Security Reports Sample Clauses

Security Reports. Nectar HR agrees to maintain records in accordance with reasonable industry standards and shall provide Client with copies of its relevant systems management and records on Client’s written request.
AutoNDA by SimpleDocs
Security Reports. Customised reports for volatile countries are available upon request which will give security advice tailored to protect the Insured Person during a specific trip. These reports are available within 48 hours of making the request. The Policyholder may receive a maximum of two reports in any given calendar month, thereafter an additional fee will apply.
Security Reports. Upon Customer's written request, (and execution of a mutual non-disclosure agreement if such information is required prior to execution of this MSA), deepwatch will provide Customer with the most recent copy of either the SOC Report, PCI Report, and/or TRUSTe Certification. These reports, and any analyses, reports, summaries, and/or information related to or derived from such reports, are considered deepwatch's Confidential Information (as defined below).
Security Reports. Upon Customer’s request, Retrium shall make available for Customer’s review copies of certifications or reports demonstrating Retrium’s compliance with this Addendum and the prevailing data security standards applicable to the processing of Customer Personal Data.
Security Reports. Customer acknowledges that Provider is regularly audited against the standards defined in the Security Policy by independent third-party auditors. Upon written request, Provider will give Customer, on a confidential basis, a summary copy of its then- current Report so that Customer can verify Provider’s compliance with the standards defined in the Security Policy.
Security Reports. As soon as available and in any event within 45 days after the end of each of the first three fiscal quarters of each fiscal year of Parent, Form 10Qs of Parent shall have been delivered to Trustee (with copies for each Lender) and within 90 days after the end of each fiscal year of Parent, Form 10K of Parent shall have been delivered to Trustee (with copies for each Lender). (i)
Security Reports. 8.1 Upon request, Arista shall provide copies of relevant documentation reasonably required by Arista to verify Arista's compliance with this DPA.
AutoNDA by SimpleDocs
Security Reports. Supplier shall produce monthly reports for PacifiCare that describe various functions that impact on security ("SECURITY REPORTS"). [...***...] [...***...] * CONFIDENTIAL TREATMENT REQUESTED [...***...] * CONFIDENTIAL TREATMENT REQUESTED APPENDIX 1 TO SCHEDULE 3.9(b)
Security Reports. Upon Customer’s request, Retrium shall make available for Customer’s review copies of certifications or reports demonstrating Retrium’s compliance with this Addendum and the prevailing data security standards applicable to the processing of Customer Personal Data. Security Due Diligence. In addition, Retrium shall respond to all reasonable requests for information made by Customer to confirm Retrium's compliance with this Addendum, including responses to information security, due diligence, and audit questionnaires, by making additional information available regarding its information security program upon Customer’s written reasonable request, provided that Customer shall not exercise this right more than once per calendar year Inspections. Where Customer reasonably believes the information provided under Section 5b and 5c above is not sufficient to demonstrate Retrium’s compliance with this Addendum, at Customer’s expense, Retrium shall permit Customer, or its appointed third-party auditors (collectively, “Auditor”), to audit the architecture, systems and procedures relevant to Retrium's compliance with this Addendum and shall make available to the Auditor all information, systems and staff necessary for the Auditor to conduct such audit. To the extent any such audit incurs in excess of 10 hours of Retrium personnel time, Retrium may charge Customer on a time and materials basis for any such excess hours. Before the commencement of an audit described in this Section5d, Retrium and Customer will mutually agree upon the reasonable scope, start date, duration of and security and confidentiality controls applicable to the audit. Customer agrees that: audits will be conducted during Retrium’s normal business hours; it will not exercise its on-site audit rights more than once per calendar year, (unless required more frequently by Data Protection Law, an order of a supervisory authority or court, or in the event of a Personal Data Breach); it will be responsible for any fees charged by any third party auditor appointed by Customer to execute any such audit; Retrium may object to any third-party auditor appointed by Customer to conduct an audit if the auditor is, in Retrium’s opinion, not suitably qualified or independent, a competitor of Retrium or otherwise manifestly unsuitable. Any such objection by Retrium will require Customer to appoint another auditor or conduct the audit itself; nothing in this Section 5 will require Retrium either to disclose to the Aud...
Security Reports. 5. 1 Without prejudice to any audit rights which the Client may have, the Contractor shall, at its own costs, evaluate the Data Processing activities, the Data Processing System and the security measures on a regular basis, being at least once every year, and on that basis provide the Client with a yearly written security report. The Contractor shall provide the written security report to the Client at least within two weeks after finalizing the evaluation. The evaluation will be executed by an independent third party (expert) according to adequate and by the Client accepted audit standards.
Time is Money Join Law Insider Premium to draft better contracts faster.