6Data Integrity Sample Clauses

6Data Integrity. The data integrity ensures the intact delivery of message as sent by the sender to a receiver without any modification. The proposed scheme ensures the data integrity as the three corresponding entities are capable enough to detect any modification in the generated hash functions at various levels i.e., HU (produced at Ui), HSx, HSxU (produced at Sx), and HSySx, HSyU (produced at Sy).
AutoNDA by SimpleDocs

Related to 6Data Integrity

  • Data Integrity Contractor shall implement policies and procedures reasonably intended to ensure that Protected Health Information and Personally Identifiable Information in its possession is complete, accurate, and current, to the extent necessary for the Contractor’s intended purposes, and has not been altered or destroyed in an unauthorized manner.

  • Program Integrity The state must have processes in place to ensure that there is no duplication of federal funding for any aspect of the demonstration.

  • Data Integrity Control Personal Data will remain intact, complete and current during processing activities.

  • Database The LERG is available through Telcordia. ICONN is available through the Qwest web site.

  • Systems The details of any systems work will be determined after a thorough business analysis. System's work will be billed on a time and material basis. Investors Bank provides an allowance of 10 systems hours for data extract set up and reporting extract set up. Additional hours will be billed on a time and material basis.

  • Integrity 2.1 Transmission control ☒ VPN connections ☒ The use of private storage media is prohibited ☒ Special protection when physically transporting data media

  • Information Systems The Official Agency in conjunction with the Authority will meet the relevant requirements of Articles 131 to 136 of Regulation (EU) 2017/625 and Implementing Regulation (EU) 2019/1715 as appropriate to the Official Agency. The Official Agency shall record appropriate data in the Official Agency Premises Inspection database (OAPI), which will be further developed over the life of the contract. Data should be entered into the database on an ongoing basis but shall be entered within one month of the activity taking place, unless otherwise agreed with the Authority.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Financial Management System Subrecipient shall establish and maintain a sound financial management system, based upon generally accepted accounting principles. Contractor’s system shall provide fiscal control and accounting procedures that will include the following:

  • Encrypt or Encryption As defined in the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Security Rule at 45 CFR 164.304, means the use of an algorithmic process to transform Personally Identifiable Information into an unusable, unreadable, or indecipherable form in which there is a low probability of assigning meaning without use of a confidential process or key.

Time is Money Join Law Insider Premium to draft better contracts faster.