Information Security Questionnaire Sample Clauses

POPULAR SAMPLE Copied 2 times
Information Security Questionnaire. The Supplier shall complete the information security questionnaire in the format stipulated by the Buyer (the “Information Security Questionnaire”) at least annually or at the request by the Buyer. The Supplier shall provide the completed Information Security Questionnaire to the Buyer within one calendar month from the date of request.
Information Security Questionnaire. Annually, upon request. Agent will complete and deliver to Clients a Standard Information Gathering (SIG) Questionnaire. If Clients have additional questions that are not covered in the SIG or by the scope of the most recent SSAE 18, ISAE 3402, AT-C Section 205 or equivalent audit report. Clients may contact its relationship or account manager , who will facilitate a conversation with Agent‘s Global Information Security & Risk Group.
Information Security Questionnaire. Upon GCPS’s written request, to confirm compliance with these Terms and applicable Law, Contractor shall promptly complete, and certify the accuracy of its responses to, a written information security questionnaire provided by GCPS, or by a third party on behalf of GCPS, regarding Contractor’s data privacy and security practices and Contractor’s use and handling of Protected Data within thirty (30) days of receipt of the information security questionnaire. GCPS shall treat the information provided in the information security questionnaire as Contractor’s confidential information.

Related to Information Security Questionnaire

  • Investor Questionnaire The undersigned represents and warrants to the Company that all information that the undersigned has provided to the Company, including, without limitation, the information in the Investor Questionnaire attached hereto or previously provided to the Company (the “Investor Questionnaire”), is correct and complete as of the date hereof.

  • INFORMATION SECURITY SCHEDULE All capitalized terms not defined in this Information Security Schedule (this “Security Schedule”) shall have the meanings ascribed to them in the Transfer Agency and Service Agreement by and between DST and each of the funds listed on Exhibit A thereto (each such fund, or series thereof, severally, and not jointly, the “Fund”) dated March 1, 2022 (the “Agreement”). DST and Fund hereby agree that DST shall maintain and comply with an information security policy (“Security Policy”) that satisfies the requirements set forth below; provided, that, because information security is a highly dynamic space (where laws, regulations and threats are constantly changing), DST reserves the right to make changes to its information security controls at any time and at the sole discretion of DST in a manner that it believes does not materially reduce the protection it applies to Fund Data. From time to time, DST may subcontract services performed under the Agreement (to the extent provided for under the Agreement) or provide access to Fund Data or its network to a subcontractor or other third party; provided, that, such subcontractor or third party implements and maintains security measures DST believes are at least as stringent as those described in this Security Schedule. For the purposes of this Schedule “prevailing industry practices and standards” refers to standards among financial institutions, including mutual funds, and third parties providing financial services to financial institutions.