Secure Handling Sample Clauses

The Secure Handling clause establishes requirements for the protection and management of sensitive or confidential information. It typically mandates that parties implement appropriate security measures, such as encryption, restricted access, or secure storage, to prevent unauthorized disclosure or misuse of data. By setting clear standards for information security, this clause helps mitigate the risk of data breaches and ensures compliance with privacy obligations.
Secure Handling. Customer shall require that the Software and the Documentation be kept on Customer Premises and be maintained in a manner so as to reasonably preclude unauthorized persons from having access thereto.
Secure Handling. Licensee shall require that the EDI Software, to the extent not installed on the Licensee Equipment, be kept on the Licensee Premises in separate, secured drawers or cabinets, which shall be maintained in a manner so as to reasonably preclude unauthorized persons from having access thereto. Licensee shall permit such drawers or cabinets to be open to access only as necessary for Licensee's use thereof for the operation or maintenance of the EDI Software. Licensee shall identify each copy of EDI Software with a unique number and shall maintain a written log indicating the exact physical location of each such copy.
Secure Handling. Except for copies of Confidential Materials in use by CBIS from time to time as permitted hereunder, CBIS shall require that the Confidential Materials shall be maintained in a manner so as reasonably to preclude unauthorized persons from having access thereto. CBIS shall permit access to the Confidential Materials only as necessary for CBIS's use thereof in accordance with the terms of this Agreement.

Related to Secure Handling

  • Claims Handling Unless it has been agreed that the Client will deal with claims directly with insurers, WTW will provide claims handling services for the period of its appointment. These services can be continued beyond that point by mutual agreement but will be subject to additional remuneration. WTW’s claims handling service includes, upon receiving the required information from the Client, the notification of the claim or circumstances to insurers. It will also involve the ongoing provision of information and arranging the collection and/or settlement of the claim in accordance with market practice and the terms and conditions of the policy. Unless agreed otherwise, WTW’s claims handling services do not include the services provided by WTW’s insurance claims advocates (see below). Where the complexities of cover or the technical nature of the subject matter cause difficulty in progressing a claim, WTW has a team of insurance claims advocates who are experienced in negotiating complex claims and managing the settlement process. WTW reserves the right to charge additional remuneration if the Client requests the services of these claims advocates. In relation to marine claims, and in line with long-standing practice of the marine insurance market, WTW may earn additional remuneration by way of claims collecting commission of up to 1% on all amounts WTW collects from insurers as consideration for additional support provided in the negotiation and settlement of a loss. WTW will not charge claims collecting commission where the Client agrees to pay for the services of WTW’s insurance claims advocates. Where WTW collects claims payments, these will be remitted to the Client as soon as possible. However, WTW will not remit claims monies to the Client before WTW has received them from insurers. Where WTW has been granted authority by insurers to settle claims on the Client’s insurance, for example under a binding authority, managing general agency or a lineslip agreement, WTW will do so within the terms and conditions of the authority granted and the Client’s contract. When exercising delegated authority, it is WTW’s policy to refer claims to insurers for settlement decision where WTW is not able to settle the claim on a 100% basis.

  • SCOPE OF SERVICES/CASE HANDLING A. Upon execution by GPM, attorneys are retained to provide legal services for the purpose of seeking damages and other relief in the Litigation. Client provides authorization to seek appointment as Lead Plaintiff in the class action, while the Attorneys will seek to be appointed Class Counsel. If this occurs, the Litigation will be prosecuted as a class action. B. If you obtain access to non-public information during the pendency of the Litigation, you must not engage in transactions in securities. C. Attorneys are authorized to prosecute the Litigation. The appointed Lead Plaintiffs will monitor, review and participate with counsel in the prosecution of the Litigation. The Attorneys shall consult with the appointed Lead Plaintiffs concerning all major substantive matters related to the Litigation, including, but not limited to, the complaint, dispositive motions and settlement. Because of potential differences of opinion between Clients concerning, among other things, strategy, goals and objectives of the Litigation, the Attorneys shall consult with the appointed Lead Plaintiffs as to the courses of action to pursue. The Client agrees to abide by the decisions of the appointed Lead Plaintiffs, which shall be final and binding on all Clients. D. GPM is given the authority to opt the Client out of any class action proceeding relating to the claims authorized herein and/or pursue the Client claim individually in a group action, if the Client is not appointed Lead Plaintiff and GPM is not appointed Class Counsel. E. The Attorneys shall provide sufficient resources, including attorney time and capital for payment of costs and expenses, to vigorously prosecute the Litigation. F. Any recovery from defendants that the Attorneys are responsible for will be divided among class members based on the recognized loss by each class member as calculated by a damage allocation plan which will be prepared by a financial expert or consultant, provided to the appointed Lead Plaintiffs, be subject to the Court's approval and will account for such factors as size of securities ownership, date of purchase, date of sale and continued holdings, if any. Under the rules governing class action litigation, while the Lead Plaintiffs recover according to the same formula as other class members, the Court may approve, upon application therefore, reimbursement of the Lead Plaintiffs’ reasonable costs and expenses directly related to the representation of the class. Examples are lost wages and travel expenses associated with testifying in the action.

  • COMPLAINTS HANDLING 44.1 Either Party shall notify the other Party of any Complaints made by Other Contracting Bodies, which are not resolved by operation of the Supplier's usual complaints handling procedure within five (5) Working Days of becoming aware of that Complaint and, if the Supplier is the Party providing the notice, such notice shall contain full details of the Supplier's plans to resolve such Complaint. 44.2 Without prejudice to any rights and remedies that a complainant may have at Law (including under this Framework Agreement and/or a Call Off Agreement), and without prejudice to any obligation of the Supplier to take remedial action under the provisions of this Framework Agreement and/or a Call Off Agreement, the Supplier shall use its all reasonable endeavours to resolve the Complaint within ten (10) Working Days and in so doing, shall deal with the Complaint fully, expeditiously and fairly. 44.3 Within two (2) Working Days of a request by the Authority, the Supplier shall provide full details of a Complaint to the Authority, including details of steps taken to achieve its resolution.

  • NETWORK MAINTENANCE AND MANAGEMENT 38.1 The Parties will work cooperatively to implement this Agreement. The Parties will exchange appropriate information (for example, maintenance contact numbers, network information, information required to comply with law enforcement and other security agencies of the government, escalation processes, etc.) to achieve this desired result. 38.2 Each Party will administer its network to ensure acceptable service levels to all users of its network services. Service levels are generally considered acceptable only when End Users are able to establish connections with little or no delay encountered in the network. Each Party will provide a twenty four (24)-hour contact number for Network Traffic Management issues to the other’s surveillance management center. 38.3 Each Party maintains the right to implement protective network traffic management controls, such as “cancel to”, “call gapping” or seven (7)-digit and ten (10)-digit code gaps, to selectively cancel the completion of traffic over its network, including traffic destined for the other Party’s network, when required to protect the public-switched network from congestion as a result of occurrences such as facility failures, switch congestion or failure or focused overload. Each Party shall immediately notify the other Party of any protective control action planned or executed. 38.4 Where the capability exists, originating or terminating traffic reroutes may be implemented by either Party to temporarily relieve network congestion due to facility failures or abnormal calling patterns. Reroutes shall not be used to circumvent normal trunk servicing. Expansive controls shall be used only when mutually agreed to by the Parties. 38.5 The Parties shall cooperate and share pre-planning information regarding cross-network call-ins expected to generate large or focused temporary increases in call volumes to prevent or mitigate the impact of these events on the public-switched network, including any disruption or loss of service to the other Party’s End Users. Facsimile (FAX) numbers must be exchanged by the Parties to facilitate event notifications for planned mass calling events. 38.6 Neither Party shall use any Interconnection Service provided under this Agreement or any other service related thereto or used in combination therewith in any manner that interferes with or impairs service over any facilities of AT&T-21STATE, its affiliated companies or other connecting telecommunications carriers, prevents any carrier from using its Telecommunications Service, impairs the quality or the privacy of Telecommunications Service to other carriers or to either Party’s End Users, causes hazards to either Party’s personnel or the public, damage to either Party’s or any connecting carrier’s facilities or equipment, including any malfunction of ordering or billing systems or equipment. Upon such occurrence either Party may discontinue or refuse service, but only for so long as the other Party is violating this provision. Upon any such violation, either Party shall provide the other Party notice of the violation at the earliest practicable time. 38.7 AT&T TENNESSEE hereby commits to provide Disaster Recovery to CLEC according to the plan below. 38.7.1 AT&T TENNESSEE Disaster Recovery Plan 38.7.2 In the unlikely event of a disaster occurring that affects AT&T TENNESSEE’s long-term ability to deliver traffic to a CLEC, general procedures have been developed by AT&T TENNESSEE to hasten the recovery process in accordance with the Telecommunications Service Priority (TSP) Program established by the FCC to identify and prioritize telecommunication services that support national security or emergency preparedness (NS/EP) missions. A description of the TSP Program as it may be amended from time to time is available on AT&T TENNESSEE’s Wholesale – Southeast Region Web site. Since each location is different and could be affected by an assortment of potential problems, a detailed recovery plan is impractical. However, in the process of reviewing recovery activities for specific locations, some basic procedures emerge that appear to be common in most cases. 38.7.3 These general procedures should apply to any disaster that affects the delivery of traffic for an extended time period. Each CLEC will be given the same consideration during an outage, and service will be restored as quickly as possible. AT&T TENNESSEE reserves the right to make changes to these procedures as improvements become available or as business conditions dictate. 38.7.4 This plan will cover the basic recovery procedures that would apply to every CLEC.

  • Security Management The Contractor shall comply with the requirements of the DOD 5200.1-M and the DD Form 254. Security of the Contractor’s electronic media shall be in accordance with the above documents. Effective Program Security shall require the Contractor to address Information Security and Operations Security enabled by the Security Classification Guides. The Contractor’s facility must be able to handle and store material up to the Classification Level as referenced in Attachment J-01, DD Form 254.