Data Security Example for Smart Sample Clauses

Data Security Example for Smart. Meters (VON) In the following, the Dresden property partner Vonovia (VON) has outlined their approach to protect personal data from Smart Meter readings. At the time of reading, the meter-reader collects the readings from a suitable position in front of the building or in the hallway on an encrypted transmission path using a PDA. The transmission to the computer centre of ISTA company is done via a secured VPN connection. Alternatively, the collection and transmission can also take place from a communication unit (stationary gateway) in the building. This establishes an encrypted radio connection to the individual measuring devices (radio network), collects the consumption and operating data (device number, key date value, monthly values, current measured value) and then transmits the information via GSM network (VPN) to ISTA. The transmission between the end devices and the central communication unit is encrypted using a proprietary radio protocol. The gateway communicates with the central server via the GSM network. The mobile radio transmission is secured by a VPN tunnel and an encryption of the mobile phone provider. The encryption technology was developed according to the recognized rules of technology. A sniffer technique could not decrypt the protocol, as data is transmitted only very rarely. Since sniffer technology permanently needs data to decrypt it, but the ISTA radio system does not provide this data due to the way it works, ISTAs has no possibility to influence the protocol. The separation rule is of course taken into account. For the purpose of verifying error logs and identifying malfunctions, it is not yet necessary to allocate specific residential units, their addresses or occupants. The operating data is kept in a non-interpretable anonymization form, customer data is logically separated from each other. The identification of the person concerned on the basis of the transferred data is therefore only possible for ISTA employees who have been granted access to the database. A differentiated authorization concept ensures that employees only have access to programs or data to the extent necessary. Accordingly, such data is only available and accessible to the ISTA employees responsible for it when malfunctions are detected and the appropriate repair measures have to be initiated. This is ensured by the access concept of the IT systems. All personal data is exclusively used for the fulfilment of the contract within the framework of the legal...
AutoNDA by SimpleDocs

Related to Data Security Example for Smart

  • System Security and Data Safeguards When SAP is given access to Licensee’s systems and data, SAP shall comply with Licensee’s reasonable administrative, technical, and physical safeguards to protect such data and guard against unauthorized access. In connection with such access, Licensee shall be responsible for providing Consultants with user authorizations and passwords to access its systems and revoking such authorizations and terminating such access, as Licensee deems appropriate from time to time. Licensee shall not grant SAP access to Licensee systems or personal information (of Licensee or any third party) unless such access is essential for the performance of Services under the Agreement. The parties agree that no breach of this provision shall be deemed to have occurred in the event of SAP non-conformance with the aforementioned safeguard but where no personal information has been compromised.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Data Security The Provider agrees to utilize administrative, physical, and technical safeguards designed to protect Student Data from unauthorized access, disclosure, acquisition, destruction, use, or modification. The Provider shall adhere to any applicable law relating to data security. The provider shall implement an adequate Cybersecurity Framework based on one of the nationally recognized standards set forth set forth in Exhibit “F”. Exclusions, variations, or exemptions to the identified Cybersecurity Framework must be detailed in an attachment to Exhibit “H”. Additionally, Provider may choose to further detail its security programs and measures that augment or are in addition to the Cybersecurity Framework in Exhibit “F”. Provider shall provide, in the Standard Schedule to the DPA, contact information of an employee who XXX may contact if there are any data security concerns or questions.

  • Data Security and Privacy Plan As more fully described herein, throughout the term of the Master Agreement, Vendor will have a Data Security and Privacy Plan in place to protect the confidentiality, privacy and security of the Protected Data it receives from the District. Vendor’s Plan for protecting the District’s Protected Data includes, but is not limited to, its agreement to comply with the terms of the District’s Bill of Rights for Data Security and Privacy, a copy of which is set forth below and has been signed by the Vendor. Additional components of Vendor’s Data Security and Privacy Plan for protection of the District’s Protected Data throughout the term of the Master Agreement are as follows:

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Destination CSU-Pueblo scholarship This articulation transfer agreement replaces all previous agreements between CCA and CSU-Pueblo in Bachelor of Science in Physics (Secondary Education Emphasis). This agreement will be reviewed annually and revised (if necessary) as mutually agreed.

  • New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to:

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Description of Vendor Entity and Vendor's Goods & Services If awarded, this description of Vendor and Vendor's goods and services will appear on the TIPS website for customer/public viewing. Full service mechanical and electrical contractors offering professional solutions and services in HVAC, Refrigeration, Piping, Plumbing, Electrical, Controls and Engineering. Primary Contact Name Please identify the individual who will be primarily responsible for all TIPS matters and inquiries for the duration of the contract. Xxxx Xxxxx Primary Contact Title Primary Contact Title Project Manager Primary Contact Email Please enter a valid email address that will definitely reach the Primary Contact. xxxxxx@xxxxxxxxxxxxxx.xxx Primary Contact Phone Numbers only, no symbols or spaces (Ex. 8668398477). The system will auto-populate your entry with commas once submitted which is appropriate and expected (Ex. 8,668,398,477). Please provide the accurate and current phone number where the individual who will be primarily responsible for all TIPS matters and inquiries for the duration of the contract can be reached directly. 0000000000 Primary Contact Fax Numbers only, no symbols or spaces (Ex. 8668398477). The system will auto-populate your entry with commas once submitted which is appropriate and expected (Ex. 8,668,398,477). 1 0 0000000000 Primary Contact Mobile Numbers only, no symbols or spaces (Ex. 8668398477). The system will auto-populate your entry with commas once submitted which is appropriate and expected (Ex. 8,668,398,477). 1 0000000000 Secondary Contact Name Please identify the individual who will be secondarily responsible for all TIPS matters and inquiries for the duration of the contract. Xxxx Xxxxx Secondary Contact Title Secondary Contact Title

  • International Olympic Committee; International Red Cross and Red Crescent Movement As instructed from time to time by ICANN, the names (including their IDN variants, where applicable) relating to the International Olympic Committee, International Red Cross and Red Crescent Movement listed at xxxx://xxx.xxxxx.xxx/en/resources/registries/reserved shall be withheld from registration or allocated to Registry Operator at the second level within the TLD. Additional International Olympic Committee, International Red Cross and Red Crescent Movement names (including their IDN variants) may be added to the list upon ten (10) calendar days notice from ICANN to Registry Operator. Such names may not be activated in the DNS, and may not be released for registration to any person or entity other than Registry Operator. Upon conclusion of Registry Operator’s designation as operator of the registry for the TLD, all such names withheld from registration or allocated to Registry Operator shall be transferred as specified by ICANN. Registry Operator may self-­‐allocate and renew such names without use of an ICANN accredited registrar, which will not be considered Transactions for purposes of Section 6.1 of the Agreement.

Time is Money Join Law Insider Premium to draft better contracts faster.