Security Documentation Sample Clauses

Security Documentation. BUSINESS ASSOCIATE shall maintain the policies and procedures implemented to comply with section 3.5 in written form (paper or electronic). If an action, activity or assessment is required to be documented, BUSINESS ASSOCIATE shall maintain a written record (paper or electronic) of the action, activity, or assessment, shall retain the documentation for six (6) years from the date of its creation or the date when it last was in effect, whichever is later, make documentation available to those persons responsible for implementing the procedures to which the documentation pertains, and review documentation periodically, and update as needed, in response to environmental or operational changes affecting the security of the PHI.
AutoNDA by SimpleDocs
Security Documentation. The Security Documentation duly executed by Borrower or other applicable party thereto, consisting of the following:
Security Documentation. If the Designated Picture is being produced by a Credit Party, the Administrative Agent shall have received all appropriate security documentation and proof of filings, required by it, in connection with the creation of a first perfected lien in favor of the Administrative Agent for the benefit of the Administrative Agent, the Canadian Agent, the Issuing Bank and the Lenders.
Security Documentation. Subject to the Agreed Security Principles, each security agreement referred to will be substantially the same as that in place immediately prior to the Issue Date (with such modifications as required, but only to the extent necessary, to reflect any change in law since the date of the relevant security agreement). EXHIBIT A-1 [FORM OF FACE OF FIXED RATE DOLLAR NOTE] ARDAGH PACKAGING FINANCE PLC ARDAGH HOLDINGS USA INC. If Regulation S Fixed Rate Dollar Global NoteCUSIP Number [·]/ISIN [·] If Restricted Fixed Rate Dollar Global Note — CUSIP Number [·]/ISIN [·] No. [ ] [Include if Global Note — UNLESS THIS CERTIFICATE IS PRESENTED BY AN AUTHORIZED REPRESENTATIVE OF THE DEPOSITORY TRUST COMPANY, A NEW YORK CORPORATION (“DTC”), TO THE ISSUERS OR THEIR AGENT FOR REGISTRATION OF TRANSFER, EXCHANGE OR PAYMENT, AND ANY CERTIFICATE ISSUED IS REGISTERED IN THE NAME OF CEDE & CO. OR IN SUCH OTHER NAME AS IS REQUESTED BY AN AUTHORIZED REPRESENTATIVE OF DTC (AND ANY PAYMENT IS MADE TO CEDE & CO. OR TO SUCH OTHER ENTITY AS IS REQUESTED BY AN AUTHORIZED REPRESENTATIVE OF DTC), ANY TRANSFER, PLEDGE OR OTHER USE HEREOF FOR VALUE OR OTHERWISE BY OR TO ANY PERSON IS WRONGFUL INASMUCH AS THE REGISTERED OWNER HEREOF, CEDE & CO., HAS AN INTEREST HEREIN. THIS NOTE IS A GLOBAL NOTE WITHIN THE MEANING OF THE INDENTURE AND IS REGISTERED IN THE NAME OF DTC OR A NOMINEE OF DTC OR A SUCCESSOR DEPOSITARY. THIS NOTE IS NOT EXCHANGEABLE FOR SECURITIES REGISTERED IN THE NAME OF A PERSON OTHER THAN DTC OR ITS NOMINEE EXCEPT IN THE LIMITED CIRCUMSTANCES DESCRIBED IN THE INDENTURE, AND NO TRANSFER OF THIS NOTE (OTHER THAN A TRANSFER OF THIS NOTE AS A WHOLE BY DTC TO A NOMINEE OF DTC OR BY A NOMINEE OF DTC TO DTC OR ANOTHER NOMINEE OF DTC OR BY DTC OR ANY SUCH NOMINEE TO A SUCCESSOR DEPOSITARY OR A NOMINEE OF SUCH SUCCESSOR DEPOSITARY) MAY BE REGISTERED EXCEPT IN THE LIMITED CIRCUMSTANCES DESCRIBED IN THE INDENTURE.] THIS NOTE HAS NOT BEEN AND WILL NOT BE REGISTERED UNDER THE U.S. SECURITIES ACT OF 1933, AS AMENDED (THE ‘‘U.S. SECURITIES ACT’’) OR THE SECURITIES LAWS OF ANY STATE OR OTHER JURISDICTION. NEITHER THIS NOTE NOR ANY INTEREST OR PARTICIPATION HEREIN MAY BE OFFERED, SOLD, ASSIGNED, TRANSFERRED, PLEDGED, ENCUMBERED OR OTHERWISE DISPOSED OF IN THE ABSENCE OF SUCH REGISTRATION OR UNLESS SUCH TRANSACTION IS EXEMPT FROM, OR NOT SUBJECT TO, THE REGISTRATION REQUIREMENTS OF THE U.S. SECURITIES ACT. THE HOLDER OF THIS NOTE BY ITS ACCEPTANCE HEREOF (1) REPRESENTS THAT (A) IT IS A ‘‘QUALIF...
Security Documentation. Both parties shall:  Ensure that security is planned for, documented, and integrated into the System Life Cycle from the IT system’s initiation to the system’s disposal. For applicable guidance, please refer to CMS eXpedited Life Cycle12 and the CMS Risk Management Handbook.13 CMS shall:  Review the CMS System Security and Privacy Plan (SSP) for CMS information systems and the CMS network annually and update it when a major modification occurs, as required by the CMS SSP Procedures. The Non-CMS Organization shall:  Maintain an SSP based on the Enhanced Direct Enrollment (EDE) System Security and Privacy Plan (SSP) document14 on the Non-CMS Organization’s network and update annually or whenever there is a significant change;15 and 11 Located at: xxxxx://xxx.xxx.xxx/about/agencies/asa/ocio/cybersecurity/rules-of-behavior-for-use-of-hhs- information-resources/index.html. 12 Located at: xxxx://xxx.xxx.xxx/Research-Statistics-Data-and-Systems/CMS-Information- Technology/XLC/index.html. 13 Located at: xxxx://xxx.xxx.xxx/Research-Statistics-Data-and-Systems/CMS-Information- Technology/InformationSecurity/Information-Security-Library.html.
Security Documentation. To facilitate Client’s risk-based assessment of Xxxxxx’x information security program and administrative, technical, and physical safeguards applicable to Client’s Confidential Information, Smarsh will make its Security Packet available to Client via xxxxx://xxxxxxx.xxxxxx.xxx xxxxx://xxxxxxx.xxxxxx.xxx/s/. The Security Packet includes, among other documentation, Xxxxxx’x completed industry-standard information gathering questionnaire (“SIG”) and Xxxxxx’x annual independent SSAE 16 SOC 2 Type II report. If Client requests that Smarsh complete Client’s security or other questionnaire(s) in lieu of, or in addition to, the Security Packet, Client must execute an order form and pay a professional services fee based on the size and scope of such questionnaire(s).
Security Documentation. IHS systems have been certified and accredited and have appropriate supporting documents, including Risk Assessment Reports and System Security Plans. • Members may purchase commercial off-the-shelf (COTS) software and/or rely on custom software development for programming purposes. In such cases, Members must rely upon security documentation, certification and 20 accreditation, if any, of such commercial vendors, consultants, or internal staff. • Describes IHS’s role as a business associate
AutoNDA by SimpleDocs
Security Documentation. The Purchaser shall deliver at the first Facility/ Design Closing the Security Documentation in customary form acceptable to the Seller and the Purchaser and containing such provisions as are necessary or appropriate to provide the Seller with a first priority (subject to permitted encumbrances) fully perfected security interest in the shares of French Newco, the Equipment and the Inventory (collectively, the "SECURED ASSETS"). If and to the extent the Purchaser causes a Designated Purchaser (other than the Purchaser) to purchase all or a portion of the Secured Assets, then the Purchaser shall cause such Designated Purchaser, on or prior to the Closing in respect of the relevant Secured Assets, to agree to be bound by this Agreement in respect of such Secured Assets as if it were the Purchaser under this Agreement, but without prejudice to the liabilities of the Purchaser hereunder, or enter into with the Seller or applicable Designated Seller of the relevant Secured Assets an asset purchase agreement in substantially the form of this agreement and the Purchaser shall guarantee, and cause such Designated Purchaser to perform, all of the obligations of such Designated Purchaser under this Agreement, any other asset purchase agreement executed and delivered pursuant hereto and any other agreement or instrument delivered pursuant to this Agreement or any such other asset purchase agreement. The Purchaser or applicable Designated Purchaser shall also be permitted after the first Facility/ Design Closing to have an Affiliate of the Purchaser purchase all or a portion of the Secured Assets provided the same procedure in relation to the sale of the Secured Assets from the Purchaser to the Designated Purchaser (other than the Purchaser) is followed, mutatis mutandis.
Security Documentation. 1. If the relevant Additional Obligor is incorporated in England and Wales, Northern Ireland or Scotland a Debenture and, if relevant, Standard Securities and Northern Irish supplemental mortgages, executed by the proposed Additional Obligor.
Security Documentation. After the parties have entered into a Non-Disclosure Agreement (NDA) Siteimprove will enable the Customer to review the following documents and information to demonstrate compliance with Siteimprove’s obligations: • the certificates issued for Siteimprove infrastructure providers in relation to the ISO 27001 Certification, the ISO 22301 Certification • the then-current SOC 2 Report for Siteimprove infrastructure providers • the then-current Penetration testing attestation for the Siteimprove Intelligence Platform • the Siteimprove Business Continuity Plan • the Siteimprove Master Disaster Recovery Plan References • xxxxx://xxxxxxxxxxx.xxx/en/privacy/ • xxxxx://xxxxxxxxxxx.xxx/en/privacy/data-breach-policy/ • xxxxx://xxxxxxxxxxx.xxx/en/privacy/vulnerability/ • xxxxx://xxxxxxxxxxx.xxx/en/privacy/information-security-notice/ • xxxxx://xxxxxxxxxxx.xxx/en/privacy/privacy-policy/ • xxxxx://xxxxxxxxxxx.xxx/en/privacy/website-privacy-policy/ • xxxxx://xxxxxxxxxxx.xxx/en/privacy/gdpr-compliance/ Appendix 2 – Information about locations for processing and sub-suppliers (sub-processors) This Annex constitutes Siteimprove’s disclosure to Customer of subprocessors used to provide the Included Services. It is an integrated part of the Agreement and its inclusion consititutes Customer’s agreement to the use of said subprocessors. – Interxion Interxion is the primary hosting location for the Siteimprove infrastructure, from which 99.9% of Siteimprove customers receive their service. Interxion is located in Xxxxxxxxxxxxxx 00X XX, 0000 Xxxxxxxx, Xxxxxxx - just outside Copenhagen. This location contains the bulk of the Siteimprove application logic and the various database back-ends. Only a limited number of named Siteimprove employees have physical access to the data center. Interxion is a state-of-the-art data center provider with: Power delivery with 99.999% SLA Temperature and humidity is monitored 24x7 and is in line with ASHRAE recommendations Diverse ISP connectivity A very early smoke detection system is installed with direct lines to fire stations Automatic gas-based fire suppression systems Fire-retardant walls Trained security staff on site 24x7 Five layers of physical security Access tokens in combination with biometric data and mantraps are used for data center entry CCTV video surveillance Interxion has access procedures in place for personnel and goods entry and maintains an access log for all entry to the data center. Interxion is a ISO 27001:2013(Information...
Time is Money Join Law Insider Premium to draft better contracts faster.