Sentences with phrase «requirements of information security»

Increase awareness and understanding of the requirements of information security, and the responsibility of our colleagues to protect the confidentiality and integrity of the information that they handle; and

Not exact matches

Important factors that could cause actual results to differ materially from those reflected in such forward - looking statements and that should be considered in evaluating our outlook include, but are not limited to, the following: 1) our ability to continue to grow our business and execute our growth strategy, including the timing, execution, and profitability of new and maturing programs; 2) our ability to perform our obligations under our new and maturing commercial, business aircraft, and military development programs, and the related recurring production; 3) our ability to accurately estimate and manage performance, cost, and revenue under our contracts, including our ability to achieve certain cost reductions with respect to the B787 program; 4) margin pressures and the potential for additional forward losses on new and maturing programs; 5) our ability to accommodate, and the cost of accommodating, announced increases in the build rates of certain aircraft; 6) the effect on aircraft demand and build rates of changing customer preferences for business aircraft, including the effect of global economic conditions on the business aircraft market and expanding conflicts or political unrest in the Middle East or Asia; 7) customer cancellations or deferrals as a result of global economic uncertainty or otherwise; 8) the effect of economic conditions in the industries and markets in which we operate in the U.S. and globally and any changes therein, including fluctuations in foreign currency exchange rates; 9) the success and timely execution of key milestones such as the receipt of necessary regulatory approvals, including our ability to obtain in a timely fashion any required regulatory or other third party approvals for the consummation of our announced acquisition of Asco, and customer adherence to their announced schedules; 10) our ability to successfully negotiate, or re-negotiate, future pricing under our supply agreements with Boeing and our other customers; 11) our ability to enter into profitable supply arrangements with additional customers; 12) the ability of all parties to satisfy their performance requirements under existing supply contracts with our two major customers, Boeing and Airbus, and other customers, and the risk of nonpayment by such customers; 13) any adverse impact on Boeing's and Airbus» production of aircraft resulting from cancellations, deferrals, or reduced orders by their customers or from labor disputes, domestic or international hostilities, or acts of terrorism; 14) any adverse impact on the demand for air travel or our operations from the outbreak of diseases or epidemic or pandemic outbreaks; 15) our ability to avoid or recover from cyber-based or other security attacks, information technology failures, or other disruptions; 16) returns on pension plan assets and the impact of future discount rate changes on pension obligations; 17) our ability to borrow additional funds or refinance debt, including our ability to obtain the debt to finance the purchase price for our announced acquisition of Asco on favorable terms or at all; 18) competition from commercial aerospace original equipment manufacturers and other aerostructures suppliers; 19) the effect of governmental laws, such as U.S. export control laws and U.S. and foreign anti-bribery laws such as the Foreign Corrupt Practices Act and the United Kingdom Bribery Act, and environmental laws and agency regulations, both in the U.S. and abroad; 20) the effect of changes in tax law, such as the effect of The Tax Cuts and Jobs Act (the «TCJA») that was enacted on December 22, 2017, and changes to the interpretations of or guidance related thereto, and the Company's ability to accurately calculate and estimate the effect of such changes; 21) any reduction in our credit ratings; 22) our dependence on our suppliers, as well as the cost and availability of raw materials and purchased components; 23) our ability to recruit and retain a critical mass of highly - skilled employees and our relationships with the unions representing many of our employees; 24) spending by the U.S. and other governments on defense; 25) the possibility that our cash flows and our credit facility may not be adequate for our additional capital needs or for payment of interest on, and principal of, our indebtedness; 26) our exposure under our revolving credit facility to higher interest payments should interest rates increase substantially; 27) the effectiveness of any interest rate hedging programs; 28) the effectiveness of our internal control over financial reporting; 29) the outcome or impact of ongoing or future litigation, claims, and regulatory actions; 30) exposure to potential product liability and warranty claims; 31) our ability to effectively assess, manage and integrate acquisitions that we pursue, including our ability to successfully integrate the Asco business and generate synergies and other cost savings; 32) our ability to consummate our announced acquisition of Asco in a timely matter while avoiding any unexpected costs, charges, expenses, adverse changes to business relationships and other business disruptions for ourselves and Asco as a result of the acquisition; 33) our ability to continue selling certain receivables through our supplier financing program; 34) the risks of doing business internationally, including fluctuations in foreign current exchange rates, impositions of tariffs or embargoes, compliance with foreign laws, and domestic and foreign government policies; and 35) our ability to complete the proposed accelerated stock repurchase plan, among other things.
Actual results, including with respect to our targets and prospects, could differ materially due to a number of factors, including the risk that we may not obtain sufficient orders to achieve our targeted revenues; price competition in key markets; the risk that we or our channel partners are not able to develop and expand customer bases and accurately anticipate demand from end customers, which can result in increased inventory and reduced orders as we experience wide fluctuations in supply and demand; the risk that our commercial Lighting Products results will continue to suffer if new issues arise regarding issues related to product quality for this business; the risk that we may experience production difficulties that preclude us from shipping sufficient quantities to meet customer orders or that result in higher production costs and lower margins; our ability to lower costs; the risk that our results will suffer if we are unable to balance fluctuations in customer demand and capacity, including bringing on additional capacity on a timely basis to meet customer demand; the risk that longer manufacturing lead times may cause customers to fulfill their orders with a competitor's products instead; the risk that the economic and political uncertainty caused by the proposed tariffs by the United States on Chinese goods, and any corresponding Chinese tariffs in response, may negatively impact demand for our products; product mix; risks associated with the ramp - up of production of our new products, and our entry into new business channels different from those in which we have historically operated; the risk that customers do not maintain their favorable perception of our brand and products, resulting in lower demand for our products; the risk that our products fail to perform or fail to meet customer requirements or expectations, resulting in significant additional costs, including costs associated with warranty returns or the potential recall of our products; ongoing uncertainty in global economic conditions, infrastructure development or customer demand that could negatively affect product demand, collectability of receivables and other related matters as consumers and businesses may defer purchases or payments, or default on payments; risks resulting from the concentration of our business among few customers, including the risk that customers may reduce or cancel orders or fail to honor purchase commitments; the risk that we are not able to enter into acceptable contractual arrangements with the significant customers of the acquired Infineon RF Power business or otherwise not fully realize anticipated benefits of the transaction; the risk that retail customers may alter promotional pricing, increase promotion of a competitor's products over our products or reduce their inventory levels, all of which could negatively affect product demand; the risk that our investments may experience periods of significant stock price volatility causing us to recognize fair value losses on our investment; the risk posed by managing an increasingly complex supply chain that has the ability to supply a sufficient quantity of raw materials, subsystems and finished products with the required specifications and quality; the risk we may be required to record a significant charge to earnings if our goodwill or amortizable assets become impaired; risks relating to confidential information theft or misuse, including through cyber-attacks or cyber intrusion; our ability to complete development and commercialization of products under development, such as our pipeline of Wolfspeed products, improved LED chips, LED components, and LED lighting products risks related to our multi-year warranty periods for LED lighting products; risks associated with acquisitions, divestitures, joint ventures or investments generally; the rapid development of new technology and competing products that may impair demand or render our products obsolete; the potential lack of customer acceptance for our products; risks associated with ongoing litigation; and other factors discussed in our filings with the Securities and Exchange Commission (SEC), including our report on Form 10 - K for the fiscal year ended June 25, 2017, and subsequent reports filed with the SEC.
Such risks and uncertainties include, but are not limited to: our ability to achieve our financial, strategic and operational plans or initiatives; our ability to predict and manage medical costs and price effectively and develop and maintain good relationships with physicians, hospitals and other health care providers; the impact of modifications to our operations and processes; our ability to identify potential strategic acquisitions or transactions and realize the expected benefits of such transactions, including with respect to the Merger; the substantial level of government regulation over our business and the potential effects of new laws or regulations or changes in existing laws or regulations; the outcome of litigation, regulatory audits, investigations, actions and / or guaranty fund assessments; uncertainties surrounding participation in government - sponsored programs such as Medicare; the effectiveness and security of our information technology and other business systems; unfavorable industry, economic or political conditions, including foreign currency movements; acts of war, terrorism, natural disasters or pandemics; our ability to obtain shareholder or regulatory approvals required for the Merger or the requirement to accept conditions that could reduce the anticipated benefits of the Merger as a condition to obtaining regulatory approvals; a longer time than anticipated to consummate the proposed Merger; problems regarding the successful integration of the businesses of Express Scripts and Cigna; unexpected costs regarding the proposed Merger; diversion of management's attention from ongoing business operations and opportunities during the pendency of the Merger; potential litigation associated with the proposed Merger; the ability to retain key personnel; the availability of financing, including relating to the proposed Merger; effects on the businesses as a result of uncertainty surrounding the proposed Merger; as well as more specific risks and uncertainties discussed in our most recent report on Form 10 - K and subsequent reports on Forms 10 - Q and 8 - K available on the Investor Relations section of www.cigna.com as well as on Express Scripts» most recent report on Form 10 - K and subsequent reports on Forms 10 - Q and 8 - K available on the Investor Relations section of www.express-scripts.com.
Taking into account the features set out in the heading and based on the information provided by Bankera's business plan, it is concluded that this ICO falls within the scope of the Law on Securities, i.e. is considered a public offer, and therefore must be executed in accordance with the established requirements
One agency that does demand such information is the Department of Homeland Security (DHS), which sponsored Preston Brown's research at Texas Tech; it instituted these requirements in the aftermath of the explosion there, as the CSB report notes.
As a managed environment, the PGRR helps researchers meet information security and regulatory requirements, provides a single consistent view of all datasets, and helps users stay current on updates and modifications made to these datasets.
Members should not hold any concerns about the security of their personal information as the dating platform covers all of the necessary requirements to keep your data safe and away from preying eyes.
FAA is in the process of certifying and accrediting the security of RMS in accordance with DOT standard information technology requirements.
Many of these requirements pertain to information security and privacy.
In accord with the requirements of the Federal Information Security Management Act of 2002 (FISMA), a completed security Certification and Accreditation (C&A) process was completed for Security Management Act of 2002 (FISMA), a completed security Certification and Accreditation (C&A) process was completed for security Certification and Accreditation (C&A) process was completed for DIN SAR.
OST has certified and accredited the security of SOS in accordance with DOT information technology security standard requirements.
All CARS staff and contractors are briefed on CARS security requirements and their individual responsibilities for ensuring the security of information in the CARS Database System.
Security of ID credential issued to an employee or contractor is achieved by full compliance with the mandatory requirements of the Federal Information Processing Standard Publication 201 (FIPS Pub 201), Personal Identity Verification of Federal Employees and Contractors.
OIG has certified and accredited the security of TIGR in accordance with DOT information technology security standard requirements.
In addition to the requirements of the Federal Information Security Management Act of 2002 (FISMA), a Security Certification and Accreditation (C&A) was completed for PRISM.
OST has certified and accredited the security of FBMS in accordance with DOT information technology security standard requirements.
FRA has certified and accredited the security of RES in accordance with DOT information technology security standard requirements.
OST has certified and accredited the security of PRISM in accordance with DOT information technology security standard requirements.
OST has certified and accredited the security of ESS in accordance with DOT information technology security standard requirements.
The DOT is in process to certify and accredit the security of OWCP in accordance with DOT information technology security standard requirements.
FMCSA's contractor is subject to routine audits by DOT / FMCSA privacy officials and the FMCSA Information Technology (IT) Security Team to ensure compliance with the Privacy Act of 1974 and all other applicable Federal laws, regulations, and requirements.
The DOT is in process to certify and accredit the security of WCIS in accordance with DOT information technology security standard requirements.
FRA has certified and accredited the security of CCM in accordance with DOT information technology security standard requirements.
We may also process your information for legitimate reasons associated with your use or ownership of an Aston Martin car, for reasons concerning information or network security, to defend or pursue legal rights or to meet regulatory requirements.
OST is in process of renewing the DIMS certification and accreditation in accordance with DOT information technology security standard requirements.
OST has certified and accredited the security of JITS in accordance with DOT information technology security standard requirements.
This 2018 Cadillac CTS - V Sedan is proudly offered by Cadillac of Arlington This Cadillac includes: GAS GUZZLER TAX LPO, ALL - WEATHER MAT PROTECTION PACKAGE Floor Mats ADVANCED SECURITY PACKAGE Security System TRANSMISSION, 8 - SPEED AUTOMATIC (STD) 8 - Speed A / T A / T EMISSIONS, FEDERAL REQUIREMENTS WHEELS, 19» Aluminum Wheels CARBON FIBER PACKAGE Rear Spoiler STEERING WHEEL, SUEDED MICROFIBER RIM AND SHIFT KNOB ENGINE, 6.2 L Supercharged 8 Cylinder Engine Gasoline Fuel PERFORMANCE DATA AND VIDEO RECORDER SEATS, RECARO PERFORMANCE LUXURY PACKAGE Multi-Zone A / C Heated Rear Seat (s) A / C Climate Control Back - Up Camera Rear Bench Seat Rear A / C Pass - Through Rear Seat CALIPERS, RED BREMBO * Note - For third party subscriptions or services, please contact the dealer for more infoSECURITY PACKAGE Security System TRANSMISSION, 8 - SPEED AUTOMATIC (STD) 8 - Speed A / T A / T EMISSIONS, FEDERAL REQUIREMENTS WHEELS, 19» Aluminum Wheels CARBON FIBER PACKAGE Rear Spoiler STEERING WHEEL, SUEDED MICROFIBER RIM AND SHIFT KNOB ENGINE, 6.2 L Supercharged 8 Cylinder Engine Gasoline Fuel PERFORMANCE DATA AND VIDEO RECORDER SEATS, RECARO PERFORMANCE LUXURY PACKAGE Multi-Zone A / C Heated Rear Seat (s) A / C Climate Control Back - Up Camera Rear Bench Seat Rear A / C Pass - Through Rear Seat CALIPERS, RED BREMBO * Note - For third party subscriptions or services, please contact the dealer for more infoSecurity System TRANSMISSION, 8 - SPEED AUTOMATIC (STD) 8 - Speed A / T A / T EMISSIONS, FEDERAL REQUIREMENTS WHEELS, 19» Aluminum Wheels CARBON FIBER PACKAGE Rear Spoiler STEERING WHEEL, SUEDED MICROFIBER RIM AND SHIFT KNOB ENGINE, 6.2 L Supercharged 8 Cylinder Engine Gasoline Fuel PERFORMANCE DATA AND VIDEO RECORDER SEATS, RECARO PERFORMANCE LUXURY PACKAGE Multi-Zone A / C Heated Rear Seat (s) A / C Climate Control Back - Up Camera Rear Bench Seat Rear A / C Pass - Through Rear Seat CALIPERS, RED BREMBO * Note - For third party subscriptions or services, please contact the dealer for more information.
IT Administration: administration of Humble Bundle's information technology systems; network and device administration; network and device security; implementing data security and information systems policies; compliance audits in relation to internal policies; identification and mitigation of fraudulent activity; and compliance with legal requirements.
To address increasingly stringent security requirements for Point - of - Sale and IoT applications, i.MX 7 series products integrate Elliptic Curve Cryptography technology, active tamper detection, secure boot and other hardware - enabled features that help to secure sensitive information.
Not only is a Social Security number not a requirement for all credit reporting, but it only tends to comes in at third place within the hierarchy of the four most critical pieces of personally identifiable information that determine whether an account lands on your credit report or doesn't.
LexisNexis Risk Solutions has estimated that 50 % of public - record information about tax liens and 96 % of information about civil judgments do not include a full or redacted Social Security number and will not meet the new credit bureau requirements resulting from their settlement with the 31 states.
sets forth conditions for selling securities that are the result of an SEC - registered merger or consolidation; non-affiliates are not subject to resale restrictions; affiliates of the selling company who do not become affiliates of the acquiring company are subject to volume restrictions and public information requirements for the first year, but do not have to file Form 144; during the second year, the only requirement is for the company to be current in all SEC reporting; affiliates of the acquiring company must abide by all 144 requirements except the minimum holding period
Requirements: You need proof of income, a checking account and your paycheck schedule, as well as typical identity information like social security number and photo ID.
These property managers and owners will only have access to the information needed to manage a renters insurance requirement and are required to provide your information with at least the same level of protection and security as we use with regard to your information.
The funds may disclose non-material information including commentary and aggregate information about the characteristics of a fund in connection with or relating to a fund or its portfolio securities to any person if such disclosure is for a legitimate business purpose, such disclosure does not effectively result in the disclosure of the complete portfolio securities of any fund (which can only be disclosed in accordance with the above requirements), and such information does not constitute material non-public information.
The fund may disclose non-material information including commentary and aggregate information about the characteristics of the fund in connection with or relating to the fund or its portfolio securities to any person if such disclosure is for a legitimate business purpose, such disclosure does not effectively result in the disclosure of the complete portfolio securities of the fund (which can only be disclosed in accordance with the above requirements), and such information does not constitute material non-public information.
You will not, and will not allow or authorize others to, use the Services, the Sites or any Materials therein to take any actions that: (i) infringe on PetSmart Charities» or any third party's copyright, patent, trademark, trade secret or other intellectual or proprietary rights, or rights of publicity or privacy; (ii) violate any applicable law, statute, ordinance or regulation (including those regarding export control); (iii) are defamatory, trade libelous, threatening, harassing, invasive of privacy, stalking, harassment, abusive, tortuous, hateful, constitute discrimination based on race, religion, ethnicity, gender, sex, disability or other protected grounds, or are pornographic or obscene; (iv) interfere with or disrupt any services or equipment with the intent of causing an excessive or disproportionate load on PetSmart Charities or its licensors or suppliers» infrastructure; (v) involve knowingly distributing viruses, Trojan horses, worms, or other similar harmful or deleterious programming routines; (vi) involve the preparation and / or distribution of «junk mail», «spam», «chain letters», «pyramid schemes» or other deceptive online marketing practices, or any unsolicited bulk email or unsolicited commercial email or otherwise in a manner that violate any applicable «anti-spam» legislation, including that commonly referred to as «CASL»; (vii) would be or encourage conduct that could constitute a criminal offense, give rise to civil liability or otherwise violate any applicable local, state, national or international laws or regulations; (viii) involve the unauthorized entry to any machine accessible via the Services or interference with the Sites or any servers or networks connected to the Sites or disobey any requirements, procedures, policies or regulations of networks connected to the Sites, or attempt to breach the security of or disrupt Internet communications on the Sites (including without limitation accessing data to which you are not the intended recipient or logging into a server or account for which you are not expressly authorized); (ix) impersonate any person or entity, including, without limitation, one of PetSmart Charities» or another party's officers or employees, or falsely state or otherwise misrepresent your affiliation with a person or entity; (x) forge headers or otherwise manipulate identifiers in order to disguise the origin of any information transmitted through the Sites; (xi) collect or store personal data about other account users or attempt to gain access to other account users» accounts or otherwise mine information about other account users or the Sites, or interfere with any other user's ability to access or use the Sites; (xii) execute any form of network monitoring or run a network analyzer or packet sniffer or other technology to intercept, decode, mine or display any packets used to communicate between the Sites» servers or any data not intended for you; (xiii) attempt to circumvent authentication or security of any content, host, network or account («cracking») on or from the Sites; or (xiv) in PetSmart Charities» sole discretion, are contrary to PetSmart Charities» public image, goodwill, reputation or mission, or otherwise not in furtherance of our Vision of a lifelong, loving home for every pet.
You will not, and will not allow or authorize others to, use the Services or the Sites to take any actions that: (i) infringe on any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy; (ii) violate any applicable law, statute, ordinance or regulation (including those regarding export control); (iii) are defamatory, trade libelous, threatening, harassing, invasive of privacy, stalking, harassment, abusive, tortuous, hateful, discriminatory based on race, ethnicity, gender, sex or disability, pornographic or obscene; (iv) interfere with or disrupt any services or equipment with the intent of causing an excessive or disproportionate load on the Animal League or its licensors or suppliers» infrastructure; (v) involve knowingly distributing viruses, Trojan horses, worms, or other similar harmful or deleterious programming routines; (vi) involve the preparation and / or distribution of «junk mail», «spam», «chain letters», «pyramid schemes» or other deceptive online marketing practices or any unsolicited bulk email or unsolicited commercial email or otherwise in a manner that violate the Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN - SPAM Act of 2003); (vii) would encourage conduct that could constitute a criminal offense, give rise to civil liability or otherwise violate any applicable local, state, federal or international laws, rules or regulations; (viii) involve the unauthorized entry to any machine accessible via the Services or interfere with the Sites or any servers or networks connected to the Sites or disobey any requirements, procedures, policies or regulations of networks connected to the Sites, or attempt to breach the security of or disrupt Internet communications on the Sites (including without limitation accessing data to which you are not the intended recipient or logging into a server or account for which you are not expressly authorized); (ix) impersonate any person or entity, including, without limitation, one of the Animal League's or other's officers or employees, or falsely state or otherwise misrepresent your affiliation with a person or entity; (x) forge headers or otherwise manipulate identifiers in order to disguise the origin of any information transmitted through the Sites; (xi) collect or store personal data about other Animal League members, Site users or attempt to gain access to other Animal League members information, or otherwise mine information about Animal League members, Site users, or the Sites; (xii) execute any form of network monitoring or run a network analyzer or packet sniffer or other technology to intercept, decode, mine or display any packets used to communicate between the Sites» servers or any data not intended for you; (xiii) attempt to circumvent authentication or security of any content, host, network or account («cracking») on or from the Sites; or (xiv) are contrary to the Animal League's public image, goodwill, reputation or mission or otherwise not in furtherance of the Animal Leagues stated purposes.
Notes: Security cruise regulations require clients» passport information and nationality at time of booking.Please check visa requirements with your local consulate (s); responsibility for obtaining visas rests with the traveler.
Please carefully read the fine print (below the room types or at the bottom of each Supplier page on our Platform) and important information in your reservation confirmation for additional policies as may be applied by the Supplier (e.g. in respect of age requirement, security deposit, non - cancellation / additional supplements for group bookings, extra beds / no free breakfast, pets / cards accepted).
Both agree that lawyers must pay closer attention to the requirements of Federal Rule of Civil Procedure 5.2, which prohibits parties from filing information such as a social security numbers and taxpayer ids (except last four digits) or birth dates.
I said that perhaps the most challenging aspect is a requirement to maintain a «record of every breach of security safeguards involving personal information under its control.»
Perhaps the most challenging aspect is a requirement to maintain a «record of every breach of security safeguards involving personal information under its control.»
Canadian Securities Law CSA clarify disclosure requirements when relying on U.S. disclosure documents to satisfy Canadian disclosure obligations Today, members of the Canadian Securities Administrators in all jurisdictions other than British Columbia and Alberta released a multilateral staff notice that provides information with regards to the continuous disclosure and prospectus requirements that apply to documents prepared in accordance with the U.S. Securities and Exchange Act of 1934 and filed in Canada.
The comments to the Proposed Rules note it was assumed that business associates in compliance with their contracts would have already designated personnel to be responsible for formulating the organization's privacy and security policies, performed a risk analysis, and invested in hardware and software to prevent and monitor for internal and external breaches of protected health information.8 To emphasize the requirement, the risk of criminal and / or civil monetary penalties was referenced as an incentive for organizations to bolster their security and privacy policies.
Intapp Wall Builder centralizes enforcement of information security and internal access rights across electronic information repositories in response to professional rules, client mandates and regulatory requirements.
However, the OPC was not impressed by the disclaimer and found that: (i) this statement could not absolve ALM of its legal obligations under PIPEDA; and (ii) considering the nature of the personal information collected by ALM, its level of security safeguards should have been high in accordance with PIPEDA's requirements.
Securities regulation in Canada is primarily disclosure - based, with requirements for timely and accurate disclosure of material information.
When asked what accounts for the change, those that increased their budgets mentioned a new focus on cybersecurity, information governance, business continuity or disaster recovery concerns and security compliance requirements as well as lots of cyclical hardware refresh scenarios.
a b c d e f g h i j k l m n o p q r s t u v w x y z