Security Against Unauthorized Use of Funds’ Recordkeeping Systems Sample Clauses

Security Against Unauthorized Use of Funds’ Recordkeeping Systems. Financial Intermediary agrees to provide such security as is necessary to prevent any unauthorized use of the Fundsrecordkeeping system, accessed via (a) the world wide web or any URL maintained by the Funds or JPMDS, (b) a networking/data access arrangement or (c) computer hardware or software provided to Financial Intermediary by JPMDS.
AutoNDA by SimpleDocs
Security Against Unauthorized Use of Funds’ Recordkeeping Systems. Financial Institution agrees to provide such security as is necessary to prevent any unauthorized use of the Funds' recordkeeping system, accessed via any computer hardware or software provided to Financial Institution by ESI.
Security Against Unauthorized Use of Funds’ Recordkeeping Systems. Recordkeeper agrees to provide such security as is necessary to prevent any unauthorized use of the Fundsrecordkeeping system, accessed via (a) the world wide web or any URL maintained by the Trust or its agent, (b) a networking/data access arrangement or (c) computer hardware or software provided to Recordkeeper by the Trust or its agent.
Security Against Unauthorized Use of Funds’ Recordkeeping Systems. Financial Institution agrees to provide such security as is necessary to prevent any unauthorized use of the Funds' recordkeeping system, accessed via any computer hardware or software provided to Financial Institution by FSC or FSS. 16.
Security Against Unauthorized Use of Funds’ Recordkeeping Systems. Year ---------------------------------------------------------------------------- 2000. Financial Institution agrees to provide such security as is necessary to prevent any unauthorized use of the Funds' recordkeeping system, accessed via any computer hardware or software provided to Financial Institution by Distributor. Financial Institution represents and warrants that it has examined and tested the internal systems that it has developed to support the services outlined herein and, as of the date of this Agreement, has no knowledge of any situation or circumstance that will inhibit the system's ability to perform the expected functions or inhibit Financial Institution's ability to provide the expected services as a result of any business interruptions relating to dates or days before, during and after the year 2000. In connection with the foregoing, Financial Institution has made reasonable inquiry of its business partners and other entities with which it conducts business and has carefully considered the responses of those third-parties.

Related to Security Against Unauthorized Use of Funds’ Recordkeeping Systems

  • Security and Safeguarding Information (a) Confidential Information that contains Non-Public Personal Information about customers is subject to the protections created by the Xxxxx-Xxxxx-Xxxxxx Act of 1999 (the “Act”) and under the standards for safeguarding Confidential Information, 16 CFR Part 314 (2002) adopted by Federal Trade Commission (“FTC”) (the “Safeguards Rule”). Additionally, state specific laws may regulate how certain confidential or personal information is safeguarded. The parties agree with respect to the Non-Public Personal Information to take all appropriate measures in accordance with the Act, and any state specific laws, as are necessary to protect the security of the Non-Public Personal Information and to specifically assure there is no disclosure of the Non-Public Personal Information other than as authorized under the Act, and any state specific laws, and this Agreement. With respect to Confidential Information, including Non-Public Personal Information and Personally Identifiable Financial Information as applicable, each of the parties agrees that:

  • Definition of Customer Information Any Customer Information will remain the sole and exclusive property of the Trust. “Customer Information” shall mean all non-public, personally identifiable information as defined by Xxxxx-Xxxxx-Xxxxxx Act of 1999, as amended, and its implementing regulations (e.g., SEC Regulation S-P and Federal Reserve Board Regulation P) (collectively, the “GLB Act”).

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Confidentiality/Protection of Customer Information The Company shall keep confidential and shall not divulge to any party, without the Purchaser's prior written consent, the price paid by the Purchaser for the Mortgage Loans, except to the extent that it is reasonable and necessary for the Company to do so in working with legal counsel, auditors, taxing authorities or other governmental agencies. Each party agrees that it shall comply with all applicable laws and regulations regarding the privacy or security of Customer Information and shall maintain appropriate administrative, technical and physical safeguards to protect the security, confidentiality and integrity of Customer Information, including maintaining security measures designed to meet the objectives of the Interagency Guidelines Establishing Standards for Safeguarding Customer Information, 66 Fed. Reg. 8616 (the "Interagency Guidelines"). For purposes of this Section, the term "Customer Information" shall have the meaning assigned to it in the Interagency Guidelines.

  • Cybersecurity and Data Protection The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate in all material respects for, and operate and perform as required in connection with, the operation of the business of the Company and its Subsidiaries as currently conducted and, to the Company’s knowledge, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with the business of the Company and its Subsidiaries as currently conducted, and, to the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect.

  • REMOTE ACCESS SERVICES ADDENDUM The Custodian and each Fund agree to be bound by the terms of the Remote Access Services Addendum hereto.

  • No Unauthorized Use of Prospectus The Company has not distributed and, prior to the later to occur of (i) the Closing Time and (ii) completion of the distribution of the Securities, will not distribute any prospectus (as such term is defined in the 1933 Act and the 1933 Act Regulations) in connection with the offering and sale of the Securities other than the Registration Statement, any preliminary prospectus, the Prospectus or other materials, if any, permitted by the 1933 Act or by the 1933 Act Regulations and approved by the Representatives.

  • MANUAL PROCESSING PROCEDURES The purchase, redemption and settlement of Shares of a Fund will normally follow the Fund/SERV-Defined Contribution Clearance and Settlement Service (“DCCS”) Processing Procedures below and the rules and procedures of the SCC Division of the National Securities Clearing Corporation (“NSCC”) shall govern the purchase, redemption and settlement of Shares of the Funds through NSCC by the Dealer. In the event of equipment failure or technical malfunctions or the parties’ inability to otherwise perform transactions pursuant to the FUND/SERV Processing Procedures, or the parties’ mutual consent to use manual processing, the Manual Processing Procedures below will apply. It is understood and agreed that, in the context of Section 22 of the 1940 Act and the rules and public interpretations thereunder by the staff of the Securities and Exchange Commission (SEC Staff), receipt by the Dealer of any Instructions from the Client-shareholder prior to the Close of Trade on any Business Day shall be deemed to be receipt by the Funds of such Instructions solely for pricing purposes and shall cause purchases and sales to be deemed to occur at the Share Price for such Business Day, except as provided in 4(c) of the Manual Processing Procedures. Each Instruction shall be deemed to be accompanied by a representation by the Dealer that it has received proper authorization from each Client-shareholder whose purchase, redemption, account transfer or exchange transaction is effected as a result of such Instruction.

  • Privacy of Customer Information Company Customer Information in the possession of the Agent, other than information independently obtained by the Agent and not derived in any manner from or using information obtained under or in connection with this Agreement, is and shall remain confidential and proprietary information of the Companies. Except in accordance with this Section 10.10, the Agent shall not use any Company Customer Information for any purpose, including the marketing of products or services to, or the solicitation of business from, Customers, or disclose any Company Customer Information to any Person, including any of the Agent’s employees, agents or contractors or any third party not affiliated with the Agent. The Agent may use or disclose Company Customer Information only to the extent necessary (i) for examination and audit of the Agent’s activities, books and records by the Agent’s regulatory authorities, (ii) to protect or exercise the Agent’s, the Custodian’s and the Lenders’ rights and privileges or (iii) to carry out the Agent’s, the Custodian’s and the Lenders’ express obligations under this Agreement and the other Facilities Papers (including providing Company Customer Information to Approved Investors), and for no other purpose; provided that the Agent may also use and disclose the Company Customer Information as expressly permitted by the relevant Company in writing, to the extent that such express permission is in accordance with the Privacy Requirements. The Agent shall take commercially reasonable steps to ensure that each Person to which the Agent intends to disclose Company Customer Information, before any such disclosure of information, agrees to keep confidential any such Company Customer Information and to use or disclose such Company Customer Information only to the extent necessary to protect or exercise the Agent’s, the Custodian’s and the Lenders’ rights and privileges, or to carry out the Agent’s, the Custodian’s and the Lenders’ express obligations, under this Agreement and the other Facilities Papers (including providing Company Customer Information to Approved Investors). The Agent agrees to maintain an Information Security Program and to assess, manage and control risks relating to the security and confidentiality of Company Customer Information pursuant to such program in the same manner as the Agent does so in respect of their own customers’ information, and shall implement the standards relating to such risks in the manner set forth in the Interagency Guidelines Establishing Standards for Safeguarding Company Customer Information set forth in 12 CFR Parts 30, 208, 211, 225, 263, 308, 364, 568 and 570. Without limiting the scope of the foregoing sentence, the Agent shall use at least the same physical and other security measures to protect all Company Customer Information in the Agent’s possession or control as the Agent uses for their own customers’ confidential and proprietary information.

  • Background; Use of Funds; Definitions This Note constitutes the consideration payable to the Lender for the Series Collection Drop 004 Asset (the “Series Asset”) pursuant to the Purchase and Sale Agreement relating to the Series Asset that was entered into between the Company and the Lender on or about the date hereof. As used in this Note, the following terms shall have the following meanings:

Time is Money Join Law Insider Premium to draft better contracts faster.