Data transmission security Sample Clauses

Data transmission security. 1. Personal data transferred through teletransmission are secured against loss of confidentiality and integrity using cryptographic data protection measures (data encryption in transit). 2. Personal data transferred through teletransmission are secured against loss of confidentiality through segmentation of ICT networks (network segmentation). 3. Encryption keys used to secure teletransmission of data are stored in a secure place with management of access to them and with the possibility of key recovery.
AutoNDA by SimpleDocs
Data transmission security. A. Data transmission security is the process of sending data from one computer system to another in a secure manner so that only the intended recipient of the data receives the data and the data sent is identical to the data received. When ePHI (Electronic Personal Health Information) is transmitted over an electronic communications network i.e. “the internet”, transmissions of ePHI to and from EpicMD, Inc. will utilize HIPAA-compliant encrypted file storage, or Secure File Transport Protocol (SFTP). EpicMD requires all vendors or partners who are in receipt of ePHI to execute a Sub-Business Associate Agreement to conform to all applicable HIPAA regulations. B. Client is expressly prohibited from indirectly or directly, knowingly violating or attempting to violate the security of EpicMD’s websites, including, without limitation, accessing data not intended for such user or logging into a server or account which user is not authorized to access, attempting to probe, scan or test the vulnerability of the system or network or to breach security or authentication measures, scanning or testing the performance of the system or network, attempting to interfere with service to any user, host or network, including, without limitation, via means of submitting a virus or “trojan horse” to the Web site, overloading, “flooding”, “mail bombing” or “crashing”, or sending unsolicited electronic mail, including promotions and/or advertising of products or services. Violations of system or network security may result in civil or criminal liability. EpicMD will investigate occurrences that may involve such violations and may involve, and cooperate with, law enforcement authorities in prosecuting users who are involved in such violations.
Data transmission security. Data transmission security is the process of sending data from one computer system to another in a secure manner so that only the intended recipient of the data receives the data and the data sent is identical to the data received. When ePHI (Electronic Protected Health Information) is transmitted over an electronic communications network i.e. “the internet”, transmissions of ePHI to and from Teladoc Health will utilize Secure File Transport Protocol (SFTP).
Data transmission security. The Data will be transmitted via telephone, email or Internet to a remote server located in Japan and maintained by Ricoh and/or its subcontractors. Ricoh uses reasonably available technology and reasonable security procedures to maintain the security of @ Remote and the Data; however, You acknowledge that no provider can absolutely prevent interception of data or guaranty security of information maintained on computers and on the Internet. You are responsible for the security of your network and operating environments.
Data transmission security. Subscriber agrees to use web browser software that supports the Secure Socket Layer (SSL) protocol for secure data transfers. Subscriber acknowledges that ATA is not responsible for notifying it of any upgrades, fixes or enhancements to any such software or for any compromise of data transmitted across the Internet. Subscriber acknowledges that it is possible that data transmitted over the Internet may be accessed by unauthorized third parties when communicated between Subscriber and ATA.
Data transmission security. A. Data transmission security is the process of sending data from one computer system to another in a secure manner so that only the intended recipient of the data receives the data and the data sent is identical to the data received. When ePHI (Electronic Personal Health Information) is transmitted over an electronic communications network i.e. "the internet", transmissions of ePHI to and from Teladoc, Inc. will utilize Secure File Transport Protocol (SFTP). B. Employer is expressly prohibited from indirectly or directly, knowingly violating or attempting to violate the security of Teladoc's web sites, including, without limitation, accessing data not intended for such user or logging into a server or account which user is not authorized to access, attempting to probe, scan or test the vulnerability of the system or network or to breach security or authentication measures, scanning or testing the performance of the system or network, attempting to interfere with service to any user, host or network, including, without limitation, via means of submitting a virus or "trojan horse" to the Web site, overloading, "flooding", "mail bombing" or "crashing", or sending unsolicited electronic mail, including promotions and/or advertising of products or services. Violations of system or network security may result in civil or criminal liability. Teladoc will investigate occurrences that may involve such violations and may involve, and cooperate with, law enforcement authorities in prosecuting users who are involved in such violations.
Data transmission security 
AutoNDA by SimpleDocs

Related to Data transmission security

  • Data Transmission The procedures for transmitting load obligation data to PJM for DS Supplier’s DS Load shall be as set forth by PJM.

  • Data Transmission Control Except as necessary for the provision of the Cloud Services in accordance with the Agreement, Personal Data must not be read, copied, modified or removed without authorization during transfer. Where data carriers are physically transported, adequate measures are implemented at SAP to provide the agreed-upon service levels (for example, encryption and lead-lined containers).

  • Connecting Transmission Owner Obligations Connecting Transmission Owner shall maintain its transmission facilities and Attachment Facilities in a safe and reliable manner and in accordance with this Agreement.

  • Transmission encryption All data transmissions of County PHI or PI outside the secure internal network must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as AES. Encryption can be end to end at the network level, or the data files containing PHI can be encrypted. This requirement pertains to any type of PHI or PI in motion such as website access, file transfer, and E-Mail.

  • No Transmission Delivery Service The execution of this Agreement does not constitute a request for, nor agreement to provide, any Transmission Service under the NYISO OATT, and does not convey any right to deliver electricity to any specific customer or Point of Delivery. If Developer wishes to obtain Transmission Service on the New York State Transmission System, then Developer must request such Transmission Service in accordance with the provisions of the NYISO OATT.

  • NYISO and Connecting Transmission Owner Obligations Connecting Transmission Owner and NYISO shall cause the New York State Transmission System and the Connecting Transmission Owner’s Attachment Facilities to be operated, maintained and controlled in a safe and reliable manner in accordance with this Agreement and the NYISO Tariffs. Connecting Transmission Owner and NYISO may provide operating instructions to Developer consistent with this Agreement, NYISO procedures and Connecting Transmission Owner’s operating protocols and procedures as they may change from time to time. Connecting Transmission Owner and NYISO will consider changes to their respective operating protocols and procedures proposed by Developer.

  • Connecting Transmission Owner’s Attachment Facilities Connecting Transmission Owner shall design, procure, construct, install, own and/or control the Connecting Transmission Owner’s Attachment Facilities described in Appendix A hereto, at the sole expense of the Developer.

  • Loop Transmission Types 3.1 Subject to the conditions set forth in Section 1 of this Attachment, Verizon shall allow CBB to access Loops unbundled from local switching and local transport, in accordance with this Section 3 and the rates and charges provided in the Pricing Attachment. Verizon shall allow CBB access to Loops in accordance with, but only to extent required by, Applicable Law. The available Loop types are as set forth below:

  • Transmission The Custodian and the Fund shall comply with SWIFT’s authentication procedures. The Custodian will act on FT Instructions received via SWIFT provided the instruction is authenticated by the SWIFT system. § Written Instructions. Instructions may be transmitted in an original writing that bears the manual signature of an Authorized Person(s).

  • Transmission Delivery Service Implications Under ER Interconnection Service, Interconnection Customer will be eligible to inject power from the Generating Facility into and deliver power across the Transmission System on an “as available” basis up to the amount of MW identified in the applicable stability and steady state studies to the extent the upgrades initially required to qualify for ER Interconnection Service have been constructed. After that date FERC makes effective MISO’s Energy Market Tariff filed in Docket No. ER04-691-000, Interconnection Customer may place a bid to sell into the market up to the maximum identified Generating Facility output, subject to any conditions specified in the Interconnection Service approval, and the Generating Facility will be dispatched to the extent the Interconnection Customer’s bid clears. In all other instances, no transmission or other delivery service from the Generating Facility is assured, but Interconnection Customer may obtain Point-To-Point Transmission Service, Network Integration Transmission Service or be used for secondary network transmission service, pursuant to the Tariff, up to the maximum output identified in the stability and steady state studies. In those instances, in order for Interconnection Customer to obtain the right to deliver or inject energy beyond the Point of Interconnection or to improve its ability to do so, transmission delivery service must be obtained pursuant to the provisions of the Tariff. The Interconnection Customer’s ability to inject its Generating Facility output beyond the Point of Interconnection, therefore, will depend on the existing capacity of the Transmission or Distribution System as applicable, at such time as a Transmission Service request is made that would accommodate such delivery. The provision of Firm Point-To-Point Transmission Service or Network Integration Transmission Service may require the construction of additional Network or Distribution Upgrades.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!