Privacy/Data Security Laws means all laws governing the receipt, collection, use, storage, processing, sharing, security, disclosure, or transfer of Personal Information or the security of Company’s Business Systems or Business Data.
Data Security Breach means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, Personal Data transmitted, stored, or otherwise processed.
Data Security Requirements means, collectively, all of the following to the extent relating to Data Treatment, to any privacy, security, or security breach notification requirements applicable to the Company or any Retained Subsidiary, to the conduct of the Management and Franchise Business, or to any System: (i) PCI-DSS, (ii) the Company’s and the Retained Subsidiaries’ own rules and policies and (iii) applicable Law.
Data Set means specific CancerMPact or Epi Database data provided by Oracle to Client pursuant to the Agreement and Order. This includes the data, analysis, models and any other information contained in the database or report to be accessed by multiple subscribers, and any other non-custom engagement performed by Oracle.
Request regarding a list of collateral means a record authenticated by a debtor requesting that the recipient approve or correct a list of what the debtor believes to be the collateral securing an obligation and reasonably identifying the transaction or relationship that is the subject of the request.
Data Site means an electronic password protected data site maintained by the Borrower (or by the Collateral Manager on behalf of Borrower) at Xxxxxxx Corporation, Intralinks, SyndTrak Online or any other similar electronic distribution system reasonably acceptable to the Administrative Agent.
Security Schedule means Schedule 2 hereto.
ISP-Bound Traffic means Telecommunications traffic, in accordance with the FCC’s Order on Remand and Report and Order, In the Matter of Implementation of the Local Compensation Provisions in the Telecommunications Act of 1996, Intercarrier Compensation for ISP-Bound Traffic, FCC 01-131, CC Docket Nos. 96-98, 99-68 (rel. April, 27, 2001) (“FCC ISP Compensation Order”), “ISP-Bound Traffic” shall mean Telecommunications traffic exchanged between CLEC and AT&T-21STATE in which the originating End User of one Party and the ISP served by the other Party are:
ACMA means the Australian Communications and Media Authority.
Data Security Incident means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, Agreement Personal Data transmitted, stored or otherwise Processed;
Data Log means a complete record of all Data Interchanged representing the Messages and their Associated Data between the parties;
Caribbean Basin country construction material means a construction material that—
Data Services The Customer will receive a discount equal to 25% for the following Data Services: Access: Standard VBS2 Guide local loop charges for DS-1 Access and DS-3 Access Service.
Limited Data Set shall have the same meaning as the term “limited data set” as set forth in as defined in 45 C.F.R. §164.514(e)(2).
Information Privacy and Security Laws means all applicable laws concerning the privacy, data protection, transfer, or security of Personal Confidential Information, including, to the extent applicable, the General Data Protection Regulation (EU), other state, and federal, data security laws, data breach notification laws, and consumer protection laws.
Privacy and Security Laws means any and all international, local, country-specific, or U.S. State or Federal laws, regulations, directives, standards, guidelines, policies, or procedures, as amended, applicable to Supplier pertaining to the security, confidentiality, or privacy of Buyer Data.
NIST Cybersecurity Framework means the U.S. Department of Commerce National Institute for Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity (Version 1.1).
The Amended Exhibit A has also been updated: 1) to reflect the name changes for ING Pioneer Fund Portfolio to ING Multi-Manager Large Cap Core Portfolio, ING International Growth Fund to ING Multi-Manager International Equity Fund, ING Index Plus MidCap Fund to ING SXXX Cap Equity Fund, ING Dxxxx New York Venture Portfolio to ING Columbia Contrarian Core Portfolio, ING Invesco Vxx Xxxxxx Cxxxxxxx Portfolio to ING Invesco Cxxxxxxx Portfolio, ING Invesco Vxx Xxxxxx Equity and Income Portfolio to ING Invesco Equity and Income Portfolio, ING Solution Growth Portfolio to ING Solution Balanced Portfolio, ING Solution Aggressive Growth Portfolio to ING Solution Moderately Aggressive Portfolio, ING Solution Moderate Portfolio to ING Solution Moderately Conservative Portfolio, and ING WisdomTreeSM Global High-Yielding Equity Index Portfolio to ING Global Value Advantage Portfolio; and 2) to reflect the removal of ING Value Choice Fund, ING International Value Choice Fund, ING Growth and Index Core Portfolio, ING DFA Global Allocation Portfolio, ING Gxxxxxx Sxxxx Commodity Strategy Portfolio, ING Oxxxxxxxxxx Active Allocation Portfolio, and ING GET U.S. Core Portfolios – Series 12 and Series 13, because these series recently liquidated, merged away, or matured.
Security freeze means a notice, at the request of the consumer and subject to certain exceptions,
Minimum data set means the data required by the Australian Government from Community Care service outlets, in the form prescribed by the Australian Government, which data is shared with the Queensland Government;
Data Sheet means an integral part of the Instructions to Consultants (ITC) Section2thatisusedtoreflect specific assignment conditions to supplement, but not to over-write, the provisions of the ITC.
Form of Note means the “Form of Note” attached hereto as Exhibit A.
L/C Application means an application and agreement for the issuance or amendment of a Letter of Credit in the form from time to time in use by the L/C Issuer.
Data Use Agreement means the agreement incorporated into the Contract to facilitate creation, receipt, maintenance, use, disclosure or access to Confidential Information.
Annexure F means, if applicable to the Product or the subject matter of this Agreement and read conjunctively with the Contractor’s obligations in terms of the Consumer Protection Act, the express warranties provided by the Contractor in relation to the Product.
cross-border processing means either: