Information Security Schedule definition
Examples of Information Security Schedule in a sentence
All capitalized terms not defined in this Information Security Schedule (this “Security Schedule”) shall have the meanings ascribed to them in the Transfer Agency and Service Agreement by and between DST and each of the funds listed on Exhibit A thereto (each such fund, or series thereof, severally, and not jointly, the “Fund”) dated March 1, 2022 (the “Agreement”).
All capitalized terms not defined in this Information Security Schedule (this “Security Schedule”) shall have the meanings ascribed to them in the Transfer Agency and Service Agreement by and between Transfer Agent and each of the funds listed on Exhibit A thereto (each such fund, or series thereof, severally, and not jointly, the “Fund”) dated January 31, 2017 (the “Agreement”).
In addition to requirements set forth in the Agreement, Supplier shall handle, treat, store, access (or limit access), and otherwise protect Company Confidential Information in accordance with the terms of this Information Security Schedule.
We may amend the Jamf Information Security Schedule with written notice to you, provided that we will not modify it in a way that materially degrades or lessens the security measures we take.
Attachment No 1 to the Amendment attached hereto shall be added to the Agreement as Schedule C (Accounting Agent Information Security Schedule).
Without limiting the foregoing, DST agrees to comply with the Client Information Security Schedule attached hereto, and implement and maintain a written information security program (which may be modified by DST from time to time, provided that at all times it contains measures that will be no less rigorous than those described in the Client Information Security Schedule attached hereto).
DST agrees that such information security program will, at a minimum, comply with Exhibit C (Information Protection Program) and Exhibit E (Client Information Security Schedule) (collectively, the “Standards”) each of which is made a part of this Agreement and applies to the Services.
If Accenture reasonably determines, or in good faith believes, that Provider’s security practices and procedures do not meet Provider’s obligations pursuant to the Agreement or this Information Security Schedule, then Accenture may notify Provider of the deficiencies.
We will protect Employee Information using security measures that are appropriate having regard to the sensitivity of the information and that are in compliance with requirements of privacy laws or as otherwise agreed to by the parties in an Information Security Schedule agreed to by the Parties.
This Information Security Requirements Schedule ("Information Security Schedule") supplements (and is not intended, and shall not be interpreted, to limit the terms of the Agreement) and is governed by the terms and conditions of the Agreement to which it is attached.