FMC/FMDS/FMER/FMLOS USER ACCESS SECURITY REQUIREMENTS Sample Clauses

FMC/FMDS/FMER/FMLOS USER ACCESS SECURITY REQUIREMENTS. The Servicer Relations group of Program Administrator will be responsible for notifying the Servicer to add and delete Program Administrator and FMER employees who need, or no longer need, access as appropriate. On a quarterly basis, Servicer will provide Program Administrator with a report of Program Administrator and FMER employees who have system access to Borrower information. Program Administrator shall be responsible for the accuracy of such reports and shall be liable for the inaccuracy thereof in accordance with Section 6 (Liability) of this Agreement. PRIVATE STUDENT LOAN MONOGRAM PROGRAM AGREEMENT BETWEEN PENNSYLVANIA HIGHER EDUCATION ASSISTANCE-AGENCY AND THE FIRST MARBLEHEAD CORPORATION CUSTOMER SERVICE SCHEDULE
AutoNDA by SimpleDocs

Related to FMC/FMDS/FMER/FMLOS USER ACCESS SECURITY REQUIREMENTS

  • Security Requirements Party A and Party B shall both strictly abide by national and regional safety laws, regulations, rules and policy documents. Party B promises to meet national, industrial and regional standards on gas supply, operation, quality, security and service. Party B shall be responsible for pipe gas supply security, public security and safe use publicity in the franchise region based on laws.

  • Changes in Equipment, Systems, Etc USBFS reserves the right to make changes from time to time, as it deems advisable, relating to its systems, programs, rules, operating schedules and equipment, so long as such changes do not adversely affect the services provided to the Trust under this Agreement.

  • Compliance with Safeguarding Customer Information Requirements The Servicer has implemented and will maintain security measures designed to meet the objectives of the Interagency Guidelines Establishing Standards for Safeguarding Customer Information published in final form on February 1, 2001, 66 Fed. Reg. 8616, and the rules promulgated thereunder, as amended from time to time (the “Guidelines”). The Servicer shall promptly provide the Seller information regarding the implementation of such security measures upon the reasonable request of the Seller.

  • Quality Requirements Supplier shall comply with Tesla’s quality requirements set forth in Attachment 6 entitled “Tesla Motors Supplier Handbook”.

  • Maintenance of Securities and Cash at Bank and Subcustodian Locations Unless Instructions specifically require another location acceptable to the Bank:

  • Cyber Security; Data Protection The Company’s and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted and are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with their businesses, and there have been no material breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any material incidents under internal review or investigations relating to the same. The Company and its subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification (“Data Protection Requirements”), in each case, except for such failures as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect. To ensure compliance with the Data Protection Requirements, the Company and its subsidiaries have in place, comply with, and take appropriate steps reasonably designed to ensure compliance in all material respects with their policies and procedures relating to data privacy and security and the collection, storage, use, disclosure, handling, and analysis of Personal Data (the “Policies”). The Company and its subsidiaries have at all times made all disclosures to users or customers required by applicable laws and regulatory rules or requirements, and none of such disclosures made or contained in any Policy have, to the knowledge of the Company, been inaccurate or in violation of any applicable laws and regulatory rules or requirements in any material respect. The Company further certifies that neither it nor any subsidiary: (i) has received notice of any actual or potential liability under or relating to, or actual or potential violation of, any of the Data Protection Requirements, and has no knowledge of any event or condition that would reasonably be expected to result in any such notice; (ii) is currently conducting or paying for, in whole or in part, any investigation, remediation, or other corrective action pursuant to any Data Protection Requirement; or (iii) is a party to any order, decree, or agreement that imposes any obligation or liability by any governmental authority under any Data Protection Requirement, in each case except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Certifications From Banks and Participants; USA PATRIOT Act (a) Each Lender or assignee or participant of a Lender that is not incorporated under the Laws of the United States of America or a state thereof (and is not excepted from the certification requirement contained in Section 313 of the USA PATRIOT Act and the applicable regulations because it is both (i) an affiliate of a depository institution or foreign bank that maintains a physical presence in the United States or foreign country, and (ii) subject to supervision by a banking authority regulating such affiliated depository institution or foreign bank) shall deliver to the Agent the certification, or, if applicable, recertification, certifying that such Lender is not a “shell” and certifying to other matters as required by Section 313 of the USA PATRIOT Act and the applicable regulations: (1) within ten (10) days after the Closing Date, and (2) as such other times as are required under the USA PATRIOT Act.

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • Security Against Unauthorized Use of Funds’ Recordkeeping Systems Financial Intermediary agrees to provide such security as is necessary to prevent any unauthorized use of the Funds’ recordkeeping system, accessed via (a) the world wide web or any URL maintained by the Funds or JPMDS, (b) a networking/data access arrangement or (c) computer hardware or software provided to Financial Intermediary by JPMDS.

Time is Money Join Law Insider Premium to draft better contracts faster.