Archiving Policy definition

Archiving Policy means the Service Provider's archiving policy, as agreed pursuant to Clause 13.6;
Archiving Policy means the Service Provider's archiving policy, as agreed pursuant to Clause 13.6; AT Link means the IT System used as at the Commencement Date for the daily balancing of gas transportation within the transmission system and any modification, enhancement or successor system; Authority means the Gas and Electricity Markets Authority established under Section 1 of the Utilities Xxx 0000; Business Continuity Incident means an interruption to business critical activities through major procedure failure or disaster; Business Continuity Plan means the plan detailing the procedures to be implemented in the event of a Business Continuity Incident in accordance with Schedule 3; Business Day means a day (other than a Saturday or a Sunday) on which banks are open in London, England for the transaction of general business; Business Evaluation means the process set out in Schedule 10; Business Evaluation Order means the business evaluation order described as such in Schedule 10; Business Evaluation Report means the business evaluation report described as such in Schedule 10; Change means the addition to, variation of, or removal of any of the Services and/or the Performance Indicators (including change to IT Systems); Change Authorisation means the Change authorisation described as such in Schedule 10;

Examples of Archiving Policy in a sentence

  • An incident log is kept and completed by the responsible person / data protection lead Archiving Policy and Retention Schedule The aim of the archive and retention policy is to enable the Shiva Trust to have the appropriate management of records to support the organisation in making decisions.

  • CPCAB Archiving Policy (available on request) explains the retention periods for assessment material and the rationale behind the decisions.

  • It will build upon the progress made during the last MTSP period in implementing the Records Management and Archiving Policy of 2012/13, which included the successful upgrade of the software used for records management and archiving to achieve better solutions for the archiving of documents of different Sectors, improved system compatibilities, and meeting business continuity requirements.

  • Step 9: The checker shall follow the CDOT Bridge Rating Archiving Policy Memo before submitting the rating package to the Bridge Rating Unit.The foregoing applies to off-system structures except for the review panel in step 7, the color code in step 6 and step 9.

  • This policy has been created within the context of the following documents: • Executive Order No. 18: E-mail Retention and Archiving Policy (issued July 7, 2009) • General Schedule for State Agency Records (issued August 31, 2006) (http://www.records.ncdcr.gov/schedules/GS_Amendments2006.pdf) • North Carolina General Statutes (http://www.ncleg.net/gascripts/statutes/Statutes.asp)o §14-113.20.

  • UIDAI agreed (October 2020) with the audit recommendation and assured to work towards framing a suitable Data Archiving Policy.

  • Automatic Deletion or Archiving Policy NetGovern Archive Server90 Days Optional implementation to facilitate transition or support existing archivesPersonal Archive365 Days Information overlap for global searching and item recoveryOnline Corporate ArchiveX Days X Years Secondary Archives (Nearline/Offline)X YearsDeletion On the following pages, you’ll find a copy of the NetGovern Email Policy.

  • MCRF Archiving Policy and System UpdateThe MCRF-wide Archiving Policy and Archive Manager Database are currently under development by the Office of Research Compliance and BIRC, respectively, with an anticipated go-live date of January 1, 2017.

  • They have encouraged data stewardship through SSHRC’s Research Data Archiving Policy (1990), and data sharing provisions for CIHR grant holders in the Tri-Agency Open Access Policy on Publications (2015).

  • The following working draft documents were appended to the report:- Information Governance Policy; Information Governance Strategy; Encryption Policy; Encryption Strategy; Email Archiving Policy; Data Quality Policy; Data Quality Strategy; Freedom of Information Policy; and Data Protection Policy.

Related to Archiving Policy

  • Insider Trading Policy means the written policy of the Company pertaining to the purchase, sale, transfer or other disposition of the Company’s equity securities by Directors, Officers, Employees or other service providers who may possess material, nonpublic information regarding the Company or its securities.

  • Trading Policy means the Company’s policy permitting certain individuals to sell Company shares only during certain “window” periods and/or otherwise restricts the ability of certain individuals to transfer or encumber Company shares, as in effect from time to time.

  • Accounting Policies means the accounting policies and procedures set out in Part C of Schedule 4 (Accounting Policies);

  • Privacy Policies means all published, posted and written internal policies, procedures, agreements and notices with respect to the Company’s collection, use, storage, disclosure, or cross-border transfer of Personal Data.

  • Operations Manual means a manual containing procedures, instructions and guidance for use by operational personnel in the execution of their duties;

  • 2%/25% Guidelines has the meaning set forth in Section 13.

  • Policies and Procedures means the written policies and procedures of the Client in any way related to the Services, including any such policies and procedures contained in the Organic Documents and the Offering Documents.

  • Encrypted means the transformation of data into a form which results in a low probability of assigning meaning without the use of a protective process or key.

  • DWP Offshoring Policy means the Authority’s policy and procedures as advised to the Contractor by the Authority from time to time.

  • Safeguards Monitoring Report means each report prepared and submitted by the Borrower to ADB that describes progress with implementation of and compliance with the EMP and the RP, including any corrective and preventative actions;

  • Program Guidelines means any and all GLO-approved documents reflecting specific rules and regulations governing the implementation of the Program.

  • Company Privacy Policies means all current and, to the extent applicable, prior public or internal policies, procedures and representations of the Company or its Subsidiaries to the extent relating to data security or the Processing of Personally Identifiable Information, including the Data Protection Program.

  • Safeguard Policy Statement or “SPS” means ADB's Safeguard Policy Statement (2009);

  • Privacy Policy means the terms which set out how we will deal with confidential and personal information received from you via the Website;

  • System Data means data and data elements collected by the SaaS Software, SaaS Service or Licensor’s computer systems regarding configuration, environment, usage, performance, vulnerabilities and security of the SaaS Software or SaaS Service that may be used to generate logs, statistics and reports regarding performance, availability, integrity and security of the SaaS Software.

  • Protocol means, in respect of any category of object and associated rights to which this Convention applies, the Protocol in respect of that category of object and associated rights;

  • Encrypt means to encode Confidential Information into a format that can only be read by those possessing a “key”; a password, digital certificate or other mechanism available only to authorized users. Encryption must use a key length of at least 256 bits for symmetric keys, or 2048 bits for asymmetric keys. When a symmetric key is used, the Advanced Encryption Standard (AES) must be used if available.

  • Information processing system means an electronic system for creating, generating, sending, receiving, storing, displaying, or processing information.

  • Customer Proprietary Network Information (“CPNI”) is as defined in the Act.

  • Project Operations Manual or “POM” means the Project Operations Manual referred to in Section I.B of Schedule 2 to this Agreement, as the said manual may be amended from time to time, with the prior written approval of the Bank, and such term includes any schedules to the POM.

  • Business association means a nonpublic corporation, joint stock company, investment company, business trust, partnership, or association for business purposes of 2 or more individuals, whether or not for profit, including a banking organization, financial organization, insurance company, or utility.

  • Electronic Subcontracting Reporting System (eSRS) means the Governmentwide, electronic, web-based system for small business subcontracting program reporting. The eSRS is located at http://www.esrs.gov.

  • Company Privacy Policy means each external or internal, past or present privacy policy of the Company, including any policy relating to (i) the privacy of users of the Company Products or of any Company Website, (ii) the collection, storage, disclosure, and transfer of any User Data or Personal Data, and (iii) any employee information.

  • ECB €STR Guideline means Guideline (EU) 2019/1265 of the European Central Bank of 10 July 2019 on the euro short-term rate (€STR) (ECB/2019/19), as amended from time to time;

  • Other Confidential Consumer Information The Contractor agrees to comply with the requirements of AHS Rule No. 08-048 concerning access to information. The Contractor agrees to comply with any applicable Vermont State Statute, including but not limited to 12 VSA §1612 and any applicable Board of Health confidentiality regulations. The Contractor shall ensure that all of its employees and subcontractors performing services under this agreement understand the sensitive nature of the information that they may have access to and sign an affirmation of understanding regarding the information’s confidential and non- public nature.

  • Encryption means methods of rendering personally identifiable information unusable, unreadable, or indecipherable to unauthorized persons through the use of a technology or methodology specified or permitted by the Secretary of the United States Department of Health and Human Services in guidance issued under 42 USC Section 17932(h)(2).