Data Transmission Control Except as necessary for the provision of the Cloud Services in accordance with the Agreement, Personal Data must not be read, copied, modified or removed without authorization during transfer. Where data carriers are physically transported, adequate measures are implemented at SAP to provide the agreed-upon service levels (for example, encryption and lead-lined containers). Measures: • Personal Data in transfer over SAP internal networks is protected according to SAP Security Policy. • When data is transferred between SAP and its customers, the protection measures for the transferred Personal Data are mutually agreed upon and made part of the relevant agreement. This applies to both physical and network based data transfer. In any case, the Customer assumes responsibility for any data transfer once it is outside of SAP-controlled systems (e.g. data being transmitted outside the firewall of the SAP Data Center).
Transmission Charge The cost for transporting electricity from the generation source to your electric distribution company. For most electric customers who select a new supplier, transmission costs will be included in the charges from your new supplier. The Federal Energy Regulatory Commission regulates retail transmission prices and services. This charge will vary with your source of supply.
Data Transmission The procedures for transmitting load obligation data to PJM for DS Supplier’s DS Load shall be as set forth by PJM.
Transmission Credits No later than thirty (30) days prior to the Commercial Operation Date, the Interconnection Customer may make a one-time election by written notice to the CAISO and the Participating TO to receive Congestion Revenue Rights as defined in and as available under the CAISO Tariff at the time of the election in accordance with the CAISO Tariff, in lieu of a refund of the cost of Network Upgrades in accordance with Article 11.4.1.
Transmission encryption All data transmissions of County PHI or PI outside the secure internal network must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as AES. Encryption can be end to end at the network level, or the data files containing PHI can be encrypted. This requirement pertains to any type of PHI or PI in motion such as website access, file transfer, and E-Mail.
Transmission Service Point-To-Point Transmission Service provided under Part II of the Tariff on a firm and non-firm basis.
Transmission The Custodian and the Fund shall comply with SWIFT’s authentication procedures. The Custodian will act on FT Instructions received via SWIFT provided the instruction is authenticated by the SWIFT system. § Written Instructions. Instructions may be transmitted in an original writing that bears the manual signature of an Authorized Person(s).
Interoffice Transmission Facilities BellSouth shall provide nondiscriminatory access, in accordance with FCC Rule 51.311 and Section 251(c)(3) of the Act, to interoffice transmission facilities on an unbundled basis to Al-Call for the provision of a munications service.