Transmission encryption All data transmissions of County PHI or PI outside the secure internal network must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as AES. Encryption can be end to end at the network level, or the data files containing PHI can be encrypted. This requirement pertains to any type of PHI or PI in motion such as website access, file transfer, and E-Mail.
Transmission The Custodian and the Fund shall comply with SWIFT’s authentication procedures. The Custodian will act on FT Instructions received via SWIFT provided the instruction is authenticated by the SWIFT system. § Written Instructions. Instructions may be transmitted in an original writing that bears the manual signature of an Authorized Person(s).
Data Transmission The procedures for transmitting load obligation data to PJM for DS Supplier’s DS Load shall be as set forth by PJM.
Information Transmission The Provider, on behalf of itself and its respective Subsidiaries, shall use commercially reasonable efforts to provide or make available, or cause to be provided or made available, to the Recipient, in accordance with Section 6.1 of the Separation and Distribution Agreement, any Information received or computed by the Provider for the benefit of the Recipient concerning the relevant Service during the Service Period; provided, however, that, except as otherwise agreed to in writing by the Parties (a) the Provider shall not have any obligation to provide, or cause to be provided, Information in any non-standard format, (b) the Provider and its Subsidiaries shall be reimbursed for their reasonable costs in accordance with Section 6.3 of the Separation and Distribution Agreement for creating, gathering, copying, transporting and otherwise providing such Information, and (c) the Provider shall use commercially reasonable efforts to maintain any such Information in accordance with Section 6.4 of the Separation and Distribution Agreement.
Data Transmission Control Except as necessary for the provision of the Cloud Services in accordance with the Agreement, Personal Data must not be read, copied, modified or removed without authorization during transfer. Where data carriers are physically transported, adequate measures are implemented at SAP to provide the agreed-upon service levels (for example, encryption and lead-lined containers).
Regional and Local Transmission The prices quoted in Exhibit A do not include current and future charges for distribution service costs collected by the Local Distributor under its distribution service tariff or local transmission costs as may be imposed by the regional power pool, ISO-NE, or individual electric utilities that have FERC transmission tariffs. Its Competitive Supplier understands that these costs will be collected by the Local Distributor. If, in the future, Competitive Supplier becomes responsible for such distribution or transmission costs, Competitive Supplier shall be entitled to collect such costs from Participating Consumers to the extent permitted by any Governmental Rules. These costs are “pass through” costs as determined by the appropriate regulatory agencies.
Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.
Transmission Charge The cost for transporting electricity from the generation source to your electric distribution company. For most electric customers who select a new supplier, transmission costs will be included in the charges from your new supplier. The Federal Energy Regulatory Commission regulates retail transmission prices and services. This charge will vary with your source of supply.
Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.
Transmission of business Where a business is transmitted from one employer to another, as set out in clause 4.4 - Redundancy, the period of continuous service that the employee had with the transmittor or any prior transmittor is deemed to be service with the transmittee and taken into account when calculating notice of termination. However, an employee shall not be entitled to notice of termination or payment in lieu of notice for any period of continuous service in respect of which notice has already been given or paid for.