Data and Data Transmission Security Sample Clauses

Data and Data Transmission Security. BCBSSC and Trading Partner shall employ security measures necessary to protect data and Data Transmissions between them, including authentication, encryption, password use, or other security measures in compliance with the Security Rule and any other applicable laws, as set forth in Article V of this Agreement. Unless BCBSSC and Trading Partner agree otherwise, the recipient of data or Data Transmission shall use at least the same level of protection for any subsequent transmission as was used for the original transmission.
AutoNDA by SimpleDocs
Data and Data Transmission Security. Each party will employ security measures necessary to protect data and data transmissions between them, which may include authentication, encryption, password use, or other security measures in compliance with Social Security Act § 1173(d) and any Department of Health and Human Services implementing regulations or guidelines.
Data and Data Transmission Security. Health Plan and Trading Partner will employ security measures necessary to protect data and data transmissions between them, which may include authentication, encryption, password use, or other security measures in compliance with Social Security Act § 1173(d) and any Department of Health and Human Services implementing regulations or guidelines.
Data and Data Transmission Security. PGBA, LLC and Trading Partner will employ security measures necessary to protect Data and Data Transmissions between them, including authentication, encryption, password use, or other security measures in compliance with Social Security Act § 1173(d) and any HHS implementing regulations or guidelines and as set forth in Article V of this Agreement. Unless PGBA and Trading Partner agree otherwise, the recipient of Data or Data Transmission will use at least the same level of protection for any subsequent transmission as was used for the original transmission.
Data and Data Transmission Security. Parties will employ security measures necessary to protect Data and Data Transmissions between them, including authentication, encryption, password use, or other security measures in compliance with HIPAA. Unless Parties agree in writing otherwise, the Party receiving Data or Data Transmission will use at least the same level of protection for any subsequent transmission as was used for the original transmission.
Data and Data Transmission Security. UHA and Trading Partner will employ security measures necessary to protect Data and Data Transmissions between them 1) in compliance with Social Security Act § 1173(d) and any HHS implementing regulations or guidelines, and 2) as set forth in Article IV of this Agreement. Unless UHA and Trading Partner agree otherwise, the recipient of Data, or Data Transmission, will use at least the same level of protection for any subsequent transmission as was used for the original transmission.

Related to Data and Data Transmission Security

  • Connecting Transmission Owner Obligations Connecting Transmission Owner shall maintain its transmission facilities and Attachment Facilities in a safe and reliable manner and in accordance with this Agreement.

  • Data Transmission The procedures for transmitting load obligation data to PJM for DS Supplier’s DS Load shall be as set forth by PJM.

  • NYISO and Connecting Transmission Owner Obligations Connecting Transmission Owner and NYISO shall cause the New York State Transmission System and the Connecting Transmission Owner’s Attachment Facilities to be operated, maintained and controlled in a safe and reliable manner in accordance with this Agreement and the NYISO Tariffs. Connecting Transmission Owner and NYISO may provide operating instructions to Developer consistent with this Agreement, NYISO procedures and Connecting Transmission Owner’s operating protocols and procedures as they may change from time to time. Connecting Transmission Owner and NYISO will consider changes to their respective operating protocols and procedures proposed by Developer.

  • Connecting Transmission Owner’s Attachment Facilities Connecting Transmission Owner shall design, procure, construct, install, own and/or control the Connecting Transmission Owner’s Attachment Facilities described in Appendix A hereto, at the sole expense of the Developer.

  • Transmission encryption All data transmissions of County PHI or PI outside the secure internal network must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as AES. Encryption can be end to end at the network level, or the data files containing PHI can be encrypted. This requirement pertains to any type of PHI or PI in motion such as website access, file transfer, and E-Mail.

  • Data Transmission Control Except as necessary for the provision of the Cloud Services in accordance with the Agreement, Personal Data must not be read, copied, modified or removed without authorization during transfer. Where data carriers are physically transported, adequate measures are implemented at SAP to provide the agreed-upon service levels (for example, encryption and lead-lined containers).

  • Connecting Transmission Owner’s Attachment Facilities Construction The Connecting Transmission Owner’s Attachment Facilities shall be designed and constructed in accordance with Good Utility Practice. Upon request, within one hundred twenty (120) Calendar Days after the Commercial Operation Date, unless the Connecting Transmission Owner and Developer agree on another mutually acceptable deadline, the Connecting Transmission Owner shall deliver to the Developer “as-built” drawings, relay diagrams, information and documents for the Connecting Transmission Owner’s Attachment Facilities set forth in Appendix A. The Connecting Transmission Owner [shall/shall not] transfer operational control of the Connecting Transmission Owner’s Attachment Facilities and Stand Alone System Upgrade Facilities to the NYISO upon completion of such facilities.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Information Submission by Connecting Transmission Owner The initial information submission by Connecting Transmission Owner shall occur no later than one hundred eighty (180) Calendar Days prior to Trial Operation and shall include New York State Transmission System information necessary to allow the Developer to select equipment and meet any system protection and stability requirements, unless otherwise mutually agreed to by the Developer and Connecting Transmission Owner. On a monthly basis Connecting Transmission Owner shall provide Developer and NYISO a status report on the construction and installation of Connecting Transmission Owner’s Attachment Facilities and System Upgrade Facilities and System Deliverability Upgrades, including, but not limited to, the following information: (1) progress to date; (2) a description of the activities since the last report; (3) a description of the action items for the next period; and (4) the delivery status of equipment ordered.

  • System Agency Data A. As between the Parties, all data and information acquired, accessed, or made available to Grantee by, through, or on behalf of System Agency or System Agency contractors, including all electronic data generated, processed, transmitted, or stored by Grantee in the course of providing data processing services in connection with Xxxxxxx’s performance hereunder (the “System Agency Data”), is owned solely by System Agency. B. Grantee has no right or license to use, analyze, aggregate, transmit, create derivatives of, copy, disclose, or process the System Agency Data except as required for Grantee to fulfill its obligations under the Grant Agreement or as authorized in advance in writing by System Agency. C. For the avoidance of doubt, Grantee is expressly prohibited from using, and from permitting any third party to use, System Agency Data for marketing, research, or other non-governmental or commercial purposes, without the prior written consent of System Agency. D. Grantee shall make System Agency Data available to System Agency, including to System Agency’s designated vendors, as directed in writing by System Agency. The foregoing shall be at no cost to System Agency. E. Furthermore, the proprietary nature of Xxxxxxx’s systems that process, store, collect, and/or transmit the System Agency Data shall not excuse Xxxxxxx’s performance of its obligations hereunder.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!