Risk Assessment An assessment of any risks inherent in the work requirements and actions to mitigate these risks.
Periodic Risk Assessment Provider further acknowledges and agrees to conduct periodic risk assessments and remediate any identified security and privacy vulnerabilities in a timely manner.
Risk Assessments a. Risk Assessment - Transfer Agent shall, at least annually, perform risk assessments that are designed to identify material threats (both internal and external) against Fund Data, the likelihood of those threats occurring and the impact of those threats upon the Transfer Agent organization to evaluate and analyze the appropriate level of information security safeguards (“Risk Assessments”).
Study An application for leave of absence for professional study must be supported by a written statement indicating what study or research is to be undertaken, or, if applicable, what subjects are to be studied and at what institutions.
Diagnostic Assessment 6.3.1 Boards shall provide a list of pre-approved assessment tools consistent with their Board improvement plan for student achievement and which is compliant with Ministry of Education PPM (PPM 155: Diagnostic Assessment in Support of Student Learning, date of issue January 7, 2013).
Data Protection Impact Assessment If, pursuant to Data Protection Law, Customer (or its Controllers) are required to perform a data protection impact assessment or prior consultation with a regulator, at Customer’s request, SAP will provide such documents as are generally available for the Cloud Service (for example, this DPA, the Agreement, audit reports or certifications). Any additional assistance shall be mutually agreed between the Parties.
Conformity Assessment Procedures 1. The Parties recognise that a broad range of mechanisms exist to facilitate the acceptance of conformity assessment results, including:
Data Loss Prevention Transfer Agent shall implement a data leakage program that is designed to identify, detect, monitor and document Fund Data leaving Transfer Agent’s control without authorization in place.