Data Security Program definition

Data Security Program means Exhibit B (Data Security Program) of this MSA.
Data Security Program has the meaning given in Section 10.1(c)(ii). “Data Subcontractor” means any Subcontractor that comes into direct contact with Ascension Health Data. “Data Supplier Vendor” means any Supplier Vendor that comes into direct contact with Ascension Health Data. “Debit AR” means positive balance open AR. “Deficient Service” has the meaning given in Section 4.4(a). “De-identified” has the meaning given in Section in Section 13.2(f). “Denials” means non-contractual adjustments or write off of charges taken in accordance with eligible participant policies and/or payer denials. “Dependent Services” means those Services that are specified as “Dependent Services” in Exhibit 2-A. “Derivative Work” means a work based on one or more preexisting works, including a condensation, transformation, translation, modification, expansion, or adaptation, that, if prepared without authorization of the owner of the copyright of such preexisting work, would constitute a copyright infringement under applicable Law, but excluding the preexisting work. “Detailed Transition Plan” has the meaning given in Section 4.2(b). “Developed Materials” means both Commissioned Developed Materials and General Developed Materials. “Development Tools” means all software programs and programming (and all modifications, replacements, Upgrades, enhancements, documentation, materials and media related thereto) that are used in the development, testing, deployment and maintenance of Applications to the extent a Party has financial or operational responsibility for such programs or programming under a Supplement. Development Tools shall include all such products in use or required to be used as of the Commencement Date, including those set forth in the applicable Supplement, those as to which the license, maintenance or support costs are included in the applicable Base Case, and those as to which Supplier received reasonable notice and/or access prior to the Commencement Date. Development Tools also shall include all such products selected and/or developed by or for Ascension Health or the other Eligible Recipients on or after the Commencement Date to the extent a Party has financial or operational responsibility for such programs or programming under a Supplement. “Directives” has the meaning given in Exhibit 11, Section 2.2. “Discretionary Transition Employee” has the meaning given in Exhibit 13, Section 1.1. “Disengagement Plan” has the meaning given in Section 20.7(b)(1). “Disengagement Services” means ...
Data Security Program has the meaning set forth in Section 4.12.10(c).

Examples of Data Security Program in a sentence

  • Company will secure and protect the Services from misuse and unauthorized access and implement security, data management, and incident response protocols in accordance with industry best practices and comply with the terms of Exhibit B (Data Security Program).

  • Such Data Security Program shall be: no less rigorous than (x) as required by applicable Laws, and (y) the requirements placed upon Supplier regarding the security of Ascension Health Data in this Agreement.

  • For detailed information regarding the Visa Cardholder information Security Program, see the following web page: hxxx://xxx.xxxx.xxx/xxxxxxxx/accepting_visa/ops_risk_management/cisp.html?ep=v_sym_cisp To view the Payment Card Industry (PCI) Data Security Program requirements, navigate to “PCI Data Security Standard” and open the PDF.

  • For detailed information regarding the Visa Cardholder information Security Program, see the following web page: xxxx://xxx.xxxx.xxx/business/accepting_visa/ops_risk_management/cisp.html?ep=v_sym_cisp To view the Payment Card Industry (PCI) Data Security Program requirements, navigate to “PCI Data Security Standard” and open the PDF.

  • To date, the Canadian review has centered around national security matters, including data protections and the safeguarding of our customers’ personally identifiable information, consistent with the Enhanced Data Security Program that Genworth and Oceanwide have undertaken in connection with the clearance of the transaction by the Committee on Foreign Investment in the United States (CFIUS).

  • Termination hereof is automatic upon delivery of all of the deposited Source Code and Commentary to Licensee in accordance with the provisions hereof.

  • These requirements are consistent with the Enhanced Data Security Program that Genworth and Oceanwide have undertaken in connection with the clearance of the transaction by the Committee on Foreign Investment in the United States (CFIUS).

Related to Data Security Program

  • Information Security Program means the administrative, technical, and physical safeguards that a licensee uses to access, collect, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle nonpublic information.

  • Data Security Breach means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, Personal Data transmitted, stored, or otherwise processed.

  • Privacy/Data Security Laws means all laws governing the receipt, collection, use, storage, processing, sharing, security, disclosure, or transfer of Personal Information or the security of the Business Systems or Business Data.

  • Data set means an identifiable collection of data;

  • Security Procedures means rules and regulations governing access to, and health and safety procedures while on, Government premises; and information technology security protocols;

  • Data Security Requirements means, collectively, all of the following to the extent relating to Data Treatment or otherwise relating to privacy, security or security breach notification requirements and applicable to Seller, any IT Systems or any Personal Information: (i) Seller’s own rules, policies, and procedures; (ii) all Laws applicable to Seller; (iii) industry standards applicable to the industry in which Seller operates; and (iv) Contracts to which Seller is a party or otherwise subject.

  • Security procedure means a procedure employed for the purpose of verifying that an electronic signature, record, or performance is that of a specific person or for detecting changes or errors in the information in an electronic record. The term includes a procedure that requires the use of algorithms or other codes, identifying words or numbers, encryption, or callback or other acknowledgment procedures.

  • Computer Security Procedures means procedures for prevention of unauthorized computer access and use and administration of computer access and use as provided in writing to the Underwriter.

  • Data Safeguards means the highest industry-standard safeguards (including administrative, physical, technical, and procedural safeguards) against the destruction, loss, misuse, unauthorized disclosure, or alteration of the JBE Data or Confidential Information, and such other related safeguards that are set forth in Applicable Laws, a Statement of Work, or pursuant to JBE policies or procedures.

  • Data Services The Customer will receive a discount equal to 25% for the following Data Services: Access: Standard VBS2 Guide local loop charges for DS-1 Access and DS-3 Access Service.

  • Data Security Incident means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, Agreement Personal Data transmitted, stored or otherwise Processed;

  • Phone/Electronic Transaction Security Procedures means security procedures for Phone/ Electronic Transactions as provided in writing to the Underwriter.

  • Data Service means a telecommunications service other than a voice service.

  • Security Plan means the Contractor’s security plan prepared pursuant to paragraph 3 of Schedule (Security Requirements & Plan)

  • Data Site means an electronic password protected data site maintained by the Borrower (or by the Collateral Manager on behalf of Borrower) at Xxxxxxx Corporation, Intralinks, SyndTrak Online or any other similar electronic distribution system reasonably acceptable to the Administrative Agent.

  • Data Log means a complete record of all Data Interchanged representing the Messages and their Associated Data between the parties;

  • Phone/Electronic Transaction Security Procedures means security procedures for Phone/ Electronic Transactions as provided in writing to the Underwriter.