Cyber Security Laws definition

Cyber Security Laws means any Laws pertaining to the prevention and reporting of Cyber Security Incidents, including Cybersecurity Act of 2015 (P.L. 114-113), Cybersecurity Enhancement Act of 2014 (P.L. 113-2), Economic Espionage Act of 1996 (18 U.S.C. § 1030, §§ 1831-39).
Cyber Security Laws means any Laws pertaining to the prevention and reporting of Cyber Security Incidents, including Cybersecurity Act of 2015 (P.L. 114-113), Cybersecurity Enhancement Act of 2014 (P.L. 113-2), Economic Espionage Act of 1996 (18
Cyber Security Laws means all Applicable Laws concerning or otherwise relating to cyber, network and/or information security applicable to the Company’s business;

Examples of Cyber Security Laws in a sentence

  • The following replaces this clause: Each party will comply with all applicable laws and regulations, including, without limitation, the U.S. Foreign Corrupt Practices Act and the applicable anti-bribery laws and laws governing transactions with government and public entities, antitrust and competition laws, applicable xxxxxxx xxxxxxx, securities, and financial reporting laws, laws governing consumer transactions, laws regarding data privacy, and Cyber Security Laws.

  • EAN-13 is basically identical to UPC-A with the leading two digits representing the country code.

  • Health Plans and Cyber Security Laws The DOL has a longstanding interest in cybersecurity issues specifically for retirement plans.

  • The applicable laws, in particular the Cyber Security Laws and Regulations shall be referred to in the interpretation of this Cyber Security and Data Protection clause e.g. with regard to the definition and scope of personal information, important data, network product, network service as well as data cross-border transfer.

  • Recent action taken by China to pass Cyber Security Laws is a good example of the way governments around the world are introducing restrictions to trade and the free flow of data.

  • Finally, Korea requested that any sub-laws and other implementing measures related to the Cyber Security Laws which were established or revised, be notified to the WTO to allow time for comments from international stakeholders.The representative of the European Union referred to its comments made at previous TBT Committees and reiterated its concerns regarding the entry into force of the Cybersecurity Law on 1 June 2017.

  • Contractor will acquire, use, handle, collect, maintain, store, transmit, and safeguard Restricted Confidential Information in accordance with applicable Cyber Security Laws and applicable Privacy and Consumer Protection Laws.

  • Finally, Korea requested that any sub-laws and other implementing measures related to the Cyber Security Laws which were established or revised, be notified to the WTO to allow time for comments from international stakeholders.

  • Member for Hartlepool on behalf of his constituent, Mr McGovern.Mr David Gauke:Her Majesty’s Revenue and Customs (HMRC) gave a full response to the hon.

  • In case of Siemens to conduct a personal information protection impact assessment, the Supplier shall assist and cooperate with Siemens and make available to Siemens all necessary information to demonstrate the compliance with the obligations under the Cyber Security Laws and Regulations.

Related to Cyber Security Laws

  • Cyber security means the condition in which road vehicles and their functions are protected from cyber threats to electrical or electronic components.

  • Privacy and Security Laws means applicable Laws that govern the Processing, privacy or security of Personal Information.

  • Privacy/Data Security Laws means all Laws governing the receipt, collection, use, storage, processing, sharing, security, disclosure, or transfer of Personal Information and any applicable Laws concerning requirements for website and mobile application privacy policies and practices, call or electronic monitoring or recording or any outbound communications (including outbound calling and text messaging, telemarketing, and e-mail marketing).

  • Tender Security means the security required to be submitted by the Tenderer with its Tender Offer.

  • Cyber Security Incident means any malicious or suspicious event that disrupts, or was an attempt to disrupt, the operation of those programmable electronic devices and communications networks including hardware, software and data that are essential to the Reliable Operation of the Bulk Power System.++

  • Other Security means any security acceptable to the commissioner other than security meeting the definition of Primary Security.

  • Data Security Requirements means the following, in each case to the extent relating to any sensitive or confidential information, or any matters relating to data privacy, protection, or security or the access, collection, use, processing, storage, sharing, distribution, transfer, disclosure, destruction, or disposal of any personally identifiable information: (i) all applicable Laws and any related security breach notification requirements, (ii) the Conveyed Companies’ own respective rules, policies, and procedures, and (iii) Contracts to which the Conveyed Companies are bound.

  • Relevant Security means any share of Common Stock, any warrant to purchase shares of Common Stock or any other security of the Company or any other entity that is convertible into, or exercisable or exchangeable for, shares of Common Stock or any other equity security of the Company, in each case owned beneficially or otherwise by the undersigned on the date of closing of the Public Offering or acquired by the undersigned during the Lock-Up Period. The restrictions in the foregoing paragraph shall not apply to any exercise (including a cashless exercise or broker-assisted exercise and payment of tax obligations) of options or warrants to purchase shares of Common Stock; provided that any shares of Common Stock received upon such exercise, conversion or exchange will be subject to this Lock-Up Period. The Lock-Up Period will commence on the date of this Lock-up Agreement and continue and include the date that is one-hundred and eighty (180) days after the closing of the Public Offering. In addition, the undersigned further agrees that, except for the registration statement filed or to be filed in connection with the Public Offering, during the Lock-Up Period the undersigned will not, without the prior written consent of the Representative: (a) file or participate in the filing with the SEC of any registration statement or circulate or participate in the circulation of any preliminary or final prospectus or other disclosure document, in each case with respect to any proposed offering or sale of a Relevant Security, or (b) exercise any rights the undersigned may have to require registration with the SEC of any proposed offering or sale of a Relevant Security. In furtherance of the undersigned’s obligations hereunder, the undersigned hereby authorizes the Company during the Lock-Up Period to cause any transfer agent for the Relevant Securities to decline to transfer, and to note stop transfer restrictions on the stock register and other records relating to, Relevant Securities for which the undersigned is the record owner and the transfer of which would be a violation of this Lock-Up Agreement and, in the case of Relevant Securities for which the undersigned is the beneficial but not the record owner, agrees that during the Lock-Up Period it will cause the record owner to cause the relevant transfer agent to decline to transfer, and to note stop transfer restrictions on the stock register and other records relating to, such Relevant Securities to the extent such transfer would be a violation of this Lock-Up Agreement. Notwithstanding the foregoing, the undersigned may transfer the undersigned’s Relevant Securities:

  • The HIPAA Security Rule means the Security Standards for the Protection of 23 electronic PHI at 45 CFR Part 160, Part 162, and Part 164, Subparts A and C.

  • Food Security Act means the Food Security Act of 1985, 7 U.S.C. §1631, as amended, and the regulations promulgated thereunder.

  • Borrower Security Agreement means the Security Agreement, dated as of the date hereof, between Borrower and the Agent.

  • Privacy and Security Requirements means (a) all Privacy Laws; (b) all applicable Privacy Contracts, and (c) all applicable Privacy Policies.

  • Security Code means a sequence of numbers and/or letters or such other codes or procedures, whether generated by a Security Mechanism or otherwise, for use in connection with access to and/or use of the EB Services;

  • Computer Security Procedures means procedures for prevention of unauthorized computer access and use and administration of computer access and use as provided in writing to the Underwriter.

  • Quasi-Security means an arrangement or transaction described in paragraph (b) below.

  • Canadian securities legislation means the applicable securities legislation in force in each province and territory of Canada, all regulations, rules, orders and policies made thereunder and all multilateral and national instruments adopted by the securities regulatory authorities.

  • HIPAA Security Rule as defined in 45 CFR Part 164, Subparts A and C;

  • Security Standards means the final rule implementing HIPAA’s Security Standards for the Protection of Electronic PHI, as amended.

  • European Data Protection Laws means the EU General Data Protection Regulation 2016/679 (“GDPR”) and data protection laws of the European Economic Area (“EEA”) and their member states and the FADP.

  • Security Codes are the credentials (such as codes and passwords) that are associated with you and used by us to verify the authenticity of Communications from you. Security Codes are used to access Accounts and to use the Services. The Security Codes include any supplemental or alternative method used to verify the authenticity of Communications that may be offered or presented to you by us from time to time. • “Service(s)” and “Online Banking” are the online banking interface and the banking services described in this Agreement.

  • Security Requirement means the amount in Dollars (as certified by the Agent whose certificate shall, in the absence of manifest error, be conclusive and binding on the Borrowers and the Creditors) which is, at any relevant time:

  • Security Requirements means the requirements regarding the security of Personal Data, as set out in the Data Protection Laws (including, in particular, the seventh data protection principle of the DPA and/ or the measures set out in Article 32(1) of the GDPR (taking due account of the matters described in Article 32(2) of the GDPR)) as applicable;

  • HITECH Act means the Health Information Technology for Economic and Clinical Health Act, TitleXIII, Subtitle D, Part 1 & 2 of the American Recovery and Reinvestment Act of 2009.

  • Indexed Security means a Security the terms of which provide that the principal amount thereof payable at Stated Maturity may be more or less than the principal face amount thereof at original issuance.

  • Similar Security means a reference bond or reference bonds issued by the same issuer as the Reference Security having actual or interpolated maturity comparable with the remaining term of the Notes that would be utilised, at the time of selection and in accordance with customary financial practice, in pricing new issues of corporate debt securities of comparable maturity to the remaining term of the Notes.

  • Information Privacy and Security Laws means all applicable laws concerning the privacy, data protection, transfer, or security of Personal Confidential Information, including, to the extent applicable, the General Data Protection Regulation (EU), other state, and federal, data security laws, data breach notification laws, and consumer protection laws.