Security Controls. Annually, upon Fund’s reasonable request, Transfer Agent shall provide Fund’s Chief Information Security Officer or his or her designee with a copy of its corporate information security controls that form the basis for Transfer Agent’s Security Policy and an opportunity to discuss Transfer Agent’s information security measures, and a high level summary of any vulnerability testing conducted by Transfer Agent on its information security controls, with a qualified member of Transfer Agent’s information technology management team. Transfer Agent shall review its Security Policy annually.
Security Controls. Annually, upon Fund’s reasonable request, DST shall provide Fund’s Chief Information Security Officer or his or her designee with a summary of its corporate information security policy and an opportunity to discuss DST’s information security measures, and a high level and non-confidential summary of any penetration testing related to the provision of in-scope services . DST shall review its Security Policy annually.
Security Controls. You must implement and maintain safeguards and security controls that are reasonable for the size, nature and maturity of your business and industry to protect Verification Data and Stripe Data against unauthorised access, use and disclosure. If you fail to do so, in addition to all other remedies available to Stripe, Stripe may suspend or restrict your access to the Stripe Identity Services and Verification Data.
Security Controls. Apple will assist You to ensure Your compliance with Your obligations with regards to the security of Personal Data, including, if applicable, Your Institution’s obligations, under Article 32 of the GDPR, by implementing the Security Procedures set forth in section 3F of this Agreement and by maintaining the ISO 27001 Certification and ISO 27018 Certification. Apple will make available for review by Institution the certificates issued in relation to the ISO 27001 Certification and ISO 27018 Certification following a request by You or Your Institution under this Section 3G.
Security Controls. Prior to State Street having access to Client Data, then annually and upon Client’s reasonable request, State Street shall provide Client’s Chief Information Security Officer or his or her designee with a copy of its corporate information security controls that form the basis for State Street’s Security Policy and an opportunity to discuss State Street’s information security measures with a qualified member of State Street’s information technology management team.
Security Controls. The Contractor shall implement the following security controls on each workstation or portable computing device (e.g., laptop computer) containing confidential, personal, or sensitive data:
Security Controls. In accordance with its information security program, Smartsheet shall implement appropriate physical, organizational, and technical controls designed to: (a) ensure the security, integrity, and confidentiality of Customer Content accessed, collected, used, stored, or transmitted to or by Smartsheet; and (b) protect Customer Content from known or reasonably anticipated threats or hazards to its security, integrity, accidental loss, alteration, disclosure, and other unlawful forms of processing. Without limitation, Smartsheet will, as appropriate, utilize the following controls:
Security Controls. Entrust Datacard shall implement appropriate technical and organizational measures to maintain the security, confidentiality and integrity of Personal Data, including measures designed to protect against unauthorized or unlawful Processing and against accidental or unlawful destruction, loss or alteration or damage, unauthorized disclosure of, or access to, Personal Data.
Security Controls. Media Controls - In the event that data is exchanged via the Internet or File Transfer Protocol (FTP) reasonable encryption and the employment of authentication/identification techniques are required for use in safeguarding data. Furthermore, OHCA reserves the right to audit any organization’s implementation of, and/or adherence to the requirements, as stated in this Contract upon thirty (30) calendar days’ notice during reasonable business hours. This includes the right to require that any organization utilizing the Internet or FTP for transmission of data submit documentation to demonstrate that it meet the requirements contained in this Contract.