Security for the use of Internet measures Sample Clauses

Security for the use of Internet measures. 6) Antivirus and protection against malicious programs
AutoNDA by SimpleDocs
Security for the use of Internet measures. In the case of Internet to ensure a proper use must be taken into account the following: » All access to Internet from the infrastructure of VIZZAVI occurs through the mechanisms » Low no concept, no user will avoid security regulate controls Internet access from theinfrastructure of VIZZAVI . » Not is allowed to download programs or software from the Internet infrastructure ofVIZZAVI , even in public because it could account contain viruses or any type of malicious code. » Internet access corporate it is monitored and all accesses are registered. Is storeinformation necessary for its analysis and possibility of detection use inappropriate.

Related to Security for the use of Internet measures

  • SERVICES NOT EXCLUSIVE/USE OF NAME Your services to the Fund pursuant to this Agreement are not to be deemed to be exclusive, and it is understood that you may render investment advice, management and other services to others, including other registered investment companies, provided, however, that such other services and activities do not, during the term of this Agreement, interfere in a material manner, with your ability to meet all of your obligations with respect to rendering services to the Fund. The Trust and you acknowledge that all rights to the name “Simplify Asset” or any variation thereof belong to you, and that the Trust is being granted a limited license to use such words in in the names of its series or in any class name. In the event you cease to be the adviser to the Fund, the Trust’s right to the use of the name “Simplify Asset” shall automatically cease on the ninetieth day following the termination of this Agreement. The right to the name may also be withdrawn by you during the term of this Agreement upon ninety (90) days’ written notice by you to the Trust. Nothing contained herein shall impair or diminish in any respect, your right to use the name “Simplify Asset” in the name of, or in connection with, any other business enterprises with which you are or may become associated. There is no charge to the Trust for the right to use this name.

  • Use of Voice, Image and Likeness I give the Company permission to use my voice, image or likeness, with or without using my name, for the purposes of advertising and promoting the Company, or for other purposes deemed appropriate by the Company in its reasonable discretion, except to the extent expressly prohibited by law.

  • Limitation of Users Access by ALPS’ personnel to the web servers is restricted within ALPS to a limited number of users based upon ALPS’ system administration requirements, as determined by appropriate ALPS’ systems managers from time to time.

  • Limitations on Use of Information The Fund agrees not to use the information received for marketing or any other similar purpose without the prior written consent of the Intermediary.

  • Data Privacy and Security Bank will implement and maintain a written information security program, in compliance with all federal, state and local laws and regulations (including any similar international laws) applicable to Bank, that contains reasonable and appropriate security measures designed to safeguard the personal information of the Funds' shareholders, employees, trustees and/or officers that Bank or any Subcustodian receives, stores, maintains, processes, transmits or otherwise accesses in connection with the provision of services hereunder. In this regard, Bank will establish and maintain policies, procedures, and technical, physical, and administrative safeguards, designed to (i) ensure the security and confidentiality of all personal information and any other confidential information that Bank receives, stores, maintains, processes or otherwise accesses in connection with the provision of services hereunder, (ii) protect against any reasonably foreseeable threats or hazards to the security or integrity of personal information or other confidential information, (iii) protect against unauthorized access to or use of personal information or other confidential information, (iv) maintain reasonable procedures to detect and respond to any internal or external security breaches, and (v) ensure appropriate disposal of personal information or other confidential information. Bank will monitor and review its information security program and revise it, as necessary and in its sole discretion, to ensure it appropriately addresses any applicable legal and regulatory requirements. Bank shall periodically test and review its information security program. Bank shall respond to Customer's reasonable requests for information concerning Bank's information security program and, upon request, Bank will provide a copy of its applicable policies and procedures, or in Bank's discretion, summaries thereof, to Customer, to the extent Bank is able to do so without divulging information Bank reasonably believes to be proprietary or Bank confidential information. Upon reasonable request, Bank shall discuss with Customer the information security program of Bank. Bank also agrees, upon reasonable request, to complete any security questionnaire provided by Customer to the extent Bank is able to do so without divulging sensitive, proprietary, or Bank confidential information and return it in a commercially reasonable period of time (or provide an alternative response that reasonably addresses the points included in the questionnaire). Customer acknowledges that certain information provided by Bank, including internal policies and procedures, may be proprietary to Bank, and agrees to protect the confidentiality of all such materials it receives from Bank. Bank agrees to resolve promptly any applicable control deficiencies that come to its attention that do not meet the standards established by federal and state privacy and data security laws, rules, regulations, and/or generally accepted industry standards related to Bank's information security program. Bank shall: (i) promptly notify Customer of any confirmed unauthorized access to personal information or other confidential information of Customer ("Breach of Security"); (ii) promptly furnish to Customer appropriate details of such Breach of Security and assist Customer in assessing the Breach of Security to the extent it is not privileged information or part of an investigation; (iii) reasonably cooperate with Customer in any litigation and investigation of third parties reasonably deemed necessary by Customer to protect its proprietary and other rights; (iv) use reasonable precautions to prevent a recurrence of a Breach of Security; and (v) take all reasonable and appropriate action to mitigate any potential harm related to a Breach of Security, including any reasonable steps requested by Customer that are practicable for Bank to implement. Nothing in the immediately preceding sentence shall obligate Bank to provide Customer with information regarding any of Bank's other customers or clients that are affected by a Breach of Security, nor shall the immediately preceding sentence limit Bank's ability to take any actions that Bank believes are appropriate to remediate any Breach of Security unless such actions would prejudice or otherwise limit Customer's ability to bring its own claims or actions against third parties related to the Breach of Security. If Bank discovers or becomes aware of a suspected data or security breach that may involve an improper access, use, disclosure, or alteration of personal information or other confidential information of Customer, Bank shall, except to the extent prohibited by Applicable Law or directed otherwise by a governmental authority not to do so, promptly notify Customer that it is investigating a potential breach and keep Customer informed as reasonably practicable of material developments relating to the investigation until Bank either confirms that such a breach has occurred (in which case the first sentence of this paragraph will apply) or confirms that no data or security breach involving personal information or other confidential information of Customer has occurred. For these purposes, "personal information" shall mean (i) an individual's name (first initial and last name or first name and last name), address or telephone number plus (a) social security number, (b) driver's license number, (c) state identification card number, (d) debit or credit card number, (e) financial account 22 number, (f) passport number, or (g) personal identification number or password that would permit access to a person's account or (ii) any combination of the foregoing that would allow a person to log onto or access an individual's account. This provision will survive termination or expiration of the Agreement for so long as Bank or any Subcustodian continues to possess or have access to personal information related to Customer. Notwithstanding the foregoing "personal information" shall not include information that is lawfully obtained from publicly available information, or from federal, state or local government records lawfully made available to the general public.

  • Limitation on Use of Information The Fund agrees neither to use the information received from the Intermediary for any purpose other than to comply with SEC Rule 22c-2 and other applicable laws, rules and regulations, nor to share the information with anyone other than its employees who legitimately need access to it. Neither the Fund nor any of its affiliates or subsidiaries may use any information provided pursuant to this Agreement for marketing or solicitation purposes. The Fund will take such steps as are reasonably necessary to ensure compliance with this obligation. The Fund shall indemnify and hold the Intermediaries, individually and collectively, (and any of their respective directors, officers, employees, or agents) harmless from any damages, loss, cost, or liability (including reasonable legal fees and the cost of enforcing this indemnity) arising out of or resulting from any unauthorized use of or disclosure by the Fund of the information received from the Intermediaries pursuant to this Agreement. In addition, because an award of money damages (whether pursuant to the foregoing sentence or otherwise) may be inadequate for any breach of this provision and any such breach may cause the Intermediaries irreparable harm, the Fund also agrees that, in the event of any breach or threatened breach of this provision, the Intermediaries will also be entitled, without the requirement of posting a bond or other security, to seek equitable relief, including injunctive relief and specific performance. Such remedies will not be the exclusive remedies for any breach of this provision but will be in addition to all other remedies available at law or in equity to the Intermediaries. In the event that the Fund is required by legal process, law, or regulation to disclose any information received from the Intermediaries pursuant to this Agreement, the Fund shall provide Intermediaries with prompt written notice of such requirement as far in advance of the proposed disclosure as possible so that the Intermediaries (at their expense) may either seek a protective order or other appropriate remedy which is necessary to protect their interests or waive compliance with this provision to the extent necessary.

  • USE OF THIRD PARTY SYSTEMS-LEVEL SOFTWARE State Street and the Fund acknowledge that in connection with the Data Access Services provided under this Addendum, the Fund will have access, through the Data Access Services, to Fund Data and to functions of State Street’s proprietary systems; provided, however that in no event will the Fund have direct access to any third party systems-level software that retrieves data for, stores data from, or otherwise supports the System.

  • Data Privacy and Security Laws The Company and its subsidiaries are, and at all prior times were, in material compliance with all applicable state and federal data privacy and security laws and regulations, including without limitation the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) as amended by the Health Information Technology for Economic and Clinical Health Act (the “HITECH Act”) (collectively, the “Privacy Laws”). To ensure compliance with the Privacy Laws, the Company and its subsidiaries have in place, comply with, and take appropriate steps reasonably designed to ensure compliance in all material respects with their policies and procedures relating to data privacy and security and the collection, storage, use, disclosure, handling, and analysis of Personal Data (the “Policies”). “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) Protected Health Information as defined by HIPAA; and (iv) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. The Company and its subsidiaries have at all times made all disclosures to users or customers required by applicable laws and regulatory rules or requirements, and no disclosure made pursuant to any Policy has, to the knowledge of the Company, been inaccurate or in violation of any applicable laws and regulatory rules or requirements in any material respect. The Company further certifies that neither it nor any subsidiary: (i) has received notice of any actual or potential material liability under or relating to, or actual or potential material violation of, any of the Privacy Laws, and has no knowledge of any event or condition that would reasonably be expected to result in any such notice; (ii) is currently conducting or paying for, in whole or in part, any investigation, remediation or other corrective action pursuant to any Privacy Law; or (iii) is a party to any order, decree, or agreement that imposes any obligation or liability under any Privacy Law.

  • USE OF ADVISER’S NAME The parties agree that the name of the Adviser, the names of any affiliates of the Adviser and any derivative or logo or trademark or service xxxx or trade name are the valuable property of the Adviser and its affiliates. The Manager and the Trust shall have the right to use such name(s), derivatives, logos, trademarks or service marks or trade names only with the prior written approval of the Adviser, which approval shall not be unreasonably withheld or delayed so long as this Agreement is in effect. Upon termination of this Agreement, the Manager and the Trust shall forthwith cease to use such name(s), derivatives, logos, trademarks or service marks or trade names. The Manager and the Trust agree that they will review with the Adviser any advertisement, sales literature, or notice prior to its use that makes reference to the Adviser or its affiliates or any such name(s), derivatives, logos, trademarks, service marks or trade names so that the Adviser may review the context in which it is referred to, it being agreed that the Adviser shall have no responsibility to ensure the adequacy of the form or content of such materials for purposes of the Investment Company Act or other applicable laws and regulations. If the Manager or the Trust makes any unauthorized use of the Adviser’s names, derivatives, logos, trademarks or service marks or trade names, the parties acknowledge that the Adviser shall suffer irreparable harm for which monetary damages may be inadequate and thus, the Adviser shall be entitled to injunctive relief, as well as any other remedy available under law.

  • Security and Safeguarding Information (a) Confidential Information that contains Non-Public Personal Information about customers is subject to the protections created by the Xxxxx-Xxxxx-Xxxxxx Act of 1999 (the “Act”) and under the standards for safeguarding Confidential Information, 16 CFR Part 314 (2002) adopted by Federal Trade Commission (“FTC”) (the “Safeguards Rule”). Additionally, state specific laws may regulate how certain confidential or personal information is safeguarded. The parties agree with respect to the Non-Public Personal Information to take all appropriate measures in accordance with the Act, and any state specific laws, as are necessary to protect the security of the Non-Public Personal Information and to specifically assure there is no disclosure of the Non-Public Personal Information other than as authorized under the Act, and any state specific laws, and this Agreement. With respect to Confidential Information, including Non-Public Personal Information and Personally Identifiable Financial Information as applicable, each of the parties agrees that:

Time is Money Join Law Insider Premium to draft better contracts faster.