Email transmission of CUI Sample Clauses

Email transmission of CUI. The Contractor shall ensure that when transmitting CUI, over non-secure e- mail (e.g. not connected to the NMCI network through Broadband Unclassified Remote Access System/Virtual Private Network (VPN)), those transmissions are encrypted using DoD PKI IAW DoDINST 8520.2 Public Key Infrastructure (PKI) and Public Key (PK) Enabling.
AutoNDA by SimpleDocs

Related to Email transmission of CUI

  • Data Transmission The procedures for transmitting load obligation data to PJM for DS Supplier’s DS Load shall be as set forth by PJM.

  • Transmission of business Where a business is transmitted from one employer to another, as set out in clause 4.4 - Redundancy, the period of continuous service that the employee had with the transmittor or any prior transmittor is deemed to be service with the transmittee and taken into account when calculating notice of termination. However, an employee shall not be entitled to notice of termination or payment in lieu of notice for any period of continuous service in respect of which notice has already been given or paid for.

  • Transmission of Data Customer understands that the technical processing and transmission of Customer’s Electronic Communications is fundamentally necessary to use of the Cloud Service. Customer is responsible for securing DSL, cable or another high speed Internet connection and up-to-date “browser” software in order to utilize the Cloud Service. Customer expressly consents to Oracle’s interception and storage of Electronic Communications and/or Customer Data as needed to provide the Services hereunder, and Customer acknowledges and understands that Customer’s Electronic Communications will involve transmission over the Internet, and over various networks, only part of which may be owned and/or operated by Oracle. Customer further acknowledges and understands that Electronic Communications may be accessed by unauthorized parties when communicated across the Internet, network communications facilities, telephone or other electronic means. Without limiting Oracle’s applicable obligations under the Security or Confidentiality Sections of this Agreement, Oracle is not responsible for any Electronic Communications and/or Customer Data which are delayed, lost, altered, intercepted or stored during the transmission of any data whatsoever across networks not owned and/or operated by Oracle, including, but not limited to, the Internet and Customer’s local network.

  • Transmission The Custodian and the Fund shall comply with SWIFT’s authentication procedures. The Custodian will act on FT Instructions received via SWIFT provided the instruction is authenticated by the SWIFT system. § Written Instructions. Instructions may be transmitted in an original writing that bears the manual signature of an Authorized Person(s).

  • Loop Transmission Types 3.1 Subject to the conditions set forth in Section 1 of this Attachment, Verizon shall allow CBB to access Loops unbundled from local switching and local transport, in accordance with this Section 3 and the rates and charges provided in the Pricing Attachment. Verizon shall allow CBB access to Loops in accordance with, but only to extent required by, Applicable Law. The available Loop types are as set forth below:

  • Facsimile Transmission A FT Instruction transmitted to the Custodian by facsimile transmission must be transmitted by the Fund to a telephone number specified from time to time by the Custodian for such purposes. The Custodian will then follow one of the procedures below:

  • Data Transmission Control Except as necessary for the provision of the Cloud Services in accordance with the Agreement, Personal Data must not be read, copied, modified or removed without authorization during transfer. Where data carriers are physically transported, adequate measures are implemented at SAP to provide the agreed-upon service levels (for example, encryption and lead-lined containers). Measures: • Personal Data in transfer over SAP internal networks is protected according to SAP Security Policy. • When data is transferred between SAP and its customers, the protection measures for the transferred Personal Data are mutually agreed upon and made part of the relevant agreement. This applies to both physical and network based data transfer. In any case, the Customer assumes responsibility for any data transfer once it is outside of SAP-controlled systems (e.g. data being transmitted outside the firewall of the SAP Data Center).

  • Transmisión A. El Software Apple adquirido en la Mac App Store no es transferible. Si vende su hardware de marca Apple a un xxxxxxx, xxxxx xxxxxx quitar el Software Apple del mismo.

  • Transmission encryption All data transmissions of County PHI or PI outside the secure internal network must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as AES. Encryption can be end to end at the network level, or the data files containing PHI can be encrypted. This requirement pertains to any type of PHI or PI in motion such as website access, file transfer, and E-Mail.

  • Errors in Transmission By using the Services you accept the risk that an item may be intercepted or misdirected during transmission. The Bank bears no liability to you or others for any such intercepted or misdirected items or information disclosed through such errors.

Time is Money Join Law Insider Premium to draft better contracts faster.