Information Security Program means the administrative, technical, and physical safeguards that a licensee uses to access, collect, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle nonpublic information.
Data Security Breach means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, Personal Data transmitted, stored, or otherwise processed.
Privacy/Data Security Laws means all laws governing the receipt, collection, use, storage, processing, sharing, security, disclosure, or transfer of Personal Information or the security of Company’s Business Systems or Business Data.
Data Set means specific CancerMPact or Epi Database data provided by Oracle to Client pursuant to the Agreement and Order. This includes the data, analysis, models and any other information contained in the database or report to be accessed by multiple subscribers, and any other non-custom engagement performed by Oracle.
Security Procedures means rules and regulations governing access to, and health and safety procedures while on, Government premises; and information technology security protocols;
HMG Security Policy Framework means the Cabinet Office Security Policy Framework (available from the Cabinet Office Security Policy Division) as updated from time to time.
Data Security Requirements means, collectively, all of the following to the extent relating to Data Treatment, to any privacy, security, or security breach notification requirements applicable to the Company or any Retained Subsidiary, to the conduct of the Management and Franchise Business, or to any System: (i) PCI-DSS, (ii) the Company’s and the Retained Subsidiaries’ own rules and policies and (iii) applicable Law.
Security procedure means a procedure employed for the purpose of verifying that an electronic signature, record, or performance is that of a specific person or for detecting changes or errors in the information in an electronic record. The term includes a procedure that requires the use of algorithms or other codes, identifying words or numbers, encryption, or callback or other acknowledgment procedures.
Computer Security Procedures means procedures for prevention of unauthorized computer access and use and administration of computer access and use as provided in writing to the Underwriter.
Data Safeguards means the highest industry-standard safeguards (including administrative, physical, technical, and procedural safeguards) against the destruction, loss, misuse, unauthorized disclosure, or alteration of the JBE Data or Confidential Information, and such other related safeguards that are set forth in Applicable Laws, a Statement of Work, or pursuant to JBE policies or procedures.
Security Policy Framework means the Cabinet Office Security Policy Framework (available from the Cabinet Office Security Policy Division);
Data Services The Customer will receive a discount equal to 25% for the following Data Services: Access: Standard VBS2 Guide local loop charges for DS-1 Access and DS-3 Access Service.
Security Management Plan means the Supplier's security management plan prepared pursuant to paragraph 3 of schedule 2 an outline of which is set out in paragraph 2.7 of the Order Form as updated from time to time;
Data Security Incident means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, Agreement Personal Data transmitted, stored or otherwise Processed;
Phone/Electronic Transaction Security Procedures means security procedures for Phone/ Electronic Transactions as provided in writing to the Underwriter.
NIST Cybersecurity Framework means the U.S. Department of Commerce National Institute for Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity (Version 1.1).
Account Information Service Provider means a payment service provider pursuing business activities as referred to in point (8) of Annex I;
E-Verify Program above means the employment verification program administered by the United States Department of Homeland Security, the Social Security Administration, or any successor program.
Security Plan means the Contractor’s security plan prepared pursuant to paragraph 3 of Schedule (Security Requirements & Plan)
Data Site means an electronic password protected data site maintained by the Borrower (or by the Collateral Manager on behalf of Borrower) at Xxxxxxx Corporation, Intralinks, SyndTrak Online or any other similar electronic distribution system reasonably acceptable to the Administrative Agent.
Data Log means a complete record of all Data Interchanged representing the Messages and their Associated Data between the parties;
Phone/Electronic Transaction Security Procedures means security procedures for Phone/ Electronic Transactions as provided in writing to the Underwriter.
Master Account Approval List means the list of Attendee reservations and Dates which the Judicial Council has authorized the Contractor to xxxx associated sleeping room charges and tax against the Judicial Council’s Master Account.
Security freeze means a notice, at the request of the consumer and subject to certain exceptions,
Data Provider means a Participant that is registered to provide information to GS1 South Africa for use through the Verified by GS1 Services.
Limited Data Set shall have the same meaning as the term “limited data set” as set forth in as defined in 45 C.F.R. §164.514(e)(2).