Transmission The Custodian and the Fund shall comply with SWIFT’s authentication procedures. The Custodian will act on FT Instructions received via SWIFT provided the instruction is authenticated by the SWIFT system. § Written Instructions. Instructions may be transmitted in an original writing that bears the manual signature of an Authorized Person(s).
Data Transmission The procedures for transmitting load obligation data to PJM for DS Supplier’s DS Load shall be as set forth by PJM.
Facsimile Transmission A FT Instruction transmitted to the Custodian by facsimile transmission must be transmitted by the Fund to a telephone number specified from time to time by the Custodian for such purposes. The Custodian will then follow one of the procedures below:
Merchant Transmission Facilities “Controllable A.C. Merchant Transmission Facilities” shall mean transmission facilities that (1) employ technology which Transmission Provider reviews and verifies will permit control of the amount and/or direction of power flow on such facilities to such extent as to effectively enable the controllable facilities to be operated as if they were direct current transmission facilities, and
Electronic Transmission For purposes of these Bylaws, “electronic transmission” means any form of communication, not directly involving the physical transmission of paper, that creates a record that may be retained, retrieved, and reviewed by a recipient thereof, and that may be directly reproduced in paper form by such a recipient through an automated process.
Transmission Control In-transit: We make HTTPS encryption (also referred to as SSL or TLS) available on every one of its login interfaces and for free on every customer site hosted on the HubSpot products. Our HTTPS implementation uses industry standard algorithms and certificates. At-rest: We store user passwords following policies that follow industry standard practices for security. We have implemented technologies to ensure that stored data is encrypted at rest.
Electronic Transmissions (a) Each of the Agent, the Credit Parties, the Lenders, and each of their Affiliates is authorized (but not required) to transmit, post or otherwise make or communicate, in its sole discretion, Electronic Transmissions in connection with any Loan Document and the transactions contemplated therein. The Borrower and each other Credit Party hereby acknowledges and agrees that the use of Electronic Transmissions is not necessarily secure and that there are risks associated with such use, including risks of interception, disclosure and abuse and each indicates it assumes and accepts such risks by hereby authorizing the transmission of Electronic Transmissions.
No Transmission Delivery Service The execution of this Agreement does not constitute a request for, nor agreement to provide, any Transmission Service under the NYISO OATT, and does not convey any right to deliver electricity to any specific customer or Point of Delivery. If Developer wishes to obtain Transmission Service on the New York State Transmission System, then Developer must request such Transmission Service in accordance with the provisions of the NYISO OATT.
Transmission encryption All data transmissions of County PHI or PI outside the secure internal network must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as AES. Encryption can be end to end at the network level, or the data files containing PHI can be encrypted. This requirement pertains to any type of PHI or PI in motion such as website access, file transfer, and E-Mail.
Data Transmission Control Except as necessary for the provision of the Cloud Services in accordance with the Agreement, Personal Data must not be read, copied, modified or removed without authorization during transfer. Where data carriers are physically transported, adequate measures are implemented at SAP to provide the agreed-upon service levels (for example, encryption and lead-lined containers). Measures: • Personal Data in transfer over SAP internal networks is protected according to SAP Security Policy. • When data is transferred between SAP and its customers, the protection measures for the transferred Personal Data are mutually agreed upon and made part of the relevant agreement. This applies to both physical and network based data transfer. In any case, the Customer assumes responsibility for any data transfer once it is outside of SAP-controlled systems (e.g. data being transmitted outside the firewall of the SAP Data Center).