Secure Transmission Clause Samples

The Secure Transmission clause requires that all data exchanged between parties is transmitted using secure methods to protect against unauthorized access or interception. Typically, this involves the use of encryption protocols such as SSL/TLS for online communications or secure file transfer systems for sensitive documents. By mandating secure channels for data transmission, the clause helps safeguard confidential information and reduces the risk of data breaches during electronic communications.
POPULAR SAMPLE Copied 1 times
Secure Transmission. The parties will always transmit information to each other in a secure and confidential fashion. Electronic information will usually be transmitted via the gsi network. Electronic information will always be encrypted or password protected when in transit between the parties. Paper documents and removable digital media, shall be sent by secure courier, using a recorded delivery service. • Liaison arrangements The case-specific protocol will build on the matters agreed in this Memorandum. Where co-ordinated investigations or joint regulatory actions generate media interest, both parties will liaise with each other and agree in advance, before it is made, the content of any statement that is to be made to the media.
Secure Transmission. Contractor shall provide any and all information systems security findings, recommendations, and work materials via a secure file transfer method accessible by the City.
Secure Transmission. Business Associate will only transmit Personally Identifiable Information, Protected Health Information, and other confidential or sensitive data by secure transmission that must implement encryption products that have been validated under the Cryptographic Module Validation Program (see ▇▇▇▇://▇▇▇▇.▇▇▇▇.▇▇▇/groups/STM/cmvp/validation.html ) to confirm compliance with current and successor FIPS cryptology requirements as they are made final, in accordance with applicable federal laws, directives, policies, regulations, and standards. For example, FIPS 140-2 Level 4 is the current requirement and Business Associate will comply with its successor publications when made final. Covered Entity will not provide additional hardware or software to Business Associate for this purpose, nor will Covered Entity accept any Business Associate provided hardware/software.
Secure Transmission. Asking questions about this policy
Secure Transmission. Two parties sharing a κ-bit perfect SK K seek to exchange a message M securely.16 To this end, they communicate interactively using a communication F, and based on this communication the second party forms an estimate Mˆ of the first party’s message M . This protocol accomplishes (ϵ, δ)-secure transmission if P M = Mˆ ≥ 1 − ϵ, 1 PMF − PM × PF ≤ δ. The classic result of ▇▇▇▇▇▇▇ [30] implies that (0, 0)-secure transmission is fea- sible only if κ is at least log M , where M denotes the size of the message space.17 But, can we relax this constraint for ϵ, δ > 0? In this example, we will give a necessary condition for the feasibility of (ϵ, δ)-secure transmission by relating it to the previous example. Specifically, let the observations of the two parties consist of X1 = (M, K), X2 = K. Then, (ϵ, δ)-secure transmission of M is tantamount to securely com- puting the function g(X1, X2) = M . Therefore, using (21), (ϵ, δ)-secure trans- mission of M is feasible only if min
Secure Transmission. Once authenticated to the system, all data requests from the application interface are validated with a secure key before data is transmitted. All data is transmitted through encrypted, SSL connections.

Related to Secure Transmission

  • Transmission encryption All data transmissions of County PHI or PI outside the secure internal network must be encrypted using a FIPS 140-2 certified algorithm which is 128-bit or higher, such as AES. Encryption can be end to end at the network level, or the data files containing PHI can be encrypted. This requirement pertains to any type of PHI or PI in motion such as website access, file transfer, and E-Mail.

  • Data Transmission The procedures for transmitting load obligation data to PJM for DS Supplier’s DS Load shall be as set forth by PJM.

  • Information Transmission The Provider, on behalf of itself and its respective Subsidiaries, shall use commercially reasonable efforts to provide or make available, or cause to be provided or made available, to the Recipient, in accordance with Section 6.1 of the Separation and Distribution Agreement, any Information received or computed by the Provider for the benefit of the Recipient concerning the relevant Service during the Service Period; provided, however, that, except as otherwise agreed to in writing by the Parties (a) the Provider shall not have any obligation to provide, or cause to be provided, Information in any non-standard format, (b) the Provider and its Subsidiaries shall be reimbursed for their reasonable costs in accordance with Section 6.3 of the Separation and Distribution Agreement for creating, gathering, copying, transporting and otherwise providing such Information, and (c) the Provider shall use commercially reasonable efforts to maintain any such Information in accordance with Section 6.4 of the Separation and Distribution Agreement.

  • Transmission The Custodian and the Fund shall comply with SWIFT’s authentication procedures. The Custodian will act on FT Instructions received via SWIFT provided the instruction is authenticated by the SWIFT system. § Written Instructions. Instructions may be transmitted in an original writing that bears the manual signature of an Authorized Person(s).

  • No Transmission Delivery Service The execution of this Agreement does not constitute a request for, nor agreement to provide, any Transmission Service under the NYISO OATT, and does not convey any right to deliver electricity to any specific customer or Point of Delivery. If Developer wishes to obtain Transmission Service on the New York State Transmission System, then Developer must request such Transmission Service in accordance with the provisions of the NYISO OATT.