FAN Security Procedures definition

FAN Security Procedures means the procedures, including the use of encryption technology, implemented for purposes of protecting the integrity, confidentiality or secrecy of, and the unauthorized interception, corruption, use of, or access to, any data or information transmitted via FAN Services.

Examples of FAN Security Procedures in a sentence

  • With respect to any claims for losses, damages, costs or expenses which may arise directly or indirectly from FAN Security Procedures which the Agent has implemented or omitted, the Agent shall be presumed to have fulfilled its obligations if it has followed, in all material respects, at least those FAN Security Procedures described in the FAN Security Procedures attachment to each Service Schedule in the Service Specifications describing the applicable FAN Service.

  • The Agent may, upon reasonable prior written notice to the Funds, modify such FAN Security Procedures from time to time to the extent the Agent believes, in good faith, that such modifications will not diminish the security of FAN.

Related to FAN Security Procedures

  • Security Procedures means rules and regulations governing access to, and health and safety procedures while on, Government premises; and information technology security protocols;

  • Computer Security Procedures means procedures for prevention of unauthorized computer access and use and administration of computer access and use as provided in writing to the Underwriter.

  • Security procedure means a procedure employed for the purpose of verifying that an electronic signature, record, or performance is that of a specific person or for detecting changes or errors in the information in an electronic record. The term includes a procedure that requires the use of algorithms or other codes, identifying words or numbers, encryption, or callback or other acknowledgment procedures.

  • Information Security Program means the administrative, technical, and physical safeguards that a licensee uses to access, collect, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle nonpublic information.

  • Phone/Electronic Transaction Security Procedures means security procedures for Phone/ Electronic Transactions as provided in writing to the Underwriter.

  • Phone/Electronic Transaction Security Procedures means security procedures for Phone/ Electronic Transactions as provided in writing to the Underwriter.

  • Enforcement Procedures means the procedures for the enforcement of Mortgages from time to time in accordance with the relevant Seller’s Policy;

  • Administrative Safeguards are administrative actions, and policies and procedures, to manage the selection, development, implementation, and maintenance of security measures to protect electronic PHI and to manage the conduct of Contractor’s workforce in relation to the protection of that information.

  • Administrative Procedures means the Administrative Procedures of Minnesota Management & Budget developed in accord with M.S. 43A.04, subdivision 4.

  • Social Engineering Security Procedures means security procedures intended to prevent Social Engineering Fraud as set forth in the Application and/or as otherwise provided in writing to the Underwriter.

  • Auction Procedures means the Auction Procedures that are set forth in Paragraph 10 of the Articles Supplementary.

  • Data Safeguards means the highest industry-standard safeguards (including administrative, physical, technical, and procedural safeguards) against the destruction, loss, misuse, unauthorized disclosure, or alteration of the JBE Data or Confidential Information, and such other related safeguards that are set forth in Applicable Laws, a Statement of Work, or pursuant to JBE policies or procedures.

  • Remarketing Procedures means the procedures for conducting Remarketings set forth in Part II of these Articles Supplementary.

  • Bidding Procedures means the bidding procedures attached as Exhibit 1 to the Bidding Procedures Order, as such bidding procedures may be amended from time to time in accordance with its terms.

  • Technical safeguards means the technology and the policy and procedures for its use that 27 protect electronic PHI and control access to it.

  • Security Provider means you and/or any other person or entity furnishing security for any Credit Facilities and/or any party to any security document.

  • Data Security Requirements means, collectively, all of the following to the extent relating to Data Treatment or otherwise relating to privacy, security or security breach notification requirements and applicable to Seller, any IT Systems or any Personal Information: (i) Seller’s own rules, policies, and procedures; (ii) all Laws applicable to Seller; (iii) industry standards applicable to the industry in which Seller operates; and (iv) Contracts to which Seller is a party or otherwise subject.

  • Depositary Procedures means, with respect to any conversion, transfer, exchange or transaction involving a Global Note or any beneficial interest therein, the rules and procedures of the Depositary applicable to such conversion, transfer, exchange or transaction.