Breach of the Security of the Information System definition

Breach of the Security of the Information System means the unauthorized acquisition, including, but not limited to, access to, use, disclosure, modification or destruction, of unencrypted computerized data that materially compromises the security, confidentiality, or integrity of personal information maintained by or on behalf of the County. Good faith acquisition of personal information by an employee or agent of the information holder for the purposes of the information holder is not a breach of the security of the system; provided, that the personal information is not used or subject to further unauthorized disclosure.

Examples of Breach of the Security of the Information System in a sentence

  • Breach of the Security of the Information System means the unauthorized acquisition, including, but not limited to, access to, use, disclosure, modification or destruction, of unencrypted computerized data that materially compromises the security, confidentiality, or integrity of personal information maintained by or on behalf of the County.

  • Breach of the Security of the Information System means the unauthorized acquisition, including, but not limited to, access to, use, disclosure, modification or destruction, of unencrypted computerized data that materially compromises the security, confidentiality, or integrity of personal information maintained by or on behalf of the CAP Xxxxxx JPA.

Related to Breach of the Security of the Information System

  • Breach of the security of the system means unauthorized acquisition or acquisition without valid authorization of physical or computerized data which compromises the security, confidentiality, or integrity of personal information maintained by the district. Good faith acquisition of personal information by an officer or employee or agent of the district for the purposes of the district is not a breach of the security of the system, provided that the private information is not used or subject to unauthorized disclosure.

  • Criminal justice information system means a system including the equipment, facilities, procedures,

  • Contractor information system means an information system belonging to, or operated by or for, the Contractor.

  • Breach of system security means unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of sensitive personal information maintained by a person, including data that is encrypted if the person accessing the data has the key required to decrypt the data. Good faith acquisition of sensitive personal information by an employee or agent of the person for the purposes of the person is not a breach of system security unless the person uses or discloses the sensitive personal information in an unauthorized manner. Business and Commerce Code 521.053(a)

  • Geographic information system or “GIS” means a system designed to capture, store, manipulate, analyze, manage, and present spatial or geographical data.

  • Customer information systems means any methods used to access, collect, store, use, transmit, protect, or dispose of customer in- formation.

  • Insurance Information means the insurance information required by the Access Provider pursuant to Clause 5(b)(xi) hereof.

  • Information system means a discrete set of information resources organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of information (44 U.S.C. 3502).

  • Security Information means account numbers and/or Username as applicable, passwords and other information required to identify you for the purposes of you trading with us under this Agreement.

  • Information Security Breach means the unauthorized acquisition, access, use, disclosure, transmittal, storage or transportation of Confidential Information which is not permitted by law or by the terms of this Amendment, including, but not limited to, a Security Incident.

  • Breach of trust means a breach of any duty imposed on a trustee by this Act or by the terms of the trust;

  • Covered contractor information system means an information system that is owned or operated by a contractor that processes, stores, or transmits Federal contract information.

  • Security Vulnerability means a flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in a security breach such that data is compromised, manipulated or stolen or the system damaged.

  • Information Systems means all computer hardware, databases and data storage systems, computer, data, database and communications networks (other than the Internet), architecture interfaces and firewalls (whether for data, voice, video or other media access, transmission or reception) and other apparatus used to create, store, transmit, exchange or receive information in any form.

  • Information Service Traffic Traffic delivered to or from an Information Service Provider for the provision of Information Service. ISP-Bound Traffic is a subset of Information Service Traffic. Inside Wire or Inside Wiring: Wiring within the customer Premises that extends to the Demarcation Point of CenturyLink’s outside plant. Inside Wire is owned or controlled by the End User (unless otherwise specified herein or under Applicable Law).

  • National Security Information means information that has been determined pursuant to Executive Order 13526 or any predecessor order to require protection against unauthorized disclosure and is marked to indicate its classified status when in documentary form. Classified or national security information is specifically authorized to be protected from unauthorized disclosure in the interest of national defense or foreign policy under an Executive Order or Act of Congress.

  • Service Information means information concerning the Services provided by the Contractor to the Authority in accordance with Clause 32.1 for inclusion in the Authority's catalogue and/or any Beneficiary's catalogue from time to time;

  • Data Tape Information The information provided by the Originators as of the Cut-off Date to the Depositor or the Purchaser setting forth the following information with respect to each Mortgage Loan: (1) the Mortgagor's name; (2) as to each Mortgage Loan, the Scheduled Principal Balance as of the Cut-off Date; (3) the Mortgage Rate Cap; (4) the Index; (5) a code indicating whether the Mortgaged Property is owner occupied; (6) the type of Mortgaged Property; (7) the first date on which the Scheduled Payment was due on the Mortgage Loan and, if such date is not consistent with the Due Date currently in effect, such Due Date; (8) the "paid through date" based on payments received from the related Mortgagor;

  • Patient Information means information (however recorded) which—

  • Due Diligence Information means any information supplied to the Supplier by or on behalf of the Customer prior to the Call Off Commencement Date;

  • Confidential System Information means any communication or record (whether oral, written, electronically stored or transmitted, or in any other form) provided to or made available to Grantee; or that Grantee may create, receive, maintain, use, disclose or have access to on behalf of HHSC or through performance of the Project, which is not designated as Confidential Information in a Data Use Agreement.

  • Personal Information Breach means an instance where an unauthorized person or entity accesses Personal Information in any manner, including but not limited to the following occurrences: (1) any Personal Information that is not encrypted or protected is misplaced, lost, stolen or in any way compromised; (2) one or more third parties have had access to or taken control or possession of any Personal Information that is not encrypted or protected without prior written authorization from the State; (3) the unauthorized acquisition of encrypted or protected Personal Information together with the confidential process or key that is capable of compromising the integrity of the Personal Information; or (4) if there is a substantial risk of identity theft or fraud to the client, the Contractor, the Department or State.

  • network and information system have the meaning set forth in OAR 407-014-0305, as such rule may be revised from time to time.

  • Access Information means information that alone or together with other information, can provide access to any portion of Your Account, including but not limited to, Your Account number, login names, passwords, credit card or other financial information, security questions and their respective answers, and any other similar information. For the avoidance of doubt, Your Access Information will include any similar information for each of Your Users.

  • Client Information means any data, information, software or other materials that you provide to Red Hat under the Agreement.

  • Statement of Additional Information means, respectively, the form of prospectus and statement of additional information with respect to the Fund filed by the Investment Company as part of the Registration Statement, or as they may be amended or supplemented from time to time.