Physical Safety and Security Procedures Sample Clauses

Physical Safety and Security Procedures. (A) Service Provider will maintain and enforce at the Service Locations physical safety and security procedures that are at least equal to industry standards for locations similar to the Service Locations and any higher standard agreed upon by the Parties.
AutoNDA by SimpleDocs
Physical Safety and Security Procedures. (A) Supplier will maintain and enforce at the Supplier Service Locations physical safety and security procedures that are ***.
Physical Safety and Security Procedures. For each Service Location, Provider will maintain and enforce physical safety and security procedures that are at least equal to industry standards for locations similar to the Service Location or are any higher standard agreed on by the Parties, but at a minimum, complies with Customer Policies and Schedule 9 (Information and System Security Requirements). When on Customer premises, Provider Staff will comply with the Customer Policies that are applicable on Customer premises.
Physical Safety and Security Procedures. Vendor shall maintain and enforce at the Vendor Service Locations safety and security procedures that are at least equal to the most stringent of the following: (1) industry standards for locations similar to the Vendor Service Locations; (2) those procedures applicable to the NYPH Service Locations as may be reasonably amended by NYPH from time to time during the Term; and (3) any higher standard otherwise agreed upon by the Parties. Vendor shall comply with the safety and security procedures that are applicable to the NYPH Service Locations, as may be reasonably amended by NYPH from time to time during the Term, including the safety and security procedures set forth in EXHIBIT 17.

Related to Physical Safety and Security Procedures

  • FORM AND SECURITY PROCEDURES Proper Instructions may be in writing signed by the authorized individual or individuals or may be in a tested communication or in a communication utilizing access codes effected between electro-mechanical or electronic devices or may be by such other means and utilizing such intermediary systems and utilities as may be agreed to from time to time by the Custodian and the individual or organization giving the instruction, provided that the Fund has followed any security procedures agreed to from time to time by the applicable Fund and the Custodian. The Custodian may agree to accept oral instructions, and in such case oral instructions will be considered Proper Instructions. The Fund shall cause all oral instructions to be confirmed in writing, but the Fund’s failure to do so shall not affect the Custodian’s authority to rely on the oral instructions.

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Security and Safeguarding Information (a) Confidential Information that contains Non-Public Personal Information about customers is subject to the protections created by the Xxxxx-Xxxxx-Xxxxxx Act of 1999 (the “Act”) and under the standards for safeguarding Confidential Information, 16 CFR Part 314 (2002) adopted by Federal Trade Commission (“FTC”) (the “Safeguards Rule”). Additionally, state specific laws may regulate how certain confidential or personal information is safeguarded. The parties agree with respect to the Non-Public Personal Information to take all appropriate measures in accordance with the Act, and any state specific laws, as are necessary to protect the security of the Non-Public Personal Information and to specifically assure there is no disclosure of the Non-Public Personal Information other than as authorized under the Act, and any state specific laws, and this Agreement. With respect to Confidential Information, including Non-Public Personal Information and Personally Identifiable Financial Information as applicable, each of the parties agrees that:

  • Global Safety Database Licensee shall establish, hold and maintain (at Licensee’s sole cost and expense) the global safety database for Licensed Products.

  • Pending Procedures and Examinations The Registration Statement is not the subject of a pending proceeding or examination under Section 8(d) or 8(e) of the 1933 Act, and the Company is not the subject of a pending proceeding under Section 8A of the 1933 Act in connection with the offering of the Securities.

  • Monitoring and Risk Assessment of Securities Depositories Prior to the placement of any assets of the Fund with a non-U.S. Securities Depository, the Custodian: (a) shall provide to the Fund or its authorized representative an assessment of the custody risks associated with maintaining assets within such Securities Depository; and (b) shall have established a system to monitor the custody risks associated with maintaining assets with such Securities Depository on a continuing basis and to promptly notify the Fund or its Investment Adviser of any material changes in such risk. In performing its duties under this subsection, the Custodian shall use reasonable care and may rely on such reasonable sources of information as may be available including but not limited to: (i) published ratings; (ii) information supplied by a Subcustodian that is a participant in such Securities Depository; (iii) industry surveys or publications; (iv) information supplied by the depository itself, by its auditors (internal or external) or by the relevant Foreign Financial Regulatory Authority. It is acknowledged that information procured through some or all of these sources may not be independently verifiable by the Custodian and that direct access to Securities Depositories is limited under most circumstances. Accordingly, the Custodian shall not be responsible for errors or omissions in its duties hereunder provided that it has performed its monitoring and assessment duties with reasonable care. The risk assessment shall be provided to the Fund or its Investment Advisor by such means as the Custodian shall reasonably establish. Advices of material change in such assessment may be provided by the Custodian in the manner established as customary between the Fund and the Custodian for transmission of material market information.

  • Use of Book-Entry System and Depositories The Company on behalf of each Fund hereby authorizes BTC on a continuous and on-going basis, to deposit in the Book-Entry System and any Depositories all Securities eligible for deposit therein and to utilize the Book-Entry System and Depositories to the extent possible in connection with its receipt and delivery of Securities, Collateral, Approved Investments and monies under this Agreement. Where Securities, Collateral (other than Cash Collateral) and Approved Investments eligible for deposit in the Book-Entry System or a Depository are transferred to the Account, BTC shall identify or cause to be identified as belonging to the Fund a quantity of securities in a fungible bulk of securities shown on BTC’s account on the books of the Book-Entry System or the applicable Depository. Securities, Collateral and Approved Investments deposited in the Book-Entry System or a Depository will be commingled in accounts which include assets held by BTC for customers, including but not limited to accounts in which BTC acts in a fiduciary or agency capacity, as well as assets held by or on behalf of other clients or participants of the Book-Entry System or Depository.

  • Privacy and Security Except as set forth in Schedule 3.26:

  • Cybersecurity and Data Protection The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate in all material respects for, and operate and perform as required in connection with, the operation of the business of the Company and its Subsidiaries as currently conducted and, to the Company’s knowledge, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with the business of the Company and its Subsidiaries as currently conducted, and, to the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect.

  • Reporting Procedures The Executive shall report to the Board of Directors. The Executive shall report fully on the management, operations and business affairs of the Corporation and advise to the best of his ability and in accordance with reasonable business standards on business matters that may arise from time to time during the term of this agreement.

Time is Money Join Law Insider Premium to draft better contracts faster.