Third Party Security Sample Clauses

Third Party Security arrange for a third party to provide one or a combination of the following securities, in a form acceptable to the Distributor, for the amount required by the Distributor in accordance with this clause 12, provided the party providing the security maintains an acceptable credit rating in accordance with clause (f);
AutoNDA by SimpleDocs
Third Party Security. Ellucian will maintain a process to identify risks to Client’s Systems that are accessible to third parties. The process will ensure that relevant information security requirements are incorporated into business agreements with third parties and that relevant third party risks are addressed within reasonable timeframes.
Third Party Security. 10.1. You authorize ICICI to provide information to the Connected Device based on the Connected Device’s security settings. By enabling the Actions, you are responsible for how the Actions is used. It is possible that someone other than you could interact with us via the Actions and pass on instructions to the Actions, or that someone could overhear you interacting with us via the Actions and learn information about your Account(s). By enabling the Actions on your Connected Device, you are responsible for how the Actions is used (including any communication to or from us from your personal device). You understand that it is your obligation to utilize the Connected Device safely and correctly.
Third Party Security. Vendors and third parties with access to our systems or data will be required to meet security standards and comply with our security policies.
Third Party Security. Ellucian will maintain a process to identify risks to the Cloud Software that are accessible to third parties. The process will ensure that relevant information security requirements are incorporated into business agreements with third parties and that relevant third party risks are addressed within reasonable timeframes.
Third Party Security. Customer agrees to access the Software and to store and retrieve data using only ABELDent approved third-party software. Should Customer elect to use unapproved third-party products or services, any exchange of data between Customer and such third-party provider is solely between Customer and the applicable third-party vendor or provider. ABELDent does not warrant third- party products or services, whether or not they are designated by ABELDent as “approved” or otherwise, except to the extent directly caused by the willful misconduct or negligence of ABELDent. ABELDent may provide limited support for approved third party software. No purchase of third-party products or services is required to use the Software except as stated in the System Requirements.
Third Party Security a. Screening: IDVerifact shall maintain policies and procedures to ensure that all new suppliers, SaaS applications, IT Software, and IT service solutions are subject to reasonable due diligence to confirm their ability to meet corporate security and compliance requirements as well as business objectives.
AutoNDA by SimpleDocs
Third Party Security. Ellucian will maintain a process to identify risks to Client Data that are accessible to sub processors. The process will ensure that relevant information security requirements are incorporated into business agreements with sub processors and that relevant sub processor risks are addressed within reasonable timeframes.
Third Party Security. 5.1. In cases where the Supplier resorts to Additional Processing Managers for the performance of specific personal data processing activities, the Supplier undertakes to use additional Processing Managers that ensure adequate technical and organizational measures and ensures that access to Personal Data, and the related processing, will be carried out exclusively within the limits of what is necessary for the provision of the subcontracted services;
Third Party Security 
Time is Money Join Law Insider Premium to draft better contracts faster.