Physical and Data Security Policies Sample Clauses

Physical and Data Security Policies. (a) When AmTrust is performing Services on GMACI’s premises, AmTrust will comply and will cause each of its Subcontractors to comply with GMACI’s security, safety, and fire protection procedures.
AutoNDA by SimpleDocs

Related to Physical and Data Security Policies

  • Privacy and Data Security (a) The parties will keep confidential any information regarding the Trust, Jefferson National, the Variable Accounts and Contract Owners received in connection with providing services and meeting their respective obligations hereunder, except: (a) as necessary to provide the services or otherwise meet their respective obligations under this Agreement; (b) as necessary to comply with applicable law; and (c) information regarding the Trust or Variable Accounts which is otherwise publicly available. The parties will maintain internal safekeeping procedures to safeguard and protect the confidentiality of the data transmitted to another party or its designees or agents in accordance with Section 248.11 of Regulation S-P (17 CFR 248.1—248.30) (“Reg S-P”), and any other applicable federal or state privacy laws and regulations, including without limitation 201 CFR 17.00 et seq. and applicable security breach notification regulations (collectively “Privacy Laws”). Each party shall use such data solely to effect the services contemplated herein, and none of the parties will directly, or indirectly through an affiliate, disclose any non-public personal information protected under Privacy Laws (“Non-public Personal Information”) received from another party to any person that is not an affiliate, designee, service provider, or agent of the receiving party and provided that any such information disclosed to an affiliate, designee, service provider, or agent will be under the same or substantially similar contractual limitations on use and non-disclosure and will comply with all legal requirements. NFD and the Trust will not use information, including Non-public Personal Information, directly or indirectly provided to it by Jefferson National or its designees or agents pursuant to this Agreement for the purpose of marketing to Contract Owners or any other similar purpose, except as may be agreed by the parties hereto. Except for confidential information consisting of Non-public Personal Information, which will be governed in all respects in accordance with the immediately preceding sentence, confidential information does not include information which (i) was publicly known and/or was in the possession of the party receiving confidential information (the “Receiving Party”) from other sources prior to the Receiving Party’s receipt of confidential information from the party disclosing confidential information (the “Disclosing Party”), or (ii) is or becomes publicly available other than as a result of a disclosure by the Receiving Party or its representatives, or (iii) is or becomes available to the Receiving Party on a non-confidential basis from a source (other than the Disclosing Party) which, to the best of the Receiving Party’s knowledge is not prohibited from disclosing such information to the Receiving Party by a legal, contractual or fiduciary obligation to the Disclosing Party, or (iv) describes the annual fees payable to JNSC under this Agreement.

  • Cybersecurity and Data Protection The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate in all material respects for, and operate and perform as required in connection with, the operation of the business of the Company and its Subsidiaries as currently conducted and, to the Company’s knowledge, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with the business of the Company and its Subsidiaries as currently conducted, and, to the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Data Security A. Identity Access Management. BNY Mellon will implement reasonable and industry recognized user access rules for users accessing Customer Data based on the need to know and the principle of least privilege, and including user ID and password requirements, session timeout and re-authentication requirements, unsuccessful login attempt limits, privileged access limits and multifactor authentication or equivalent safeguard where risk factors indicate that single factor authentication is inadequate.

  • Security and Safeguarding Information (a) Confidential Information that contains Non-Public Personal Information about customers is subject to the protections created by the Xxxxx-Xxxxx-Xxxxxx Act of 1999 (the “Act”) and under the standards for safeguarding Confidential Information, 16 CFR Part 314 (2002) adopted by Federal Trade Commission (“FTC”) (the “Safeguards Rule”). Additionally, state specific laws may regulate how certain confidential or personal information is safeguarded. The parties agree with respect to the Non-Public Personal Information to take all appropriate measures in accordance with the Act, and any state specific laws, as are necessary to protect the security of the Non-Public Personal Information and to specifically assure there is no disclosure of the Non-Public Personal Information other than as authorized under the Act, and any state specific laws, and this Agreement. With respect to Confidential Information, including Non-Public Personal Information and Personally Identifiable Financial Information as applicable, each of the parties agrees that:

  • Privacy and Data Protection The Company and its subsidiaries have operated their business in a manner compliant in all material respects with all United States federal, state, local and non-United States privacy, data security and data protection laws and regulations applicable to the Company’s collection, use, transfer, protection, disposal, disclosure, handling, storage and analysis of personal data. The Company and its subsidiaries have been and are in compliance in all material respects with internal policies and procedures designed to ensure the integrity and security of the data collected, handled or stored in connection with its business; the Company and its subsidiaries have been and are in compliance in all material respects with internal policies and procedures designed to ensure compliance with the Health Care Laws that govern privacy and data security and take, and have taken reasonably appropriate steps designed to assure compliance in all material respects with such policies and procedures. The Company and its subsidiaries have taken reasonable steps to maintain the confidentiality of its personally identifiable information, protected health information, consumer information and other confidential information of the Company, its subsidiaries and any third parties in its possession (“Sensitive Company Data”). The tangible or digital information technology systems (including computers, screens, servers, workstations, routers, hubs, switches, networks, data communications lines, technical data and hardware), software and telecommunications systems used or held for use by the Company and its subsidiaries (the “Company IT Assets”) are adequate and operational for, in accordance with their documentation and functional specifications, the business of the Company and its subsidiaries as now operated and as currently proposed to be conducted as described in the Registration Statement, the General Disclosure Package and the Prospectus. The Company and its subsidiaries have used reasonable efforts to establish, and have established, commercially reasonable disaster recovery and security plans, procedures and facilities for the business consistent with industry standards and practices in all material respects, including, without limitation, for the Company IT Assets and data held or used by or for the Company and its subsidiaries. The Company and its subsidiaries have not suffered or incurred any security breaches, compromises or incidents with respect to any Company IT Asset or Sensitive Company Data, except where such breaches, compromises or incidents would not, individually or in the aggregate, be material to the Company or any of its subsidiaries; and there has been no unauthorized or illegal use of or access to any Company IT Asset or Sensitive Company Data by any unauthorized third party. The Company and its subsidiaries have not been required to notify any individual of any information security breach, compromise or incident involving Sensitive Company Data.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • PORTAL and DTC The Securities shall have been approved by the NASD for trading in the PORTAL Market and shall be eligible for clearance and settlement through DTC.

  • Information and Documents (a) From and after the date of this Agreement and to the earlier of the Closing Date and the date on which this Agreement is terminated pursuant to Section 9.1, to the extent permitted by applicable Law and upon reasonable advance notice, and solely for purposes of integration planning or in furtherance of the transactions contemplated by this Agreement and the Ancillary Agreements, (1) Seller Parent shall, and shall cause its Subsidiaries to, permit Purchaser Parent and its Representatives to have reasonable access, during normal business hours, to the books and records that constitute Purchased Assets, and to such personnel, offices and other facilities and properties that constitute Purchased Assets, and to provide such other information in respect of the Business as may be reasonably requested by Purchaser Parent for such purposes and (2) Purchaser Parent shall, and shall cause its Subsidiaries to, permit Seller Parent and its Representatives to have reasonable access, during normal business hours, to the books and records of Purchaser and its Subsidiaries or that are related to the Purchaser Business (provided that Purchaser Parent may redact any information in any such record not related to the Purchaser Business), and to such personnel, offices and other facilities and properties of Purchaser and its Subsidiaries or that are related to the Purchaser Business, and to provide such other information in respect of the Purchaser Business as may be reasonably requested by Seller Parent for such purposes; provided that all requests for access pursuant to this Section 6.1 shall be directed to and coordinated with a person or persons designated by Seller Parent or Purchaser Parent, as applicable, in writing; provided, further, that each Parent and its Subsidiaries may restrict the foregoing access or the provision of such information to the extent that, in the reasonable judgment of such Parent, (i) applicable Law requires such Parent or any of its Subsidiaries to restrict or prohibit such access or the provision of such information, (ii) providing such access would unreasonably interfere with the operation of such Parent’s and its Subsidiaries’ respective businesses, including the Business and the Purchaser Business, as applicable, (iii) providing such access or information would breach a confidentiality obligation to a third party, (iv) providing such access or information would result in disclosure of any information that is competitively or commercially sensitive, (v) in the case of access or information provided by Seller Parent, the information relates to the Strategic Process, or in the case of access or information provided by Purchaser Parent, the information relates to review of strategic alternatives with respect to the Purchaser Business, or (vi) providing such access or disclosure of any such information would reasonably be expected to result in the loss or waiver of the attorney-client or other applicable privilege or protection. In the event that a Parent or its Subsidiaries restricts access or withholds information on the basis of the foregoing clauses (i) through (vi), such Parent shall, if permitted, inform the other Parent as to the general nature of what is being restricted or withheld and the reason therefor, and such Parent shall, and shall cause its Subsidiaries to, use its commercially reasonable efforts to make appropriate substitute arrangements to permit disclosure of the relevant information in a manner that does not suffer from such impediments. Notwithstanding the foregoing, (A) prior to the Closing, neither Parent, nor any of its Affiliates and Representatives, shall conduct any phase II environmental site assessment or conduct any invasive testing or any sampling of soil, sediment, surface water, groundwater or building material at, on, under or within any property of the other Parent or its Subsidiaries and (B) prior to Closing, none of Seller Parent or any of its Affiliates, including the Conveyed Subsidiaries (and their Subsidiaries), shall provide Business Employee personnel files to Purchaser Parent or its Affiliates or Representatives and none of Purchaser Parent or any of its Affiliates, including Purchaser (and its Subsidiaries), shall provide Purchaser Business Employee personnel files to Seller Parent or its Affiliates or Representatives. Notwithstanding the foregoing, following Closing (x) to the extent permitted by Law, Seller Parent shall, and shall cause its Affiliates to, provide Purchaser and its Subsidiaries access to personnel records and other personnel information related to the Business Employees and Former Business Employees reasonably requested by Purchaser and its Subsidiaries and (y) Seller Parent shall, and shall cause its Affiliates to, retain all material records related to the Business Employees and Former Business Employees in accordance with Seller Parent’s records retention policies and, in no event, for less than such period of time required by applicable Law. It is further agreed that, prior to the Closing, each Parent and its Affiliates and Representatives shall not contact any of the directors, officers, employees, agents, customers, suppliers, licensors, licensees, distributors or other business partners of the other Parent or any of its Affiliates (including, with respect to Seller Parent, the Conveyed Subsidiaries (or their Subsidiaries) and, with respect to Purchaser Parent, Purchaser and its Subsidiaries) in connection with the transactions contemplated by this Agreement, whether in person or by telephone, mail or other means of communication, without the specific prior authorization by the other Parent (not to be unreasonably withheld, conditioned or delayed); provided that the foregoing shall not prevent any Parent or its Affiliates from operating in the ordinary course of business and communicating with such parties on matters unrelated to the Business or the Purchaser Business, as applicable, and the transactions contemplated by this Agreement. Notwithstanding anything to the contrary contained herein, in no event shall Seller Parent or any of its Affiliates, including the Conveyed Subsidiaries (and their Subsidiaries), be required to provide any information as and to the extent it relates to any Retained Businesses, any Excluded Assets or any Retained Liabilities, or be required to provide a copy of, or otherwise disclose the contents of, any Seller Combined Tax Return, and in no event shall Purchaser Parent or any of its Affiliates, including Purchaser and its Subsidiaries, be required to provide any information as and to the extent it relates to any Purchaser Parent Retained Businesses or any Purchaser Parent Retained Liabilities. The Parties agree that, with respect to any matters that are the subject of both this Section 6.1(a) and Section 6.5(i), the provisions of Section 6.5(i) (and not this Section 6.1(a)) shall control.

  • Security Against Unauthorized Use of Funds’ Recordkeeping Systems Financial Intermediary agrees to provide such security as is necessary to prevent any unauthorized use of the Funds’ recordkeeping system, accessed via (a) the world wide web or any URL maintained by the Funds or JPMDS, (b) a networking/data access arrangement or (c) computer hardware or software provided to Financial Intermediary by JPMDS.

Time is Money Join Law Insider Premium to draft better contracts faster.