Data Security Program definition

Data Security Program means Exhibit B (Data Security Program) of this MSA.
Data Security Program has the meaning given in Section 10.1(c)(ii). “Data Subcontractor” means any Subcontractor that comes into direct contact with Ascension Health Data. “Data Supplier Vendor” means any Supplier Vendor that comes into direct contact with Ascension Health Data. “Debit AR” means positive balance open AR. “Deficient Service” has the meaning given in Section 4.4(a). “De-identified” has the meaning given in Section in Section 13.2(f). “Denials” means non-contractual adjustments or write off of charges taken in accordance with eligible participant policies and/or payer denials. “Dependent Services” means those Services that are specified as “Dependent Services” in Exhibit 2-A. “Derivative Work” means a work based on one or more preexisting works, including a condensation, transformation, translation, modification, expansion, or adaptation, that, if prepared without authorization of the owner of the copyright of such preexisting work, would constitute a copyright infringement under applicable Law, but excluding the preexisting work. “Detailed Transition Plan” has the meaning given in Section 4.2(b). “Developed Materials” means both Commissioned Developed Materials and General Developed Materials. “Development Tools” means all software programs and programming (and all modifications, replacements, Upgrades, enhancements, documentation, materials and media related thereto) that are used in the development, testing, deployment and maintenance of Applications to the extent a Party has financial or operational responsibility for such programs or programming under a Supplement. Development Tools shall include all such products in use or required to be used as of the Commencement Date, including those set forth in the applicable Supplement, those as to which the license, maintenance or support costs are included in the applicable Base Case, and those as to which Supplier received reasonable notice and/or access prior to the Commencement Date. Development Tools also shall include all such products selected and/or developed by or for Ascension Health or the other Eligible Recipients on or after the Commencement Date to the extent a Party has financial or operational responsibility for such programs or programming under a Supplement. “Directives” has the meaning given in Exhibit 11, Section 2.2. “Discretionary Transition Employee” has the meaning given in Exhibit 13, Section 1.1. “Disengagement Plan” has the meaning given in Section 20.7(b)(1). “Disengagement Services” means ...
Data Security Program. The Importer’s data security program and associated physical, technical, organizational and security measures shall be documented in writing by Importer and shall comply in all material respects with the Information Security Management System (ISMS) family of standards as published by the Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), also known as the ISO/IEC 27000 series or with National Institute of Standards and Technology (NIST) frameworks and guidelines, as each may be modified or replaced from time to time. Importer shall provide Exporter with a security audit certificate or report such as an ISO 27001 certificate of compliance or a SOC 2, type 2 report annually. The scope of the ISO 27001 certificate or SOC 2, type 2 report must include the Services provided by Importer to Exporter. If Importer’s Systems are hosted by a third party, Importer must also provide Exporter with an ISO 27001 certificate of compliance or a SOC 2, type 2 report annually for the specific third party providing the hosting services to Importer. Importer shall permit Exporter to review such documentation and/or inspect Importer’s compliance with such program.

Examples of Data Security Program in a sentence

  • The Vendor Data Security Program shall include the following elements.

  • Company will secure and protect the Services from misuse and unauthorized access and implement security, data management, and incident response protocols in accordance with industry best practices and comply with the terms of Exhibit B (Data Security Program).

  • Licensee shall not permit removal of any subject data from the licensed site (i.e., limited access space protected under the provisions of this License) without first notifying and obtaining writtenapproval from the IES Data Security Program.

  • The IES Data Security Program shall provide written notice of a decision to the licensee within nine weeks (45 working days) after receipt of the licensee's written argument.

  • Return Original Data to IESLicensee shall return the original subject data to the IES Data Security Program by certified mail when the research or the subject of the agreement has been completed or the License terminates, whichever occurs first.

  • These initiatives include the Visa Card Information Program (CSIP), JCB Data Security Program, Mastercard Site Data Protection (SDP), and American Express Data Security Operating Policy.

  • The SailPoint Data Security Program (and Annex A) are subject to change at any time without notice provided that any change shall not materially diminish SailPoint’s information security obligations described therein.

  • Develop procedures to address violations of the Data Security Program and make the PI protection expectations clear in the personnel plan.

  • The Center shall document its Data Security Program in written form and shall make those documents available to CRO or Sponsor for review upon CRO’s or Sponsor’s request.

  • And places with dysfunctional housing markets should use their local industrial strategy to spur more constructive collaboration between neighbouring authorities.To be effective local industrial strategies should be driven by five principles which we outline in the rest of this chapter.


More Definitions of Data Security Program

Data Security Program has the meaning set forth in Section 4.12.10(c).

Related to Data Security Program

  • Information Security Program means the administrative, technical, and physical safeguards that a licensee uses to access, collect, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle nonpublic information.

  • Data Security Breach means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, Personal Data transmitted, stored, or otherwise processed.

  • Privacy/Data Security Laws means all laws governing the receipt, collection, use, storage, processing, sharing, security, disclosure, or transfer of Personal Information or the security of Company’s Business Systems or Business Data.

  • Data Set means specific CancerMPact or Epi Database data provided by Oracle to Client pursuant to the Agreement and Order. This includes the data, analysis, models and any other information contained in the database or report to be accessed by multiple subscribers, and any other non-custom engagement performed by Oracle.

  • Security Procedures means rules and regulations governing access to, and health and safety procedures while on, Government premises; and information technology security protocols;

  • HMG Security Policy Framework means the Cabinet Office Security Policy Framework (available from the Cabinet Office Security Policy Division) as updated from time to time.

  • Data Security Requirements means, collectively, all of the following to the extent relating to Data Treatment, to any privacy, security, or security breach notification requirements applicable to the Company or any Retained Subsidiary, to the conduct of the Management and Franchise Business, or to any System: (i) PCI-DSS, (ii) the Company’s and the Retained Subsidiaries’ own rules and policies and (iii) applicable Law.

  • Security procedure means a procedure employed for the purpose of verifying that an electronic signature, record, or performance is that of a specific person or for detecting changes or errors in the information in an electronic record. The term includes a procedure that requires the use of algorithms or other codes, identifying words or numbers, encryption, or callback or other acknowledgment procedures.

  • Computer Security Procedures means procedures for prevention of unauthorized computer access and use and administration of computer access and use as provided in writing to the Underwriter.

  • Data Safeguards means the highest industry-standard safeguards (including administrative, physical, technical, and procedural safeguards) against the destruction, loss, misuse, unauthorized disclosure, or alteration of the JBE Data or Confidential Information, and such other related safeguards that are set forth in Applicable Laws, a Statement of Work, or pursuant to JBE policies or procedures.

  • Security Policy Framework means the Cabinet Office Security Policy Framework (available from the Cabinet Office Security Policy Division);

  • Data Services The Customer will receive a discount equal to 25% for the following Data Services: Access: Standard VBS2 Guide local loop charges for DS-1 Access and DS-3 Access Service.

  • Security Management Plan means the Supplier's security management plan prepared pursuant to paragraph 3 of schedule 2 an outline of which is set out in paragraph 2.7 of the Order Form as updated from time to time;

  • Data Security Incident means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, Agreement Personal Data transmitted, stored or otherwise Processed;

  • Phone/Electronic Transaction Security Procedures means security procedures for Phone/ Electronic Transactions as provided in writing to the Underwriter.

  • NIST Cybersecurity Framework means the U.S. Department of Commerce National Institute for Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity (Version 1.1).

  • Account Information Service Provider means a payment service provider pursuing business activities as referred to in point (8) of Annex I;

  • E-Verify Program above means the employment verification program administered by the United States Department of Homeland Security, the Social Security Administration, or any successor program.

  • Security Plan means the Contractor’s security plan prepared pursuant to paragraph 3 of Schedule (Security Requirements & Plan)

  • Data Site means an electronic password protected data site maintained by the Borrower (or by the Collateral Manager on behalf of Borrower) at Xxxxxxx Corporation, Intralinks, SyndTrak Online or any other similar electronic distribution system reasonably acceptable to the Administrative Agent.

  • Data Log means a complete record of all Data Interchanged representing the Messages and their Associated Data between the parties;

  • Phone/Electronic Transaction Security Procedures means security procedures for Phone/ Electronic Transactions as provided in writing to the Underwriter.

  • Master Account Approval List means the list of Attendee reservations and Dates which the Judicial Council has authorized the Contractor to xxxx associated sleeping room charges and tax against the Judicial Council’s Master Account.

  • Security freeze means a notice, at the request of the consumer and subject to certain exceptions,

  • Data Provider means a Participant that is registered to provide information to GS1 South Africa for use through the Verified by GS1 Services.

  • Limited Data Set shall have the same meaning as the term “limited data set” as set forth in as defined in 45 C.F.R. §164.514(e)(2).