INFORMATION SECURITY SCHEDULE Sample Clauses

INFORMATION SECURITY SCHEDULE. All capitalized terms not defined in this Information Security Schedule (this “Security Schedule”) shall have the meanings ascribed to them in the Transfer Agency and Service Agreement by and between Transfer Agent and each of the funds listed on Exhibit A thereto (each such fund, or series thereof, severally, and not jointly, the “Fund”) dated January 31, 2017 (the “Agreement”). Transfer Agent and Fund hereby agree that Transfer Agent shall maintain and comply with an information security policy (“Security Policy”) that satisfies the requirements set forth below; provided, that, because information security is a highly dynamic space (where laws, regulations and threats are constantly changing), Transfer Agent reserves the right to make changes to its information security controls at any time and at the sole discretion of Transfer Agent in a manner that it believes does not materially reduce the protection it applies to Fund Data. From time to time, Transfer Agent may subcontract services performed under the Agreement (to the extent provided for under the Agreement) or provide access to Fund Data or its network to a subcontractor or other third party; provided, that, such subcontractor or third party implements and maintains security measures Transfer Agent believes are at least as stringent as those described in this Security Schedule. For the purposes of this Schedule “prevailing industry practices and standards” refers to standards among financial institutions, including mutual funds, and third parties providing financial services to financial institutions.
AutoNDA by SimpleDocs
INFORMATION SECURITY SCHEDULE. All capitalized terms not defined in this Information Security Schedule (this “Security Schedule”) shall have the meanings ascribed to them in the Transfer Agency and Service Agreement by and between Transfer Agent and each of the funds listed on Exhibit A thereto (each such fund, or series thereof, severally, and not jointly, the “Fund”) dated January 31, 2017 (the “Agreement”).

Related to INFORMATION SECURITY SCHEDULE

  • Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Information Regarding Collateral All information supplied to Administrative Agent by or on behalf of any Loan Party with respect to any of the Collateral (in each case taken as a whole with respect to any particular Collateral) is accurate and complete in all material respects.

  • Seller Information The Company may require each seller of Registrable Securities as to which any registration is being effected to furnish, and such seller shall furnish, to the Company such information regarding the distribution of such securities as the Company may from time to time reasonably request in writing.

  • Information Regarding the Collateral (a) Furnish to the Administrative Agent at least thirty (30) days prior written notice of any change in: (i) any Loan Party’s name or in any trade name used to identify it in the conduct of its business or in the ownership of its properties; (ii) the location of any Loan Party’s chief executive office, its principal place of business, any office in which it maintains books or records relating to Collateral owned by it or any office or facility at which Collateral owned by it is located (including the establishment of any such new office or facility); (iii) any Loan Party’s organizational structure or jurisdiction of incorporation or formation; or (iv) any Loan Party’s Federal Taxpayer Identification Number or organizational identification number assigned to it by its state of organization. The Loan Parties agree not to effect or permit any change referred to in the preceding sentence unless all filings have been made under the UCC or otherwise that are required in order for the Collateral Agent to continue at all times following such change to have a valid, legal and perfected first priority security interest in all the Collateral for its own benefit and the benefit of the other Credit Parties.

  • Custodian to Deliver Security and Transaction Information On each Business Day that the Federal Reserve Bank is open, the Custodian shall furnish the Trust with a detailed statement of monies held for the Fund under this Agreement and with confirmations and a summary of all transfers to or from the account of the Fund. At least monthly and from time to time, the Custodian shall furnish the Trust with a detailed statement of the Securities held for the Fund under this Agreement. Where Securities are transferred to the account of the Fund without physical delivery, the Custodian shall also identify as belonging to the Fund a quantity of Securities in a fungible bulk of Securities registered in the name of the Custodian (or its nominee) or shown on the Custodian's account on the books of the Book-Entry System or the Depository. With respect to information provided by this section, it shall not be necessary for the Custodian to provide notice as described by Article XI Section F. Notices to Trust; it shall be sufficient to communicate by such means as shall be mutually agreeable to the Trust and the Custodian.

  • Purchaser Information Each Purchaser covenants that it will promptly notify the Company of any changes in the information set forth in the Registration Statement regarding such Purchaser or such Purchaser's "Plan of Distribution."

Time is Money Join Law Insider Premium to draft better contracts faster.