable service location. The Information Security Program shall, at a minimum, require physical and electronic information security safeguards against the loss, theft, damage, compromise, processing, transmission, storage, destruction and unauthorized disclosure of, and unauthorized access to, Customer Information in the possession of Bank. Bank will use commercially reasonable efforts to update the Information Security Program, at a minimum, as may be reasonably necessary to comply with changes in privacy and other similar laws applicable to Bank that become effective after the date of this Agreement. The Information Security Program is subject to change; provided, however, that the protections afforded by the Information Security Program will be not be diminished in comparison with those provided by Bank as of the execution of this Agreement.
AutoNDA by SimpleDocs
Information Security Safeguards a. Engineer shall implement appropriate administrative, physical, and technical safeguards, in accordance with TxDOT’s security requirements, that reasonably and appropriately protects the confidentiality, integrity, and availability of TxDOT data.
Information Security Safeguards. The Data Recipient and all of its Affiliates and Representatives have implemented, currently maintain, and will maintain throughout the term of this Agreement an information security program designed to protect Data, which program includes administrative, technical and physical safeguards (i) to ensure the security and confidentiality of Data; (ii) to protect against any anticipated threats or hazards to the security or integrity of such Data; and (iii) to protect against unauthorized access to or use of Data which could result in harm or inconvenience to the Data Provider or its customers ("Information Security Safeguards").
Information Security Safeguards. Hearsay shall maintain throughout the Term an information security program that is reasonably designed to provide protection to the security, confidentiality, integrity and availability of Customer Confidential Information in accordance with applicable laws governing privacy of personal information in the United States, E.U. and Canada, and at a minimum, includes controls for (i) system access, (ii) system and application development and maintenance, (iii) change management, (iv) incident response, physical and environmental security, (v) disaster recovery/business continuity, and (vi) employee training. (“Information Security Safeguards”).
Information Security Safeguards. Vendor shall establish and maintain a comprehensive information security program detailing administrative, technical, and physical safeguards reasonably designed to protect against anticipated threats or hazards to the security, confidentiality, and integrity of The Hartford Data; and provide for the proper disposal of The Hartford Data (the “Information Security Safeguards”).
Information Security Safeguards a. Surveyor shall implement appropriate administrative, physical, and technical safeguards, in accordance with TxDOT’s security requirements, that reasonably and appropriately protects the confidentiality, integrity, and availability of TxDOT data.
Information Security Safeguards. Partner Organization shall, at all times that it accesses, stores, transmits, maintains or processes Confidential District Information have in place reasonable and appropriate administrative, physical and technical safeguards to protect the confidentiality, integrity and availability of such information.
AutoNDA by SimpleDocs
Information Security Safeguards. Access: Access rights for users of Partner information systems are centrally administered by the Partner information technology team. Partner users are divided into role profiles that determine the type of access they are granted. Partner Personnel’s access to Customer Personal Information is only on a need- to-know basis and to the extent necessary to perform services under the agreement with Proofpoint, or as otherwise instructed by Proofpoint in writing. • Risk Management: Partner will conduct regular testing and monitoring of the effectiveness of its safeguards, controls, and systems, including conducting penetration testing. Partner implements measures, as needed, to address vulnerabilities discovered in a timely manner. • Storage: Partner’s database servers are hosted in Partner facilities, or in a data center operated by a third-party vendor, that has been qualified per Partner’s management procedures. Partner maintains complete administrative control over the virtual servers, and no third-party vendors have logical access to Customer Personal Information. • Authentication: Each account through which Customer Personal Information may be accessed is attributable to a single user with a unique ID which is authenticated through a strong password, or another authentication method. • Passwords: Partner has a password policy that requires strong passwords for access to any Partner information system, including requirements for minimum password length, lockout after several failed attempts, expiration period, complexity, encryption, and changing of default passwords. Authentication credentials (employee and customer) are encrypted in transit, by SSL encryption, and at rest. Partner prohibits sharing user account credentials (e.g., login ID, password).
Information Security Safeguards 

Related to Information Security Safeguards

  • Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.

  • Safeguards Business Associate, its Agent(s) and Subcontractor(s) shall implement and use appropriate safeguards to prevent the use or disclosure of PHI other than as provided for by this Agreement. With respect to any PHI that is maintained in or transmitted by electronic media, Business Associate or its Subcontractor(s) shall comply with 45 CFR sections 164.308 (administrative safeguards), 164.310 (physical safeguards), 164.312 (technical safeguards) and 164.316 (policies and procedures and documentation requirements). Business Associate or its Agent(s) and Subcontractor(s) shall identify in writing upon request from Covered Entity all of the safeguards that it uses to prevent impermissible uses or disclosures of PHI.

  • Information Regarding Collateral (a) Not effect any change (i) in any Loan Party's legal name, (ii) in the location of any Loan Party's chief executive office, (iii) in any Loan Party's identity or organizational structure, (iv) in any Loan Party's Federal Taxpayer Identification Number or organizational identification number, if any, or (v) in any Loan Party's jurisdiction of organization (in each case, including by merging with or into any other entity, reorganizing, dissolving, liquidating, reorganizing or organizing in any other jurisdiction), until (other than in the case of any liquidation or dissolution of Regency Gas Treating LP in accordance with Section 6.05(e)) (A) it shall have given the Collateral Agent and the Administrative Agent not less than 20 days' prior written notice (in the form of an Officers' Certificate), or such lesser notice period agreed to by the Collateral Agent, of its intention so to do, clearly describing such change and providing such other information in connection therewith as the Collateral Agent or the Administrative Agent may reasonably request and (B) it shall have taken all action reasonably satisfactory to the Collateral Agent to maintain the perfection and priority of the security interest of the Collateral Agent for the benefit of the Secured Parties in the Collateral, if applicable. Each Loan Party agrees to promptly provide the Collateral Agent with certified Organizational Documents reflecting any of the changes described in the preceding sentence. Each Loan Party also agrees to promptly notify the Collateral Agent of any change in the location of any office in which it maintains books or records relating to Collateral owned by it or any office or facility at which Collateral is located (including the establishment of any such new office or facility), other than changes in location to a Mortgaged Property or a leased property subject to a Landlord Access Agreement.

Time is Money Join Law Insider Premium to draft better contracts faster.