Amendment No 3 to Amended And Restated Master Custodian Agreement
Exhibit (g)(i)(c)
Amendment No 3 to
Amended And Restated Master Custodian Agreement
This Amendment No 3 to the Amended and Restated Master Custodian Agreement (the “Amendment”), effective as of December 11, 2024 (“Amendment Effective Date”), is by and among each Fund (as defined below) and State Street Bank and Trust Company, a Massachusetts trust company (the “Custodian”). Capitalized terms used but not defined herein shall have the meaning ascribed to them in the Custodian Agreement (as defined below).
WITNESSETH:
WHEREAS, the investment companies identified on Appendix A hereto (the “Fund”) and the Custodian entered into that certain ▇▇▇▇▇▇▇ and Restated Master Custodian Agreement dated as of October 17, 2005 (as amended, the “Custodian Agreement”), pursuant to which the Custodian provides certain custodial services to the Fund; and
WHEREAS, the Fund and the Custodian desire to amend the Custodian Agreement as more particularly set forth below.
WHEREAS, the Fund and the Custodian acknowledge that the previous Amendment dated April 30, 2021 applies to ▇▇▇▇▇▇ Strategic Trust and its series.
NOW THEREFORE, in consideration of the mutual covenants and agreements hereinafter contained, the parties hereto agree as follows:
1. | Information Security. The following new Section is hereby added to the Custodian Agreement: |
“SECTION 18.18. INFORMATION SECURITY. Custodian shall comply with the provisions described in Schedule D (Custodian Information Security Schedule) attached hereto.”
2. | Schedule D: Attachment No 1 to Amendment No 3 attached hereto shall be added to the Agreement as Schedule D (Custodian Information Security Schedule). |
3. | Except as modified hereby, all other terms and conditions of each Custodian Agreement shall remain in full force and effect. |
4. | This Amendment may be executed in multiple counterparts, which together shall constitute one instrument. |
[SIGNATURE PAGE FOLLOWS]
-1-
Signature Page
IN WITNESS WHEREOF, each of the parties has caused this instrument to be executed in its name and behalf by its duly authorized representative and its seal to be hereunder affixed as of the date first above-written.
EACH OF THE ENTITIES SET FORTH ON APPENDIX A HERETO
By: | /s/ ▇▇▇▇ ▇ ▇▇▇▇▇ | |
Name: ▇▇▇▇ ▇ ▇▇▇▇▇ | ||
Title: CFO ▇▇▇▇▇▇ Funds and ETFs |
STATE STREET BANK AND TRUST COMPANY
By: | /s/ ▇▇▇▇▇ ▇▇▇▇▇▇▇▇▇ | |
Name: ▇▇▇▇▇ ▇▇▇▇▇▇▇▇▇ | ||
Title: Senior Vice President |
-2-
APPENDIX A
TO
MASTER CUSTODIAN AGREEMENT
▇▇▇▇▇▇ FUNDS AND SCHWAB ETFS
Custodian | Fund |
▇▇▇▇▇▇ Investments (a Massachusetts | ▇▇▇▇▇▇ 1000 Index Fund |
business trust) | |
▇▇▇▇▇▇ California Tax-Free Bond Fund | |
▇▇▇▇▇▇ Opportunistic Municipal Bond Fund | |
▇▇▇▇▇▇ Short-Term Bond Index Fund | |
▇▇▇▇▇▇ Tax-Free Bond Fund | |
▇▇▇▇▇▇ Treasury Inflation Protected Securities Index Fund | |
▇▇▇▇▇▇ U.S. Aggregate Bond Index Fund | |
▇▇▇▇▇▇ Capital Trust (a Massachusetts business trust) |
▇▇▇▇▇▇ International Opportunities Fund |
▇▇▇▇▇▇ Balanced Fund | |
▇▇▇▇▇▇ Core Equity Fund | |
▇▇▇▇▇▇ Fundamental U.S. Large Company Index Fund | |
▇▇▇▇▇▇ Fundamental U.S. Small Company Index Fund | |
▇▇▇▇▇▇ International Core Equity Fund | |
▇▇▇▇▇▇ Monthly Income Fund - Flexible Payout | |
▇▇▇▇▇▇ Monthly Income Fund - Income Payout | |
▇▇▇▇▇▇ Monthly Income Fund - Target Payout | |
▇▇▇▇▇▇ U.S. Large-Cap Growth Index Fund | |
▇▇▇▇▇▇ U.S. Large-Cap Value Index Fund | |
▇▇▇▇▇▇ U.S. Mid-Cap Index Fund | |
The ▇▇▇▇▇▇▇ ▇▇▇▇▇▇ Family of Funds (a Massachusetts business trust) |
▇▇▇▇▇▇ AMtT Tax-Free Money Fund |
▇▇▇▇▇▇ California Municipal Money Fund | |
▇▇▇▇▇▇ Government Money Fund | |
▇▇▇▇▇▇ Municipal Money Fund | |
▇▇▇▇▇▇ New York Municipal Money Fund | |
Schwab Retirement Government Money Fund | |
▇▇▇▇▇▇ Treasury Obligations Money Fund | |
▇▇▇▇▇▇ U.S. Treasury Money Fund | |
Schwab Value Advantage Money Fund | |
▇▇▇▇▇▇
Annuity Portfolios (a Massachusetts business trust) |
▇▇▇▇▇▇ Government Money Market Portfolio |
▇▇▇▇▇▇ Strategic Trust | ▇▇▇▇▇▇ U.S. Broad Market ETF |
▇▇▇▇▇▇ U.S. Large-Cap ETF | |
▇▇▇▇▇▇ U.S. Large-Cap Growth ETF | |
▇▇▇▇▇▇ U.S. Large-Cap Value ETF | |
▇▇▇▇▇▇ U.S. Mid-Cap ETF | |
▇▇▇▇▇▇ U.S. Small-Cap ETF |
-3-
▇▇▇▇▇▇ U.S. Dividend Equity ETF | |
▇▇▇▇▇▇ U.S. REIT ETF | |
▇▇▇▇▇▇ International Equity ETF | |
▇▇▇▇▇▇ International Small-Cap Equity ETF | |
▇▇▇▇▇▇ International Dividend Equity ETF | |
▇▇▇▇▇▇ Emerging Markets Equity ETF | |
▇▇▇▇▇▇ U.S. TIPS ETF | |
▇▇▇▇▇▇ Short-Term U.S. Treasury ETF | |
▇▇▇▇▇▇ Intermediate-Term U.S. Treasury ETF | |
▇▇▇▇▇▇ U.S. Aggregate Bond ETF | |
▇▇▇▇▇▇ Fundamental U.S. Broad Market ETF | |
▇▇▇▇▇▇ Fundamental U.S. Large Company ETF | |
▇▇▇▇▇▇ Fundamental U.S. Small Company ETF | |
▇▇▇▇▇▇ Fundamental International Equity ETF | |
▇▇▇▇▇▇ Fundamental International Small Equity ETF | |
▇▇▇▇▇▇ Fundamental Emerging Markets Equity ETF | |
▇▇▇▇▇▇ 1000 Index ETF | |
▇▇▇▇▇▇ 1-5 Year Corporate Bond ETF | |
▇▇▇▇▇▇ 5-10 Year Corporate Bond ETF | |
▇▇▇▇▇▇ Long-Term U.S. Treasury ETF | |
▇▇▇▇▇▇ ▇▇▇▇▇ ESG ETF | |
▇▇▇▇▇▇ Crypto Thematic ETF | |
▇▇▇▇▇▇ Municipal Bond ETF | |
▇▇▇▇▇▇ Ultra-Short Income ETF | |
▇▇▇▇▇▇ Mortgage-Backed Securities ETF |
-4-
ATTACHMENT NO 1 TO AMENDMENT NO 3
SCHEDULE D
Custodian Information Security Schedule
All capitalized terms not defined in this Custodian Information Security Schedule (this “Security Schedule”) will have the meanings given to them in each Agreement, as applicable.
Custodian implements data security measures consistent in all material respects with applicable prevailing industry practices and standards as well as laws, rules and regulations applicable to Custodian. As of the Amendment Effective Date, Custodian aligns with the National Institute for Standards and Technology (NIST) cybersecurity framework. However, as information security is a highly dynamic space where threats are constantly changing, Custodian reserves the right to make changes to its information security controls and/or to align with one or more recognized industry standards, other than NIST, at any time in a manner that does not materially reduce its protection of Fund Confidential Information.
Custodian will use commercially reasonable efforts to cause any delegates and other third parties to whom Custodian provides Fund Confidential Information to implement and maintain security measures that Custodian reasonably believes are at least as protective as those described in this Security Schedule. For delegates or other third parties who collect, transmit, share, store, control, process or manage Fund Confidential Information, Custodian is responsible for assessing their control environments. Notwithstanding the foregoing, Custodian shall be responsible for any such delegate’s or other third party’s protection of Fund Confidential Information, which if done by Custodian, would be a breach of its commitment under this Security Schedule.
1. | Security Objectives. Custodian uses commercially reasonable efforts to: |
a. protect the privacy, confidentiality, integrity, and availability of Fund Confidential Information;
b. protect against accidental, unauthorized, unauthenticated or unlawful access, copying, use, processing, disclosure, alteration, corruption, transfer, loss or destruction of Fund Confidential Information;
c. comply with applicable governmental laws, rules and regulations that are relevant to the handling, processing and use of Fund Confidential Information by Custodian in accordance with each Agreement; and
d. implement customary administrative, physical, technical, procedural and organizational safeguards.
2. | Risk Assessments. The results of Custodian’s risk assessments are internal to Custodian and will not be provided to Fund. |
a. Risk Assessment - Custodian will perform risk assessments annually that are designed to identify material threats (both internal and external), the likelihood of those threats occurring and the impact of those threats upon the Custodian organization to evaluate and analyze the appropriate level of information security safeguards (“Risk Assessments”).
b. Risk Mitigation - Custodian will use commercially reasonable efforts to manage, control and remediate any threats identified in the Risk Assessments that are likely to result in material
- 5 -
unauthorized access, copying, use, processing, disclosure, alteration, transfer, loss or destruction of Fund Confidential Information, consistent with the Objective, and commensurate with the sensitivity of the Fund Confidential Information and the complexity and scope of the activities of Custodian pursuant to the Agreement.
c. Vulnerability Management Program – Custodian maintains a vulnerability management program that includes processes for: being made aware of newly announced vulnerabilities; discovering vulnerabilities within the infrastructure and applications; risk rating vulnerabilities consistent with industry standards; and defining timeframes for remediating vulnerabilities (other than medium or low risk vulnerabilities) consistent with industry standards and taking into account any mitigation efforts taken by Custodian with respect to such vulnerabilities.
3. Patch Management - Custodian will patch all system end points, such as workstations, and servers with all current operating system, database and application patches deployed in Custodian’s computing environment according to a schedule predicated on the criticality of the patch. Custodian must perform appropriate steps so that patches do not compromise the security of the information resources being patched.
4. Security Controls. Upon Fund’s reasonable request, no more frequently than annually, Custodian will provide Fund’s Chief Information Security Officer or his or her designee with a copy of its Corporate Information Security Controls manual, a completed Standardized Information Gathering (SIG) questionnaire, Custodian’s Global Information Security (GIS) SOC 2 (Type II) report, and an opportunity to discuss Custodian’s Information Security measures with a qualified member of Custodian’s Information Technology management team. In no event will any such discussions require Custodian to reveal any details or information that could reasonably be expected to jeopardize the security or integrity of any Custodian system or the confidentiality or security of any other client’s data. Custodian reviews its Information Security Policy approximately annually and reserves the right to change the frequency to meet regulatory requirements (which in no event will be less frequent than every eighteen (18) months).
5. | Organizational Security. |
a. Responsibility - Custodian will assign responsibility for information security management to senior personnel only.
b. Access - Custodian will have controls designed to permit only those personnel performing roles supporting the provision of services under this Agreement to access Fund Confidential Information.
c. Confidentiality - Custodian personnel who have accessed or otherwise been made known of Fund Confidential Information will maintain the confidentiality of such information in accordance with the terms of this Agreement.
d. Training - Custodian will provide information security training to its personnel on approximately an annual basis.
e. Screening –Custodian employees, and personnel of delegates or other third parties who access Custodian’s facilities, networks or systems, are subject to certain credit and criminal checks conducted by Custodian or its agents applicable to banks pursuant to applicable laws, rules and/or regulations. If any person does not meet the requirements of such Custodian checks, such person may not be permitted to be employed by Custodian or, in the event of a delegate or other third party, Custodian requires that such person be removed from any assignment for Custodian. In addition to the foregoing, Custodian requires its delegates and other third parties to conduct, as part of its standard hiring and vendor due
- 6 -
diligence practices, pre-employment background investigations consistent with industry standards with respect to any personnel that are assigned to perform services for Custodian or otherwise have access to confidential information of Custodian or its clients.
6. | Physical Security. |
a. Securing Physical Facilities - Custodian will maintain systems located in Custodian facilities that host Fund Confidential Information or provide services under this Agreement in environments that are designed to be physically secure and to allow access only to authorized individuals. A secure environment includes the availability of onsite security personnel on a 24 x 7 basis or equivalent means of monitoring locations supporting the delivery of services under this Agreement.
b. Physical Security of Media - Custodian will implement controls, consistent with applicable prevailing industry practices and standards, that are designed to deter the unauthorized viewing, copying, alteration or removal of any media containing Fund Confidential Information. Removable media on which Fund Confidential Information is stored (including thumb drives, CDs, and DVDs, and PDAS) by Custodian must be encrypted using at least 256-bit AES (or equivalent).
c. Media Destruction - Custodian will destroy removable media and any mobile device (such as discs, USB drives, DVDs, back-up tapes, laptops and PDAs) containing Fund Confidential Information or use commercially reasonable efforts to render Fund Confidential Information on such physical media unintelligible if such media or mobile device is no longer intended to be used. All backup tapes that are not destroyed must meet the level of protection described in this Security Schedule until destroyed.
d. Paper Destruction - Custodian will cross shred all paper waste containing Fund Confidential Information and dispose in a secure and confidential manner.
e. Risk based approach: A risk-based approach should be used in determining site security levels as well as periodic site security assessments.
f. Access controls: Custodian personnel are required to use their individually assigned corporate ID badges programmed to provide various levels of access control based on their role. Authorized door access lists are reviewed on a quarterly basis by the authorized area owner(s) to ensure access remains appropriate.
g. Video and recordings – Security Video: Video systems monitor and record access to and from our buildings and high-security areas, including critical IT areas. Recordings are maintained for a minimum of 30 days and a maximum of 120 days or as otherwise required or permitted by local law or regulation.
7. | Communications and Operations Management. |
a. Network Penetration Testing - Custodian will, on approximately an annual basis but in no event less frequently than every eighteen (18) months, contract with an independent third party to conduct a network penetration test on its network having access to or holding or containing Fund Confidential Information. If penetration testing reveals material deficiencies or vulnerabilities, the findings will be risk rated consistent with industry standards and timeframes will be defined for remediating vulnerabilities (other than medium or low risk vulnerabilities) consistent with industry standards and taking into account any mitigation efforts taken by Custodian with respect to such vulnerabilities.
- 7 -
b. Data Protection During Transmission - Custodian will encrypt, using an industry recognized encryption algorithm, personally identifiable Fund Confidential Information when in transit across public networks.
c. Data Loss Prevention - Custodian will maintain a data leakage program that is designed to identify, detect, monitor and document data leaving Custodian’s control without authorization in place.
d. Wireless Security - If Custodian deploys a wireless network, Custodian will maintain written policies governing the use, configuration and management of wireless networks. All wireless network devices shall be protected using appropriate physical controls to minimize the risk of theft, unauthorized use, or damage. Network access to wireless networks shall be restricted only to those authorized.
e. Firewalls. Custodian will maintain current industry appropriate firewall technology in the operation of Custodian’s environments.
f. Source Code Review - Custodian must have a documented program for secure code reviews and maintain documentation of secure code reviews performed for all Internet-facing applications that store or process ▇▇▇▇▇▇ Confidential Information.
8. | Access Controls. |
a. Authorized Access - Custodian will have controls that are designed to maintain the logical separation such that access to systems hosting Fund Confidential Information and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Confidential Information. Custodian reviews user access rights to systems and applications storing or allowing access to Fund Confidential Information on a periodic basis.
b. User Access - Custodian will have a process to promptly disable access to Fund Confidential Information by any Custodian personnel who no longer requires such access. Custodian will also promptly remove access of Fund personnel upon receipt of notification from Fund.
c. Authentication Credential Management - Custodian will communicate authentication credentials to users in a secure manner, with a proof of identity check of the intended users. Custodian requires its personnel and any personnel of its delegates or other third parties that have access to Custodian’s networks or systems to maintain the confidentiality of system passwords, keys, and passcodes. Custodian has a secure and documented process to reset passwords that requires verification of user identity prior to password reset.
d. Multi-Factor Authentication for Remote Access - Custodian will use multi factor authentication and a secure tunnel, or another strong authentication mechanism, when remotely accessing Custodian’s internal network.
9. | Use of Laptop and Mobile Devices in connection with this Agreement. |
a. Encryption Requirements - Custodian will encrypt any laptops or mobile devices (e.g., tablets and smartphones) containing Fund Confidential Information used by Custodian’s personnel using an industry recognized encryption algorithm with at least 256 bit encryption AES (or equivalent).
- 8 -
b. Secure Storage - Custodian will require that all laptops and mobile devices be securely stored whenever out of the personnel’s immediate possession.
c. Inactivity Timeout - Custodian will employ access and password controls as well as inactivity timeouts of no longer than thirty (30) minutes on laptops, desktops and mobile devices managed by Custodian and used by Custodian’s personnel.
d. Remote Management – Custodian will maintain the ability to remotely remove Fund Confidential Information promptly from mobile devices managed by Custodian. Custodian has policies requiring personnel to maintain the security of devices managed by Custodian.
10. | Information Systems Acquisition Development and Maintenance. |
a. Fund Data – Fund Confidential Information will only be used by Custodian for the purposes specified in this Agreement.
b. Virus Management - Custodian will maintain a malware protection program designed to identify, detect, protect, respond and recover from malware infections, malicious code and unauthorized execution of code within the Custodian environment.
c. Change Control – Custodian implements and maintains change control procedures to manage changes to information systems, supporting infrastructure, and facilities. Certain Custodian’s system and application changes undergo testing prior to implementation, which may include relevant security controls, as determined by Custodian on a risk basis and taking into account the type and/or impact of the change and the infrastructure and/or network components in place with respect to such change,.
11. | Incident Event and Communications Management. |
a. Incident Management/Notification of Breach - Custodian will maintain an incident response plan that specifies actions to be taken when Custodian or one of its subcontractors suspects or detects that a party has gained unauthorized access to Fund Confidential Information or systems or applications containing any Fund Confidential Information (the “Response Plan”). Such Response Plan will include an escalation procedure that includes notification to senior managers and reporting to regulatory and law enforcement agencies, when and if applicable. Custodian will use commercially reasonable efforts to investigate, remediate and mitigate such unauthorized access.
b. Custodian will notify Fund within forty-eight (48) hours after it has determined that unauthorized access to Fund Confidential Information has occurred, unless otherwise prohibited by applicable law. In such an event, and unless prohibited by applicable law, Custodian will provide information, to the extent available to Custodian, sufficient to provide a reasonable description of the general circumstances and extent of such unauthorized access, and will provide reasonable cooperation to Fund:
i. in the investigation of any such unauthorized access;
ii. in Fund’s efforts to comply with statutory notice or other applicable laws applicable to Fund or its customers; and
iii. in litigation and investigations brought by Fund against third parties, including injunctive or other equitable relief reasonably necessary to protect Fund’s proprietary rights.
- 9 -
For the avoidance of doubt, ▇▇▇▇▇▇▇▇▇ will not be required to disclose information that Custodian reasonably determines would compromise the security of Custodian's technology or premises or that would impact other Custodian clients.
12. Offshore Work - Specific to work performed by Custodian from India, Custodian will only access Fund Confidential Information via a Virtual Desktop Interface (“VDI ”) with controls in place to protect Fund Confidential Information from data loss at a minimum in accordance with the terms of the Security Schedule and protections of Fund Confidential Information set forth herein. The VDI must be configured to disallow the ability to download data to the host machine or external device.
- 10 -