Security Controls. Annually, upon Fund’s reasonable request, DST shall provide Fund’s Chief Information Security Officer or his or her designee with a summary of its corporate information security policy and an opportunity to discuss DST’s information security measures, and a high level and non-confidential summary of any penetration testing related to the provision of in-scope services . DST shall review its Security Policy annually.
Security Controls. Annually, upon Fund’s reasonable request, Transfer Agent shall provide Fund’s Chief Information Security Officer or his or her designee with a copy of its corporate information security controls that form the basis for Transfer Agent’s Security Policy and an opportunity to discuss Transfer Agent’s information security measures, and a high level summary of any vulnerability testing conducted by Transfer Agent on its information security controls, with a qualified member of Transfer Agent’s information technology management team. Transfer Agent shall review its Security Policy annually.
Security Controls. You must implement and maintain safeguards and security controls that are reasonable for the size, nature and maturity of your business and industry to protect Verification Data and Stripe Data against unauthorised access, use and disclosure. If you fail to do so, in addition to all other remedies available to Stripe, Stripe may suspend or restrict your access to the Stripe Identity Services and Verification Data.
Security Controls. Apple will assist You to ensure Your compliance with Your obligations with regards to the security of Personal Data, including, if applicable, Your Institution’s obligations, under Article 32 of the GDPR, by implementing the Security Procedures set forth in section 3F of this Agreement and by maintaining the ISO 27001 Certification and ISO 27018 Certification. Apple will make available for review by Institution the certificates issued in relation to the ISO 27001 Certification and ISO 27018 Certification following a request by You or Your Institution under this Section 3G.
Security Controls. Prior to State Street having access to Client Data, then annually and upon Client’s reasonable request, State Street shall provide Client’s Chief Information Security Officer or his or her designee with a copy of its corporate information security controls that form the basis for State Street’s Security Policy and an opportunity to discuss State Street’s information security measures with a qualified member of State Street’s information technology management team.
Security Controls. A. Provider shall store and process Data in accordance with industry best practices. This includes appropriate administrative, physical, and technical safeguards to secure Data from unauthorized access, disclosure and use.
Security Controls. The Contractor shall implement the following security controls on each workstation or portable computing device (e.g., laptop computer) containing confidential, personal, or sensitive data:
Security Controls. 2.1 Provider will store and process Data in accordance with commercially reasonable practices. This includes appropriate administrative, physical, and technical safeguards to secure Data from unauthorized access, disclosure, and use.
Security Controls. If the Contract authorizes Provider to access, transmit, use, or store data for the GLO, then in accordance with Section 2054.138 of the Texas Government Code, Provider certifies that it will comply with the security controls required under this Contract and will maintain records and make them available to the GLO as evidence of Provider’s compliance with the required controls.
Security Controls. Contractor shall implement security controls in accordance with the City’s Security Policy and Standards or any other acceptable standard to assess any solution prior to first release or release of any major improvement or enhancement. Contractor’s solution must be audited by a third party at least once a year and results shall be share with City along with regular updates on risk mitigation.