Computer Misuse Act Sample Clauses

Computer Misuse Act. The Computer Misuse Act makes it an offence for anyone to have: ▪ Unauthorised access to computer material eg. if you find or guess a fellow student’s password and use it. ▪ Unauthorised access to deliberately commit an unlawful act eg. if you guess a fellow student’s password and access their learning account without permission ▪ Unauthorised changes to computer material eg. if you change the desk-top set up on your computer or introduce a virus deliberately to the school’s network system.
AutoNDA by SimpleDocs
Computer Misuse Act. Under the Computer Misuse Act 1990, it is illegal to access data without authorisation. This type of activity is known as ‘hacking’. There are three offences under this Act:  Accessing data or programmes held in a computer without authorisation  Accessing data or programmes held in a computer without authorisation with the intention of committing a further offence, e.g. fraud, blackmail  Modifying data or programmes held in a computer that you are not authorised to modify  Accessing data using another person’s password is an offence under this Act.
Computer Misuse Act. The Client gives Intertek NTA authorization to perform the Services against the defined target network and systems;

Related to Computer Misuse Act

  • Accessibility of Web-Based Information and Applications For State Agency Authorized User Acquisitions: Any web-based information and applications development, or programming delivered pursuant to the contract or procurement, will comply with New York State Enterprise IT Policy NYS-P08-005, Accessibility of Web-Based Information and Applications as follows: Any web-based information and applications development, or programming delivered pursuant to the contract or procurement, will comply with New York State Enterprise IT Policy NYS-P08- 005, Accessibility of Web-Based Information and Applications as such policy may be amended, modified or superseded, which requires that state agency web-based information and applications are accessible to persons with disabilities. Web-based information and applications must conform to New York State Enterprise IT Policy NYS-P08-005 as determined by quality assurance testing. Such quality assurance testing will be conducted by the State Agency Authorized User and the results of such testing must be satisfactory to the Authorized User before web-based information and applications will be considered a qualified deliverable under the contract or procurement.

  • Health Information System i. As required by 42 CFR 438.242(a), the MCP shall maintain a health information system that collects, analyzes, integrates, and reports data. The system shall provide information on areas including, but not limited to, utilization, grievances and appeals, and MCP membership terminations for other than loss of Medicaid eligibility.

  • Electronic Protected Health Information “Electronic Protected Health Information” means individually identifiable health information that is transmitted by or maintained in electronic media.

  • Data Protection and Privacy: Protected Health Information Party shall maintain the privacy and security of all individually identifiable health information acquired by or provided to it as a part of the performance of this Agreement. Party shall follow federal and state law relating to privacy and security of individually identifiable health information as applicable, including the Health Insurance Portability and Accountability Act (HIPAA) and its federal regulations.

  • Health Insurance Portability and Accountability Act Grantee certifies that it is in compliance with the Health Insurance Portability and Accountability Act of 1996 (HIPAA), Public Law Xx. 000-000, 00 XXX Parts 160, 162 and 164, and the Social Security Act, 42 USC 1320d-2 through 1320d-7, in that it may not use or disclose protected health information other than as permitted or required by law and agrees to use appropriate safeguards to prevent use or disclosure of the protected health information. Grantee shall maintain, for a minimum of six (6) years, all protected health information.

  • Privacy Act If performance involves design, development or operation of a system of records on individuals, this Agreement incorporates by reference FAR 52.224-1 Privacy Act Notification (Apr 1984) and FAR 52.224-2 Privacy Act (Apr 1984).

  • COMPLIANCE WITH NEW YORK STATE INFORMATION SECURITY BREACH AND NOTIFICATION ACT Contractor shall comply with the provisions of the New York State Information Security Breach and Notification Act (General Business Law Section 899-aa; State Technology Law Section 208).

  • Traffic Signals Based upon the results of the Traffic Warrant Studies, the Engineer shall identify and prepare Traffic Signal Plans for all warranted traffic signals. The Engineer shall confirm the power source for all signals and coordinate with the appropriate utility agency. Traffic Signal Plans must be signed and sealed by a Texas Registered Professional Engineer. The Engineer shall develop all quantities, general notes, specifications and incorporate the appropriate agency standards required to complete construction. Traffic signal poles, fixtures, signs, and lighting must be designed per the Green Ribbon Report recommendations and standards. The Engineer shall provide the following information in the Traffic Signal Plans:

  • ACCESS TO SECURITY LOGS AND REPORTS Upon request, the Contractor shall provide access to security logs and reports to the State or Authorized User in a format as specified in the Authorized User Agreement.

  • Fire, Life Safety, and Accessibility Codes The following codes, in the versions approved by the Georgia State Fire Marshal/Fire Safety Commissioner and Department of Human Resources, shall be used. The Design Professional will designate any additional codes or special modifications in the Supplementary General Conditions.

Time is Money Join Law Insider Premium to draft better contracts faster.