Data Security Protocols definition

Data Security Protocols means the protocols which set out the data security standards and processes to be employed by Data Republic, as set out on the Data Republic Website, and may be amended by Data Republic from time to time.
Data Security Protocols means an electronic system with functionality and protocols designed and intended to prevent any unauthorized user, application, service, or device to access personal identifying information and other confidential data stored within that electronic system.

Examples of Data Security Protocols in a sentence

  • You agree to use software programs developed by third parties including but not limited to the generality of those mentioned above, browser software that supports Data Security Protocols compatible with protocols used by the Company.

  • The Client agrees to use software programs developed by third parties including but not limited to the generality of those mentioned above, browser software that supports Data Security Protocols compatible with protocols used by the Company.

  • The client agrees to use software programs developed by third parties including but not limited to the generality of those mentioned above, browser software that supports Data Security Protocols compatible with protocols used by the Company.

  • The Client agrees to use software programs developed by third parties, browser software that supports Data Security Protocols compatible with protocols used by the Company.

  • You agree to use soRware programs developed by third parties including but not limited to the generality of those mentioned above, browser soRware that supports Data Security Protocols compatible with protocols used by the Company.

  • The Client agrees to use software programs developed by third parties including but not limited to the generality of those mentioned above, browser software that supports Data Security Protocols compatiblewith protocols used by the Company.

  • This is much larger than the kink’s de Broglie wavelength λ/m, but it is fortunately much smaller than its classical size 1/m.

  • Appendix 1 The Corsham School Academy Group Data Security Protocols for All Staff Part of the GDPR PolicyDO: ✓ Remember that data protection laws DO NOT stop you from reporting safeguarding concerns• You must still report to the relevant people where you’re concerned about a child or the behaviour of an adult/member of staff.

  • CMS will not release a sample file for a practice site until that practice site has (1) authorized the vendor on the PCF PECS web portal and (2) uploaded their executed BAA with their survey vendor to the PCF PECS team (see Section 3.4.6, Execute Business Associate Agreement With Survey Vendor in the “Primary Care First Practice Site Responsibilities” section and Section 3.3.5, Sign Business Associate Agreement and Adhere to Data Security Protocols, in the “Survey Vendor Responsibilities” section.

Related to Data Security Protocols

  • Privacy/Data Security Laws means all laws governing the receipt, collection, use, storage, processing, sharing, security, disclosure, or transfer of Personal Information or the security of Company’s Business Systems or Business Data.

  • Data Safeguards means the highest industry-standard safeguards (including administrative, physical, technical, and procedural safeguards) against the destruction, loss, misuse, unauthorized disclosure, or alteration of the JBE Data or Confidential Information, and such other related safeguards that are set forth in Applicable Laws, a Statement of Work, or pursuant to JBE policies or procedures.

  • Security Procedures means rules and regulations governing access to, and health and safety procedures while on, Government premises; and information technology security protocols;

  • Information Security Program means the administrative, technical, and physical safeguards that a licensee uses to access, collect, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle nonpublic information.

  • Computer Security Procedures means procedures for prevention of unauthorized computer access and use and administration of computer access and use as provided in writing to the Underwriter.

  • Data Security Requirements means, collectively, all of the following to the extent relating to Data Treatment, to any privacy, security, or security breach notification requirements applicable to the Company or any Retained Subsidiary, to the conduct of the Management and Franchise Business, or to any System: (i) PCI-DSS, (ii) the Company’s and the Retained Subsidiaries’ own rules and policies and (iii) applicable Law.

  • Security procedure means a procedure employed for the purpose of verifying that an electronic signature, record, or performance is that of a specific person or for detecting changes or errors in the information in an electronic record. The term includes a procedure that requires the use of algorithms or other codes, identifying words or numbers, encryption, or callback or other acknowledgment procedures.

  • Data Security Breach means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, Personal Data transmitted, stored, or otherwise processed.

  • Database Management System (“DBMS”) is a computer process used to store, sort, manipulate and update the data required to provide Selective Routing and ALI.

  • Phone/Electronic Transaction Security Procedures means security procedures for Phone/ Electronic Transactions as provided in writing to the Underwriter.

  • Database Management System (DBMS) A system of manual procedures and computer programs used to create, store and update the data required to provide Selective Routing and/or Automatic Location Identification for 911 systems. Day: A calendar day unless otherwise specified. Dedicated Transport: UNE transmission path between one of CenturyLink’s Wire Centers or switches and another of CenturyLink’s Wire Centers or switches within the same LATA and State that are dedicated to a particular customer or carrier. Default: A Party’s violation of any material term or condition of the Agreement, or refusal or failure in any material respect to properly perform its obligations under this Agreement, including the failure to make any undisputed payment when due. A Party shall also be deemed in Default upon such Party’s insolvency or the initiation of bankruptcy or receivership proceedings by or against the Party or the failure to obtain or maintain any certification(s) or authorization(s) from the Commission which are necessary or appropriate for a Party to exchange traffic or order any service, facility or arrangement under this Agreement, or notice from the Party that it has ceased doing business in this State or receipt of publicly available information that signifies the Party is no longer doing business in this State.

  • Data Set means specific CancerMPact or Epi Database data provided by Oracle to Client pursuant to the Agreement and Order. This includes the data, analysis, models and any other information contained in the database or report to be accessed by multiple subscribers, and any other non-custom engagement performed by Oracle.

  • Phone/Electronic Transaction Security Procedures means security procedures for Phone/ Electronic Transactions as provided in writing to the Underwriter.

  • Protocol means, in respect of any category of object and associated rights to which this Convention applies, the Protocol in respect of that category of object and associated rights;

  • Technical safeguards means the technology and the policy and procedures for its use that 27 protect electronic PHI and control access to it.

  • HMG Security Policy Framework means the Cabinet Office Security Policy Framework (available from the Cabinet Office Security Policy Division) as updated from time to time.

  • Kyoto Protocol means the protocol to the UNFCCC adopted at the Third Conference of the Parties to the UNFCCC in Kyoto, Japan on 11 December 1997 as may be amended;

  • NIST Cybersecurity Framework means the U.S. Department of Commerce National Institute for Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity (Version 1.1).

  • Data Services The Customer will receive a discount equal to 25% for the following Data Services: Access: Standard VBS2 Guide local loop charges for DS-1 Access and DS-3 Access Service.

  • Security Policy Framework means the Cabinet Office Security Policy Framework (available from the Cabinet Office Security Policy Division);

  • Contractor information system means an information system belonging to, or operated by or for, the Contractor.

  • data user means a natural or legal person who has lawful access to certain personal or non-personal data and is authorised to use that data for commercial or non-commercial purposes;

  • Data Site means an electronic password protected data site maintained by the Borrower (or by the Collateral Manager on behalf of Borrower) at Xxxxxxx Corporation, Intralinks, SyndTrak Online or any other similar electronic distribution system reasonably acceptable to the Administrative Agent.

  • Customer information systems means any methods used to access, collect, store, use, transmit, protect, or dispose of customer in- formation.

  • Data Log means a complete record of all Data Interchanged representing the Messages and their Associated Data between the parties;

  • Limited Data Set shall have the same meaning as the term “limited data set” as set forth in as defined in 45 C.F.R. §164.514(e)(2).