Terrorism and Security Sample Clauses

Terrorism and Security. Suppliers must implement due diligence processes to provide assurance that UK Government funding is not used in any way that contravenes the provisions of applicable terrorism legislation.
AutoNDA by SimpleDocs
Terrorism and Security. Key Performance Indicators KPI 5 a – d DFID Supply Partners must implement due diligence processes to provide assurance that UK Government funding is not used in any way that contravenes the provisions of the Terrorism Xxx 0000, and any subsequent regulations pursuant to this Act. DFID Supply Partners must maintain high levels of data security in accordance with the Data Protection Xxx 0000 and any subsequent regulations pursuant to this Act, or new Act and with the General Data Protection Regulation (Directive 95/46/EC).
Terrorism and Security a) Up to date status declaration regarding the reporting of terrorist offences or offences linked to terrorist activities or financing X X b) No engaged employees or delivery chain partner personnel appears on the Home Office Prescribed Terrorist Organisations List X X c) Data is managed in accordance with DFID security policy and systems are in accordance with the HMG cyber essentials scheme X X d) Adherence to the best practice global principles for digital development X O
Terrorism and Security. Up to date status declaration regarding the reporting of terrorist offences or offences linked to terrorist activities or financing Updated documentation submitted if and when changes identified since tender submittal Standard Selection Questionnaire (SSQ) Annual return Spot checks Compliance checks Annual contract review Certification at or above the level set out in the tender submittal Updated documentation submitted if changes Standard Selection Questionnaire (SSQ) Annual return Compliance checks c) d) identified since tender submittal Data managed in accordance with DFID Security Policy and systems in accordance with the HMG Cyber Essentials Scheme Updated documentation submitted if changes identified since tender submittal Contract T&Cs Clause 32 & 33 Compliance checks Best practice global Principles for Digital Development in place Updated documentation submitted if changes identified since tender submittal Terms of reference (TORs) Annual contract review Compliance checks
Terrorism and Security a) Up to date status declaration regarding the reporting of terrorist offences or offences linked to terrorist activities or financing X X b) No engaged employees or delivery chain partner personnel appears on the Home Office Prescribed Terrorist Organisations List X X

Related to Terrorism and Security

  • Safety and Security Contractor is responsible for maintaining safety in the performance of this Contract. Contractor shall be responsible for complying with the District’s rules and regulations pertaining to safety, security, and driving on school grounds, particularly when children are present.

  • Privacy and Security (a) The Service Provider shall not transmit or store any AHS data outside the borders of Canada, nor transmit any AHS data in Canada to any party not specifically contemplated in this Agreement, without AHS’s prior written consent to each such data transmittal, which consent may be arbitrarily and unreasonably withheld.

  • Data Protection and Security A. In this Agreement the following terms shall have the meanings respectively ascribed to them:

  • Health, Safety and Security 22.2.1 The University and the Association agree to promote safe, secure and healthy working conditions and procedures, and to encourage Members to adopt and follow sound health, safety and security procedures in the performance of their work.

  • Anti-Money Laundering and Red Flag Identity Theft Prevention Programs The Trust acknowledges that it has had an opportunity to review, consider and comment upon the written procedures provided by USBFS describing various tools used by USBFS which are designed to promote the detection and reporting of potential money laundering activity by monitoring certain aspects of shareholder activity as well as written procedures for verifying a customer’s identity (collectively, the “Procedures”). Further, the Trust has determined that the Procedures, as part of the Trust’s overall anti-money laundering program and the Red Flag Identity Theft Prevention program, are reasonably designed to prevent the Fund from being used for money laundering or the financing of terrorist activities and to achieve compliance with the applicable provisions of the Fair and Accurate Credit Transactions Act of 2003 and the USA Patriot Act of 2001 and the implementing regulations thereunder. Based on this determination, the Trust hereby instructs and directs USBFS to implement the Procedures on the Trust’s behalf, as such may be amended or revised from time to time. It is contemplated that these Procedures will be amended from time to time by the parties as additional regulations are adopted and/or regulatory guidance is provided relating to the Trust’s anti-money laundering and identity theft responsibilities. USBFS agrees to provide to the Trust:

  • Data and Security If Contractor is granted access to Court Data, Confidential Information or Court Work Locations in the performance of the Work;

  • Data Privacy and Security Bank will implement and maintain a written information security program, in compliance with all federal, state and local laws and regulations (including any similar international laws) applicable to Bank, that contains reasonable and appropriate security measures designed to safeguard the personal information of the Funds' shareholders, employees, trustees and/or officers that Bank or any Subcustodian receives, stores, maintains, processes, transmits or otherwise accesses in connection with the provision of services hereunder. In this regard, Bank will establish and maintain policies, procedures, and technical, physical, and administrative safeguards, designed to (i) ensure the security and confidentiality of all personal information and any other confidential information that Bank receives, stores, maintains, processes or otherwise accesses in connection with the provision of services hereunder, (ii) protect against any reasonably foreseeable threats or hazards to the security or integrity of personal information or other confidential information, (iii) protect against unauthorized access to or use of personal information or other confidential information, (iv) maintain reasonable procedures to detect and respond to any internal or external security breaches, and (v) ensure appropriate disposal of personal information or other confidential information. Bank will monitor and review its information security program and revise it, as necessary and in its sole discretion, to ensure it appropriately addresses any applicable legal and regulatory requirements. Bank shall periodically test and review its information security program. Bank shall respond to Customer's reasonable requests for information concerning Bank's information security program and, upon request, Bank will provide a copy of its applicable policies and procedures, or in Bank's discretion, summaries thereof, to Customer, to the extent Bank is able to do so without divulging information Bank reasonably believes to be proprietary or Bank confidential information. Upon reasonable request, Bank shall discuss with Customer the information security program of Bank. Bank also agrees, upon reasonable request, to complete any security questionnaire provided by Customer to the extent Bank is able to do so without divulging sensitive, proprietary, or Bank confidential information and return it in a commercially reasonable period of time (or provide an alternative response that reasonably addresses the points included in the questionnaire). Customer acknowledges that certain information provided by Bank, including internal policies and procedures, may be proprietary to Bank, and agrees to protect the confidentiality of all such materials it receives from Bank. Bank agrees to resolve promptly any applicable control deficiencies that come to its attention that do not meet the standards established by federal and state privacy and data security laws, rules, regulations, and/or generally accepted industry standards related to Bank's information security program. Bank shall: (i) promptly notify Customer of any confirmed unauthorized access to personal information or other confidential information of Customer ("Breach of Security"); (ii) promptly furnish to Customer appropriate details of such Breach of Security and assist Customer in assessing the Breach of Security to the extent it is not privileged information or part of an investigation; (iii) reasonably cooperate with Customer in any litigation and investigation of third parties reasonably deemed necessary by Customer to protect its proprietary and other rights; (iv) use reasonable precautions to prevent a recurrence of a Breach of Security; and (v) take all reasonable and appropriate action to mitigate any potential harm related to a Breach of Security, including any reasonable steps requested by Customer that are practicable for Bank to implement. Nothing in the immediately preceding sentence shall obligate Bank to provide Customer with information regarding any of Bank's other customers or clients that are affected by a Breach of Security, nor shall the immediately preceding sentence limit Bank's ability to take any actions that Bank believes are appropriate to remediate any Breach of Security unless such actions would prejudice or otherwise limit Customer's ability to bring its own claims or actions against third parties related to the Breach of Security. If Bank discovers or becomes aware of a suspected data or security breach that may involve an improper access, use, disclosure, or alteration of personal information or other confidential information of Customer, Bank shall, except to the extent prohibited by Applicable Law or directed otherwise by a governmental authority not to do so, promptly notify Customer that it is investigating a potential breach and keep Customer informed as reasonably practicable of material developments relating to the investigation until Bank either confirms that such a breach has occurred (in which case the first sentence of this paragraph will apply) or confirms that no data or security breach involving personal information or other confidential information of Customer has occurred. For these purposes, "personal information" shall mean (i) an individual's name (first initial and last name or first name and last name), address or telephone number plus (a) social security number, (b) driver's license number, (c) state identification card number, (d) debit or credit card number, (e) financial account 22 number, (f) passport number, or (g) personal identification number or password that would permit access to a person's account or (ii) any combination of the foregoing that would allow a person to log onto or access an individual's account. This provision will survive termination or expiration of the Agreement for so long as Bank or any Subcustodian continues to possess or have access to personal information related to Customer. Notwithstanding the foregoing "personal information" shall not include information that is lawfully obtained from publicly available information, or from federal, state or local government records lawfully made available to the general public.

  • Compliance with Applicable Anti-Terrorism and Anti-Money Laundering Regulations In order to comply with laws, rules and regulations applicable to banking institutions, including those relating to the funding of terrorist activities and money laundering, the Indenture Trustee is required to obtain, verify and record certain information relating to individuals and entities which maintain a business relationship with the Indenture Trustee. Accordingly, each of the parties hereto agrees to provide to the Indenture Trustee upon its request from time to time such identifying information and documentation as may be available for such party in order to enable the Indenture Trustee to comply with applicable law.

  • Access and Security Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.

  • Anti-Terrorism The Contractor agrees to undertake all reasonable efforts to ensure that none of the UNDP funds received under the Contract is used to provide support to individuals or entities associated with terrorism and that recipients of any amounts provided by UNDP hereunder do not appear on the list maintained by the Security Council Committee established pursuant to Resolution 1267 (1999). The list can be accessed via xxxxx://xxx.xx.xxx/sc/suborg/en/sanctions/1267/aq_sanctions_list. This provision must be included in all sub-contracts or sub-agreements entered into under the Contract.

Time is Money Join Law Insider Premium to draft better contracts faster.