Security and Access The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities Information Technology and Access Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Access Resources or other Company property or materials by others.
Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks. (2) The Information Security Program shall require encryption of any Personal Information in electronic format while in transit or in storage, and enhanced controls and standards for transport and disposal of physical media containing Personal Information. DTI shall, and shall require its agents, contractors and subcontractors who access or use Personal Information or Confidential Information to, regularly test key controls, systems and procedures relating to the Information Security Program ("ISP Tests"). DTI shall advise the Funds of any material issues identified in the ISP Tests potentially affecting the Information Security Program. (3) DTI shall comply with its Information Security Program.
Cooperation and Access The Cooperative Member agrees that it will cooperate in compliance with any reasonable requests for information and/or records made by the Cooperative. The Cooperative reserves the right to audit the relevant records of any Cooperative Member. Any breach of this provision shall be considered material and shall make the Agreement subject to termination on ten (10) days written notice to the Cooperative Member.
UNION SECURITY AND CHECKOFF 5:01 It shall be a condition of continued employment for all employees including probationary employees, as defined in Article 2, to become members and maintain membership in good standing in the Union. 5:02 The Corporation agrees to deduct from the earnings of all employees, including probationary employees, covered by this Agreement, an amount each month as dues and upon completion of the probationary period an amount for the initiation fee. The amount of such dues and initiation fees shall be advised in writing by the I.B.E.W., Local 2351 and changes to such amounts shall be advised not less than four (4) weeks prior to the effective date. Dues collected shall be remitted within ten (10) days after each pay period, to the designated official of the Union along with a statement of the names, in alphabetical order, and amounts deducted from each employee. The statement will also include the names of employees whose wages are insufficient to permit such deduction and the Corporation will only be obligated to make such deduction from the immediate subsequent pay period. Employees on recall status must be members in good standing of the Union in order to be recalled. 5:03 The Union agrees that neither it nor any of its officers or members will engage in Union activities on Corporation time, or Corporation work area, except as provided in this Agreement. 5:04 The Union shall indemnify and save the Corporation harmless against any and all claims, demands, suits or other forms of liability that shall arise from or by reason of action taken or not taken by the Corporation for the purpose of complying with this Article. 5:05 The Corporation will submit monthly to the Union a list of the dates of new hires, terminations and transfers to and from the Bargaining Unit for the previous month. 5:06 The Union agrees to furnish the Corporation with the names of all personnel including officers, representatives, stewards and committee people who are authorized to represent the Union in its relations with the Corporation. 5:07 The Corporation agrees to supply all employees with a copy of the Collective Agreement and will endeavour to do so within one (1) month after receipt from the printer. 5:08 The Corporation shall provide bulletin boards in designated areas for the posting of Union notices dealing with meetings, election of officers, appointments and committees, social affairs and other non-controversial matters dealing with the affairs of the Union. No bulletin shall be posted until approved by the Human Resources Division or the designated Corporate representative.
Obligations and Activities of Business Associate Business Associate agrees to: 1. Not use or disclose protected health information other than as permitted or required by the Agreement or as required by law. 2. Use appropriate safeguards, and comply with Subpart C of 45 CFR, Part 164 with respect to protected electronic health information and to prevent use or disclosure of protected health information other than as provided for by this Agreement. 3. Report to Covered Entity any use or disclosure of protected health information not provided for by this Agreement of which it becomes aware, including breaches of unsecured protected health information as required by 45 CFR 164.410, and any security incident of which it becomes aware. Business Associate agrees to promptly notify Covered Entity following the discovery of a Breach of unsecured PHI. A Breach is considered “discovered” as of the first day on which the Breach is known, or reasonably should have been known, to Business Associate or any employee, officer or agent of Business Associate, other than the individual committing the Breach. Any notice of a Security Incident or Breach of Unsecured PHI shall include the identification of each Individual whose PHI has been, or is reasonably believed by Business Associate to have been, accessed, acquired, or disclosed during such Security Incident or Breach as well as any other relevant information regarding the Security Incident or Breach. 4. In accordance with 45 CFR 164.502(e)(1)(ii) and 164.308(b)(2), if applicable, ensure that any subcontractors that create, receive, maintain, or transmit protected health information on behalf of the Business Associate agree to the same restrictions, conditions, and requirements that apply to the Business Associate with respect to such information. 5. Business Associate agrees to mitigate, to the extent possible, any harmful resulting from use or disclosure of PHI by Business Associate or its agents or subcontractors, in violation of the requirements of this Agreement. 6. Maintain and make available protected health information in a designated record set to the Covered Entity as necessary to satisfy Covered Entity’s obligations under 45 CFR 164.524. If an Individual makes a request for access to the protected health information directly to Business Associate, business associate shall notify covered entity within three (3) business days of such request and shall cooperate with the Covered Entity to send the response to the Individual. 7. Make any amendment(s) to protected health information in a designated record set as directed or agreed to by the Covered Entity pursuant to 45 CFR 164.526, or take other measures as necessary to satisfy Covered Entity’s obligations under 45 CFR 164.526. If an Individual makes a request for amendment to the protected health information directly to Business Associate, Business Associate shall notify Covered Entity within three (3) business days of such request and shall cooperate with the Covered Entity to send the response to the Individual. 8. Maintain and make available the information required to provide an accounting of disclosures to the Covered Entity as necessary to satisfy Covered Entity’s obligations under 45 CFR 164.528. If an Individual makes a request for accounting of disclosures directly to Business Associate, Business Associate shall notify Covered Entity within three (3) business days of such request and shall cooperate with the Covered Entity to send the response to the Individual. 9. To the extent the Business Associate is to carry out one or more of Covered Entity’s obligations(s) under Subpart E of 45 CFR Part 164, comply with the requirements of Subpart E that apply to the Covered Entity in the performance of such obligation(s); and 10. Make its internal practices, books, and records available to the Secretary of Health and Human Services for purposes of determining compliance with the HIPAA Rules.