State Data Transmission Sample Clauses

State Data Transmission. Contractor agrees that any and all transmission or exchange of system application data with DTS and State of Utah and/or any other parties expressly designated by the State of Utah, shall take place via secure means (ex. HTTPS or FTPS).
AutoNDA by SimpleDocs
State Data Transmission. Contractor agrees that any and all transmission or exchange of system application data with the State Entity shall take place via secure means (ex. HTTPS or FTPS).
State Data Transmission. Contractor agrees that any and all transmission or exchange of system application data with DTS and State of Utah and/or any other parties expressly designated by the State of Utah, shall take place via secure means (ex. HTTPS or FTPS). State Data Storage: Contractor agrees that all State Data will be stored and maintained in data centers in the United States. Contractor agrees that no State Data at any time will be processed on or transferred to any portable or laptop computing device or any portable storage medium, except for devices that are used and kept only at Contractor’s United States data centers, unless such medium is part of the Contractor's designated backup and recovery process. Contractor shall permit its employees and Subcontractors to access non-State Data remotely only as required to provide technical support. Contractor may provide technical user support on a 24/7 basis using a Follow the Sun model, unless otherwise prohibited by this contract. State Data Encryption: Contractor agrees to store all data provided to Contractor, including State, as part of its designated backup and recovery process in encrypted form, using no less than 128 bit key. Password Protection: Contractor agrees that any portable or laptop computer that has access to DTS or State of Utah network, or stores any non-public State of Utah data is equipped with strong and secure password protection. State Data Re-Use: Contractor agrees that any and all data exchanged shall be used expressly and solely for the purpose enumerated in this Contract. Contractor further agrees that no State Data of any kind shall be transmitted, exchanged, or otherwise passed to other Contractors or interested parties except on a case-by-case basis as specifically agreed to in writing by DTS.

Related to State Data Transmission

  • Data Transmission The procedures for transmitting load obligation data to PJM for DS Supplier’s DS Load shall be as set forth by PJM.

  • Data Transmission Control Except as necessary for the provision of the Cloud Services in accordance with the Agreement, Personal Data must not be read, copied, modified or removed without authorization during transfer. Where data carriers are physically transported, adequate measures are implemented at SAP to provide the agreed-upon service levels (for example, encryption and lead-lined containers). Measures: • Personal Data in transfer over SAP internal networks is protected according to SAP Security Policy. • When data is transferred between SAP and its customers, the protection measures for the transferred Personal Data are mutually agreed upon and made part of the relevant agreement. This applies to both physical and network based data transfer. In any case, the Customer assumes responsibility for any data transfer once it is outside of SAP-controlled systems (e.g. data being transmitted outside the firewall of the SAP Data Center).

  • Transmission The Custodian and the Fund shall comply with SWIFT’s authentication procedures. The Custodian will act on FT Instructions received via SWIFT provided the instruction is authenticated by the SWIFT system. § Written Instructions. Instructions may be transmitted in an original writing that bears the manual signature of an Authorized Person(s).

  • Transmission encryption All data transmissions of County PHI or PI outside the secure internal network must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as AES. Encryption can be end to end at the network level, or the data files containing PHI can be encrypted. This requirement pertains to any type of PHI or PI in motion such as website access, file transfer, and E-Mail.

  • Transmission Control In-transit: We make HTTPS encryption (also referred to as SSL or TLS) available on every one of its login interfaces and for free on every customer site hosted on the HubSpot products. Our HTTPS implementation uses industry standard algorithms and certificates. At-rest: We store user passwords following policies that follow industry standard practices for security. We have implemented technologies to ensure that stored data is encrypted at rest.

  • Transmissions 10.1. Personal Data transmitted by the Data Processor in connection with the Service through the Internet shall be reasonably encrypted. The Parties acknowledge, however, that the security of transmissions over the Internet cannot be guaranteed. The Data Processor will not be responsible for Data Controller’s access to the Internet, for any interception or interruption of any communications through the Internet, or for changes to or losses of Personal Data through the Internet.

  • Facsimile Transmission A FT Instruction transmitted to the Custodian by facsimile transmission must be transmitted by the Fund to a telephone number specified from time to time by the Custodian for such purposes. The Custodian will then follow one of the procedures below:

  • Regional and Local Transmission The prices quoted in Exhibit A do not include current and future charges for distribution service costs collected by the Local Distributor under its distribution service tariff or local transmission costs as may be imposed by the regional power pool, ISO-NE, or individual electric utilities that have FERC transmission tariffs. Its Competitive Supplier understands that these costs will be collected by the Local Distributor. If, in the future, Competitive Supplier becomes responsible for such distribution or transmission costs, Competitive Supplier shall be entitled to collect such costs from Participating Consumers to the extent permitted by any Governmental Rules. These costs are “pass through” costs as determined by the appropriate regulatory agencies.

  • Transmisión A. El Software Apple adquirido en la Mac App Store no es transferible. Si vende su hardware de marca Apple a un xxxxxxx, xxxxx xxxxxx quitar el Software Apple del mismo.

  • Loop Transmission Types 3.1 Subject to the conditions set forth in Section 1 of this Attachment, Verizon shall allow CBB to access Loops unbundled from local switching and local transport, in accordance with this Section 3 and the rates and charges provided in the Pricing Attachment. Verizon shall allow CBB access to Loops in accordance with, but only to extent required by, Applicable Law. The available Loop types are as set forth below:

Time is Money Join Law Insider Premium to draft better contracts faster.