Asset Protection Sample Clauses

POPULAR SAMPLE Copied 15 times
Asset Protection. Where we act as your custodian, we have put in place a number of processes and procedures aimed at ensuring that assets held on your behalf will be protected. These processes include but are not limited to: • Maintaining clear and accurate internal records of the assets held on your behalf; • Having security procedures in relation to accepting instructions; • Regularly undertaking internal reconciliation of our records; • Satisfying our auditors that we have maintained systems adequate to protect your assets; • Hiring and training professional and competent staff; and • Using due care and skill in the selection of sub-custodians. Citibank, N.A., London Branch is a member of the Financial Services Compensation Scheme in the United Kingdom. The Financial Services Compensation Scheme is only available to certain types of claimants and claims where such eligible claims are against members of the Financial Services Compensation Scheme. Details of the Financial Services Compensation Scheme and who is eligible to claim are available on request or at the Financial Services Compensation Scheme’s official website at ▇▇▇.▇▇▇▇.▇▇▇.▇▇.
Asset Protection. OCWA will be the ▇▇▇▇▇▇▇ of the Facility on behalf of the Client. OCWA will maintain the Facility based on industry standards for similar facilities, normal wear and tear excluded. OCWA will maintain and utilize the Client’s computerized maintenance management system (CMMS; currently incorporated into the CMMS of the Elgin Area Primary Water Supply System) to control and record all maintenance activities, including but not limited to routine, preventative and breakdown maintenance activities. OCWA will provide the Client with immediate and complete access to all available information relating to the Facility as well as regular reporting.
Asset Protection. Discretionary trusts are often used to protect trust assets from creditors, lawsuits, or other claims against beneficiaries. Since beneficiaries do not have a fixed entitlement to trust assets, those assets are generally shielded from being considered part of the beneficiaries' personal assets.
Asset Protection. The SI shall protect, support and maintain all MTA-Provided Systems and other assets, including all structures (including the Transit System), and any other real property whether owned by the MTA Group or any other person or entity, with their appurtenances and connections as the same may be affected by the SI's performance of the Work. The SI shall promptly reconstruct and restore all structures that are damaged thereby to at least as good a condition as existed before the construction was begun. All such work shall be known as "Miscellaneous and Incidental Work."
Asset Protection. 1. Provider shall establish, implement and comply with information security policies, processes and procedures that meet or exceed the standards and controls set forth in ISO/IEC/BS 17799:2005, ISO/IEC 27001:2013 and ISO/IEC 27002:2013. In the absence of such certification, Provider shall provide evidence of policies and protocols similar and deemed reasonably acceptable to Northern. 2. Provider shall encrypt all Northern Confidential Information and Personally Identifiable Information while in transit over non-private networks or when transporting electronic media. 3. Provider shall encrypt the following data while at rest if applicable to the Provider’s Service: (a) Northern Client personal identification numbers (“PINs”); (b) Client PIN block numbers; (c) PIN encryption keys; (d) track data (e.g., primary account numbers, card verification values, and full card track); (e) Northern Confidential Information, Northern Personnel PII and/or Northern Client PII; and (f) and any other data required to be encrypted pursuant to any standard, Law or Regulation. 4. Provider shall implement adequate controls that prevent the transfer (whether intentional or non-intentional) of Malicious Code within or to Northern excluding when the Provider’s services run external to Northern’s network.
Asset Protection. Lessee agrees that it shall not injure, damage and/or destroy any fences, gates, roads, drainage structures, livestock, timber, or other property of Weyerhaeuser and/or of others on the Leased Property and shall be responsible for and shall reimburse Weyerhaeuser and/or others for any damages which may occur as a result of its activities. Lessee agrees to promptly notify Weyerhaeuser of any injury or damage to the Leased Property.
Asset Protection. Your Account is protected by SIPC in accordance with the terms of SIPC. SIPC is a nonprofit membership corporation created by the Securities Investor Protection Act of 1970, funded primarily by its member securities brokerage firms registered with the U.S. Securities and Exchange Commission. SIPC provides clients of securities brokerage firms that are members of SIPC, such as PBSI, with protection against custodial risk in the event such firms become insolvent. Unlike Federal Deposit Insurance Company (“FDIC”) insurance, SIPC does not insure against the loss of your investment. SIPC coverage does not ensure the quality of investments, protect against a decline or fluctuations in the value of your investment, or cover securities not held by PBSI. SIPC protects each client’s securities and cash held in a client’s brokerage account at an insolvent brokerage firm. SIPC coverage protects securities customers of its members up to $500,000 (including $250,000 for claims for cash). If you have questions about SIPC coverage and additional securities coverage, please contact Primerica Advisors. You may also obtain information about SIPC coverage, including a brochure that describes SIPC and SIPC coverage, by accessing the SIPC website at ▇▇▇.▇▇▇▇.▇▇▇ or contacting SIPC at (▇▇▇) ▇▇▇-▇▇▇▇.
Asset Protection. 8.1 The Processor shall acquire, create, provide, manage and maintain mechanisms to prevent or mitigate destruction, loss, alteration, disclosure or misuse of equipment used within the Services Environment, Data and Controller assets, having regard to Good Industry Practice. This includes annual Penetration testing and the satisfactory completion of remedial actions identified following that testing. 8.2 All Data shall be appropriately backed up and stored in a secure facility which in line with industry practice would be off site. 8.3 The Processor will ensure adequate business continuity services and disaster recovery services are in place and regularly tested. Evidence of this testing may be required as part of the Controller's due diligence. 8.4 The Processor shall ensure that no-one, other than properly authorised Processor Personnel, has physical access to any servers in scope under this Contract or used to deliver the Services, including any servers located at the Processor's facilities without formal documented approval from the Controller. 8.5 In relation to Processor 's facilities, the Processor shall, at a minimum, acquire, create, provide, manage and maintain mechanisms to prevent or mitigate destruction, loss, alteration, disclosure or misuse of Controller systems and/or Data, having regard to Good Industry Practice. 8.6 The Processor will fully and regularly assess the physical security risk for all premises and ensure reasonable controls are in place to prevent inappropriate access as would be expected for the National Health Service. 8.7 Implement National Cyber Security Centre (NCSC) guidelines (e.g. cyber essentials) as agreed with the Controller so that assets are protected.
Asset Protection. ▇▇▇▇▇▇ agrees that it shall not injure, damage and/or destroy any fences, gates, roads, drainage structures, livestock, timber, or other property of Weyerhaeuser and/or of others on the Leased Property and shall be responsible for and shall reimburse Weyerhaeuser and/or others for any damages which may occur as a result of its activities. ▇▇▇▇▇▇ agrees to promptly notify Weyerhaeuser of any injury or damage to the Leased Property.
Asset Protection. The Parties agree that the data provided under this Agreement and in the custody and control of the CDC is subject to applicable federal laws. To that end, CDC will protect the privacy and confidentiality of any Individually Identifiable Information that may be contained in the Data Received by the NSSP BioSense Platform and for which access is provided under this Agreement consistent with the Privacy Act of 1974, to the extent applicable, applicable standards promulgated pursuant to HIPAA, and all applicable laws, regulations, and policies. In furtherance of activities set forth in this Agreement and consistent with applicable laws, policies, and procedures to ensure the privacy and confidentiality of such data, CDC may provide data access to appropriate employees, contractors, and other Users. CDC Users of data, including contractors authorized access to the Platform, are expected to comply with applicable federal laws and CDC policies with respect to the use, safeguarding and maintenance of such data and will be made aware of the principles set forth in this Agreement. CDC will not attempt to identify records contained in the data submitted under this Agreement or link these data with data from other Jurisdictions for identification purposes, except as may be provided for in this Agreement. CDC will coordinate with the Jurisdiction and Data Provider to respond to any data requests from individuals who are not authorized users, e.g., FOIA requests. Every effort will be made to protect the privacy and confidentiality of Individually Identifiable Information, but CDC cannot assure that Individually Identifiable Information will not be released in all cases. However, CDC will work collaboratively with the Jurisdiction and Data Provider to ensure that all Parties are aware of and, when possible, a part of deciding what Data Received by the NSSP BioSense Platform, if any, will be released. The Jurisdiction is responsible for limiting the submission of Individually Identifiable Information, encrypting data prior to submission to the NSSP BioSense Platform and for maintaining the security of any encryption techniques used. Creation of the data submitted to the NSSP BioSense Platform and encryptions will be done in compliance with applicable federal and state law and corresponding regulations. The Jurisdiction should work with the Data Provider to ensure that data are submitted in accordance with current data definitions and exchange standards, available at ▇▇▇▇...