The Integrated Third Party Security Policy; and Sample Clauses

The Integrated Third Party Security Policy; and. 9.1.2 any other policy documents referred to in this agreement or notified to you.
AutoNDA by SimpleDocs

Related to The Integrated Third Party Security Policy; and

  • Risk Warning 7.1. The Client unreservedly accepts, acknowledges and understands that CFDs trading: • is highly speculative; • carry a high level of financial risk, as they are subject to excessive price fluctuations which may cause substantial losses; • in the case of CFDs with underlying asset a virtual currency, there might be sudden changes in prices of certain instruments. This can happen during economic events or market announcements or geopolitical events, news, or even due to adverse media or fake news. Gaps can occur when markets open or close or even during normal trading hours. If the market is closed when these factors occur, the opening price of the underlying asset can be substantially different from the closing price, giving you no opportunity to close your trade in-between. Pricing gaps can result in losses. Therefore, CFDs on virtual currencies may be subject to large price fluctuations and in some instances, due to the early stages of their lifecycle, they may lose entire value. • the losses may include all of the Client’s investment and also any additional commissions and other expenses; • is only suitable for persons who are able to cope with the associated risks by bearing the financial losses; • the Company does not guarantee the capital of the Client’s Account or its value at any time or any money invested in any Financial Instrument;

  • Safety Policy Each employer is required by law to have a safety policy and program. TIR will ask for and may require a copy of that policy and program.

  • Security Policy As part of PCI DSS, the Card Organizations require that you have a security policy that covers the security of credit card information.

  • Contractor and Employee Security Precautions A. The security aspects of working at the Correctional Facility are critical. The following security precautions are part of the site conditions and are a part of this Contract. All persons coming on the site in any way connected with this Work shall be made aware of them, and it is the (General) Contractor’s responsibility to check and enforce them.

  • Security Policies IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure.

  • Summary of Policy and Prohibitions on Procurement Lobbying Pursuant to State Finance Law §139-j and §139-k, this Contract includes and imposes certain restrictions on communications between OGS and a Vendor during the procurement process. A Vendor is restricted from making contacts from the earliest notice of intent to solicit offers/bids through final award and approval of the Procurement Contract by OGS and, if applicable, the Office of the State Comptroller (“restricted period”) to other than designated staff unless it is a contact that is included among certain statutory exceptions set forth in State Finance Law §139-j(3)(a). Designated staff, as of the date hereof, is identified in Appendix G, Contractor and OGS Information, or as otherwise indicated by OGS. OGS employees are also required to obtain certain information when contacted during the restricted period and make a determination of the responsibility of the Vendor pursuant to these two statutes. Certain findings of non-responsibility can result in rejection for contract award and in the event of two findings within a four-year period; the Vendor is debarred from obtaining governmental Procurement Contracts. Further information about these requirements can be found on the OGS website: xxxx://xxx.xxx.xx.xxx/aboutOgs/regulations/defaultSFL_139j-k.asp.

  • SPAM POLICY You are strictly prohibited from using the Website or any of the Company's Services for illegal spam activities, including gathering email addresses and personal information from others or sending any mass commercial emails.

  • Continuity and Further Assurance 5.1 The provisions of the Finance Documents shall, save as amended in this deed, continue in full force and effect.

  • Human and Financial Resources to Implement Safeguards Requirements 10. The Borrower shall make available or cause the State and the DISCOMs to make available necessary budgetary and human resources to fully implement the EMP, the RP and any IPP.

  • Technical Safeguards 1. USAC and the Department will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data, so unauthorized persons cannot retrieve any data by computer, remote terminal, or other means.

Time is Money Join Law Insider Premium to draft better contracts faster.