PCI Sample Clauses

PCI. To the extent SELLER stores, transmits, or processes cardholder data (as defined by the Payment Card Industry Data Security Standard, “PCI-DSS”), SELLER will obtain and maintain third- party PCI-DSS certification. SELLER acknowledges in writing that they are responsible for the security of BUYER cardholder data that SELLER possesses or otherwise stores, processes, or transmits on behalf of BUYER and will furnish evidence of current PCI-DSS certification for the relevant services. SELLER will conduct PCI -DSS required quarterly network scans on the in-scope environment via an Approved Scanning Vendor (as defined by PCI-DSS), whose use is hereby consented to by BUYER. All service providers performing work that is “in scope” of Payment Card Industry standards (PCI Service Provider or Merchants) acting on behalf of BUYER must have their PCI scope assessed by a Qualified Security Assessor (QSA) with an annual Report of Compliance (ROC).
PCI. PCI represents, warrants and undertakes to Zavante that Packaging shall have been performed in accordance with Applicable Laws and in conformance with the Specifications; provided, that PCI shall not be liable for defects attributable to Zavante-Supplied Materials (including artwork and labeling).
PCI. The Pavement Condition Index for the roadway, from the local jurisdiction’s Pavement Management Program. EXHIBIT D PAVEMENT MANAGEMENT PROGRAM REPORT The approved ordinance for the Transportation Safety & Investment Plan (Measure X) outlines the requirements for the use of local road maintenance, pothole repair and safety funds. It includes a requirement for each jurisdiction to have a pavement management program. "Each city and the County of Monterey shall develop, or participate in the development of by TAMC, a pavement management program. They shall submit regular reports on the conditions of their streets, to ensure timely repairs and keep the public informed. Development of the pavement management program by TAMC is eligible to be funded out of this program prior to distribution of funds to the cities and the County." SYSTEM REQUIREMENTS: In order to receive Measure X funds, the cities and the County shall utilize a pavement management program (PMP) and submit regular reports on the conditions of their streets, to ensure timely repairs and keep the public informed. The pavement management program should utilize an approved software-based tool for analyzing pavement conditions and reports findings on rehabilitation/maintenance strategies based on funding levels. The pavement management program used by the jurisdiction must contain, at a minimum, the following features:  Store the inventory all roadways within a jurisdiction (in a compatible database with other jurisdictions).  Assess the condition of the roadways (based on seven distresses and three severity levels).  Provide the current Pavement Condition Index (PCI) for the roadways (as per ASTM D6433)  Identify all pavement sections needing maintenance, rehabilitation, or replacement.  Calculate budget needs for maintenance, rehabilitation or replacement of deficient pavement sections (for the current year and the next three years at various overall condition levels).  Develop maintenance strategies for the most cost effective level of maintenance or repair appropriate at the time of the inspection.  Generate pavement management program reports (in various formats). All jurisdictions must implement and maintain an approved Pavement Management Program (“StreetSaver” or equivalent). The “StreetSaver” Pavement Management Program developed by Metropolitan Transportation Commission (MTC) is the most utilized program in the Bay Area and would be an excellent program for this region as well. The use...
PCI. PCI provides a set of requirements established by the Payment Card Industry to enhance cardholder data security and facilitate the adoption of consistent data security measures to protect cardholder and transaction data. These requirements apply to all entities involved in payment card processing and transactions including Payment Card Industry members, merchants, processors, acquirers, issuers, vendors and service providers as well as other entities that store, process, or transmit cardholder data. The PCI Security Standards Council (https://www.pcisecuritystandards.org) is responsible for the development, management, education, and awareness of the PCI Standard, including the: • Data Security Standard (PCI DSS) • Payment Application Data Security Standard (PA-DSS) • PIN Transaction Security (PTS) requirements PCI requirements apply to all systems that store, process or transmit cardholder data as defined by PCI Security Standards.
PCI. PCI may disclose __________ Confidential Information to its employees, directors, and consultants who have a business need to receive such Confidential Information solely for carrying out the purposes of this Agreement and who are bound by confidentiality and use restrictions no less stringent than those set forth in this agreement.
PCI. PCI represents, warrants and undertakes to Client that:
PCI. In the event that Company stores, processes, or transmits CHD, as defined by the PCI DSS, Company shall maintain compliance with the PCI DSS, but only to the degree that the requirements of the PCI DSS are directly applicable to the services provided under contract to SoundBite.
PCI. Fiserv agrees to comply in all material respects with applicable requirements of PCI-DSS to the extent Fiserv stores, processes or transmits “cardholder data” or “sensitive authentication data” (as defined in PCI-DSS) (collectively “Cardholder Data”) on behalf of Client in connection with the Services or to the extent the Services impact the security of Client’s cardholder data environment. Consistent with Section 3(b) (Obligations) of this Master Agreement, Fiserv shall use Cardholder Data only for Fiserv’s performance of the Services and in accordance with this Agreement. Fiserv shall maintain a current PCI-DSS compliance validation, which Client may verify by examining the list of validated entities on the applicable website. (d) Security Incident. If Fiserv confirms or is notified of any incident that has or is reasonably believed to have resulted in unauthorized possession, acquisition, use, destruction, loss, alteration, theft or disclosure of, or unauthorized access to Client Data (each such incident, a “Security Incident”), Fiserv shall as soon as reasonably possible (and in any event within 48 hours or sooner if required by applicable laws after Fiserv confirms the Security Incident) notify the Client Relationship Manager, Client’s Information Security Officer and Client’s Chief Information Officer of such Security Incident and furnish applicable known details. To the extent the Security Incident is within Fiserv’s areas of responsibility, Fiserv shall investigate and mitigate the adverse effects of such Security Incident and shall provide regular updates appropriate to the nature of the Security Incident to Client. In addition, to the extent the Security Incident is within Fiserv’s areas of responsibility, Fiserv shall promptly (and in any event as soon as reasonably practicable) (A) perform a root cause analysis, (B) prepare a corrective action plan, (C) provide in writing to Client applicable information, including how and when such Security Incident occurred and what actions Fiserv is taking or has taken to remedy such Security Incident, and (D) to the extent the Security Incident is within Fiserv’s areas of control, remediate such Security Incident and take commercially reasonable actions to prevent its recurrence. In each case, Fiserv shall perform the activities described in the two preceding sentences at no additional charge to Client to the extent such Security Incident is attributable to the failure of Fiserv or Fiserv Personnel to compl...

Related to PCI

Security Standards The Provider shall implement and maintain commercially reasonable security procedures and practices that otherwise meet or exceed industry standards designed to protect Student Data from unauthorized access, destruction, use, modification, or disclosure, including but not limited to the unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of the Student Data (a "Security Breach"). For purposes of the DPA and this Exhibit G, "Security Breach" does not include the good faith acquisition of Student Data by an employee or agent of the Provider or LEA for a legitimate educational or administrative purpose of the Provider or LEA, so long as the Student Data is used solely for purposes permitted by SOPPA and other applicable law, and so long as the Student Data is restricted from further unauthorized disclosure.
Customer Care The Contractor must develop appropriate, interactive scripts for call center staff to use during initial welcome calls when making outbound calls to new Members and to respond to Member calls, which are subject to Division approval prior to use. The Contractor’s call center staff must also use a Division-approved script to respond to Members who call to request assistance with PCP selection. The Contractor must develop special scripts for emergency and unusual situations, as requested by the Division. All scripts must be clear and easily understood. The Contractor must review the scripts annually to determine any necessary revisions. The Division reserves the right to request and review call center scripts at any time. All call center scripts must be submitted by Contractor to the Division for review and approval thirty (30) calendar days prior to use. Under no circumstances will unlicensed Member services staff provide health-related advice to Members requesting clinical information. In such cases, these calls must be immediately transferred to clinical personnel during regular business hours, as defined above. The Contractor must ensure that all such inquiries are addressed by clinical personnel acting within the scope of their licensure to practice a health- related profession. The Contractor’s internal staff is required to ask the callers whether they are satisfied with the response given to their call. All calls must be documented and if the caller is not satisfied, the Contractor must ensure that the call is referred to the appropriate individual within the Contractor for follow-up and/or resolution. This referral must take place within forty-eight (48) hours of the call. The Contractor is not permitted to utilize electronic call answering methods, as a substitute for staff persons, to perform this service after business hours. The Contractor shall randomly select and record calls received at the call center and monitor no less than three percent (3%) of calls for compliance with customer care guidelines. The Contractor will report the findings of these audits to the Division via a quarterly Deliverable report. The Contractor will make recordings available to the Division upon request within five (5) business days. The Contractor shall maintain the recordings for at least six (6) months.
Information Services Traffic The following provisions shall apply only to Level 3-originated Information Services Traffic directed to an information services platform connected to BA’s network. At such time as Level 3 connects Information Services platforms to its network, the Parties shall agree upon a comparable arrangement for BA-originated Information Services Traffic.
Vendors Any vendors engaged by Tenant to perform services in or to the Premises including, without limitation, janitorial contractors and moving contractors shall be coordinated with any work being performed by or for Landlord and in such manner as to maintain harmonious labor relations and not to damage the Building or the Property or interfere with Building construction or operation and shall be performed by vendors first approved by Landlord.
Safeguarding Customer Information The Servicer has implemented and will maintain security measures designed to meet the objectives of the Interagency Guidelines Establishing Standards for Safeguarding Customer Information published in final form on February 1, 2001, 66 Fed. Reg. 8616 and the rules promulgated thereunder, as amended from time to time (the “Guidelines”). The Servicer shall promptly provide the Master Servicer, the Trustee and the NIMS Insurer information reasonably available to it regarding such security measures upon the reasonable request of the Master Servicer, the Trustee and the NIMS Insurer which information shall include, but not be limited to, any Statement on Auditing Standards (SAS) No. 70 report covering the Servicer’s operations, and any other audit reports, summaries of test results or equivalent measures taken by the Servicer with respect to its security measures to the extent reasonably necessary in order for the Seller to satisfy its obligations under the Guidelines.
Customer The agency or eligible user that purchases commodities or contractual services pursuant to the Contract.
Information Technology Enterprise Architecture Requirements If the Contractor provides any information technology related products or services to the State, the Contractor shall comply with all IOT standards, policies and guidelines, which are online at http://iot.in.gov/architecture/. The Contractor specifically agrees that all hardware, software and services provided to or purchased by the State shall be compatible with the principles and goals contained in the electronic and information technology accessibility standards adopted under Section 508 of the Federal Rehabilitation Act of 1973 (29 U.S.C. 794d) and IC §4-13.1-3. Any deviation from these architecture requirements must be approved in writing by IOT in advance. The State may terminate this Contract for default if the Contractor fails to cure a breach of this provision within a reasonable time.
Escorting Visitors Visitors to areas where PHI COUNTY discloses to 4 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY is 5 contained shall be escorted and such PHI shall be kept out of sight while visitors are in the area.
HMG Baseline Personnel Security Standards 8.1 The authority will review the Contractor’s HMG Baseline Personnel Security Standards Declaration in accordance with HMG Baseline Personnel Security Standard – A Guide For DWP Contractors.
Billing Information 7.9 Your invoice will be calculated with reference to data recorded by us and our Suppliers. Our records are sufficient evidence of amounts payable by you unless shown to be incorrect.