Important Data definition

Important Data means non-public data or confidential information that is not state secret but would impact or endanger national interest or public interest of China or impact or endanger society as a whole in China if such non-public data or confidential information is leaked, lost, destroyed, or stolen, modified, access or otherwise illegally processed. The scope and definition of Important Data is subject to the Applicable Data Protection Laws.
Important Data means any data that is closely related to national security, economic development and public interest.
Important Data means the data that may endanger national security, economic operation, social stability, public health, and security once it is tampered with, destroyed, leaked, illegally obtained or illegally used, or closely related to China’s national security, economic development, and public interests, and China’s relevant national standards and guidelines for identification of important data shall apply mutatis mutandis to the specific scope of important data.

Examples of Important Data in a sentence

  • Important: Data on the FSA-1007, Section I (Inspection Certificate - Farmers Stock Peanuts) must be identical to data on the SC-95 which is transmitted in the MP1 file (FSA-1007) to PMP-DC.

  • UNIT - V: CHAR DRIVERS AND DEBUGGING TECHNIQUES (10 Periods)The Design of Scull, Some Important Data Structures, Char Device Registration, Open and Release, Scull's Memory Usage, Read and Write.

  • It is very important to avoid assumptions about the effects which a particular condition (e.g. depression) may have on a person’s ability to carry out their job.) Name: Signature: Date: Contact address: Postcode: Tel No: E-mail: Company Name and Address (Stamp if applicable): Important: Data Protection Act (1998).

  • Important Data to Include in ApplicationThe data that is required to evaluate and prioritize capital assistance requests varies depending on the project type and specific characteristics of the project.

  • Important: Data should not be stored on any portable or removable devices (e.g. laptop, memory stick, PDA, etc), regardless of encryption.

  • The Draft Measures makes significant adjustments to the Measures for Security Assessment for Cross-border Transfer of Personal Information and Important Data (Draft for Comment) released on April 11, 2017.

  • Company Name and Address (Stamp if applicable): Important: Data Protection Act (1998).

  • BCP ElementsInsert logo Back Up Important Data ChecklistThis checklist gives recommendations for a risk assessment required by the Health Insurance Portability and Accountability Act (HIPAA).

  • In addition, the draft Measures for Security Assessment of Cross-border Transfer of Personal Information and Important Data adds network operators in the scope as well.

  • The Cumulative Effects Section of the DEIS Includes a Substantial Amount of Text, Including Conclusions, Taken Verbatim from a Significantly More Limited Review and Report; the Section Contains No Analysis of Cumulative Effects, Only a Review of Various Sources of Impacts, with Each Source Reviewed Separately; Important Data Collected by MMS Is Ignored.


More Definitions of Important Data

Important Data means (a) any data or information in any media that is closely related to national security, economic development, and social and public interests or (b) any data or information that constitutes important data or important information under any applicable law, Data Protection Obligation, or Contract under which any Group Company has a legal obligation, or any Party or Group Company’s or Group Company’s third party partner privacy policies.
Important Data means the data closely related to China's national security, economic development and public interests, and China's relevant national standards and guidelines for identification of important data shall apply mutatis mutandis to the specific scope of important data. Important Data does not form part of Customer Data; and (iii) "China Personal Information" means Personal Data and Customer Personal Data (as defined in the Data Processing Addendum) which is gathered and produced during Customer's operations within China.
Important Data means the kind of data, if divulged, may directly affect national security, economic security, social stability, public health and security, such as undisclosed government information, large-scale population, genetic health, geographic, mineral resources. Important data usually doesn’t include information related to the production and operation of enterprises, internal management information or personal information.
Important Data means data closely related to national security, economic development and societal and public interests. The specific scope of the important data shall be determined with reference to relevant national standards and guidelines on important data identification.
Important Data means data closely related to national security, economic development and

Related to Important Data

  • Important Notice When you sign your name to this Assignment Form without filling in the name of your "Assignee" or "Attorney", this Note becomes fully negotiable, similar to a check endorsed in blank. Therefore, to safeguard a signed Class A-1 Note, it is recommended that you fill in the name of the new owner in the "Assignee" blank. Alternatively, instead of using this Assignment Form, you may sign a separate "power of attorney" form and then mail the unsigned Class A-1 Note and the signed "power of attorney" in separate envelopes. For added protection, use certified or registered mail for a Class A-1 Note. CLASS A-2 NOTE UNLESS THIS CERTIFICATE IS PRESENTED BY AN AUTHORIZED REPRESENTATIVE OF THE DEPOSITORY TRUST COMPANY, A NEW YORK CORPORATION ("DTC"), TO THE TRUSTEE OR ITS AGENT FOR REGISTRATION OF TRANSFER, EXCHANGE OR PAYMENT, AND ANY CERTIFICATE ISSUED IS REGISTERED IN THE NAME OF CEDE & CO. OR SUCH OTHER NAME AS IS REQUESTED BY AN AUTHORIZED REPRESENTATIVE OF DTC (AND ANY PAYMENT IS MADE TO CEDE & CO. OR TO SUCH OTHER ENTITY AS IS REQUIRED BY AN AUTHORIZED REPRESENTATIVE OF DTC), ANY TRANSFER, PLEDGE OR OTHER USE HEREOF FOR VALUE OR OTHERWISE BY OR TO ANY PERSON IS WRONGFUL INASMUCH AS THE REGISTERED OWNER HEREOF, CEDE & CO., HAS AN INTEREST HEREIN. IKON RECEIVABLES, LLC

  • Important Note When completing your bid, do not attach any forms which may contain terms and conditions that conflict with those listed in the County’s bid documents(s). Inclusion of additional terms and conditions such as those which may be on your company’s standard forms shall result in your bid being declared non-responsive as these changes will be considered a counteroffer to the County’s bid. Delivery shall be not later than ten (10) calendar days After Receipt of Order (ARO) per Special Terms and Conditions. Inquiries regarding this Invitation for Bids may be directed to Xxxxx Xxxxxxxxx Xxxxxxxxx, Purchasing Agent, at Xxxxx.Xxxxxxxxx@xxxx.xxx Company Name: NOTE: COMPANY NAME MUST MATCH LEGAL NAME ASSIGNED TO TIN NUMBER. CURRENT W9 MUST BE SUBMITTED WITH BID. TIN#: D-U-N-S® # (Street No. or P.O. Box Number) (Street Name) (City) (County) (State) (Zip Code) Contact Person: Phone Number: Fax Number: Email Address: Emergency Contact Person: Telephone Number: Cell Phone Number: Residence Telephone Number: Email:

  • IMPORTANT means the feature is a high priority for the applicant(s). ‘Not Important’ means it is not of high priority to the applicant(s). ‘Don’t Want’ should be selected where the applicant(s) expressly do not want the feature.

  • Electronic and Information Resources Accessibility Standards means the accessibility standards for electronic and information resources contained in 1 Texas Administrative Code Chapter 213.

  • Biometric information means any information, regardless of how it is captured, converted, stored, or shared, based on an individual’s biometric identifier used to identify an individual. Biometric information does not include information derived from items or procedures excluded under the definition of biometric identifiers.

  • Vulnerability means a weakness of an asset or mitigation that can be exploited by one or more threats.

  • FILOT Act means Title 12, Chapter 44, of the Code, and all future acts successor or supplemental thereto or amendatory thereof.

  • USA PATRIOT Act means the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001.

  • Occupational Health and Safety Act means the Occupational Health and Safety Act, 1993 (Act No 85 of 1993);

  • Human trafficking means a scheme or plan to which all of the following apply:

  • Security Vulnerability means a flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in a security breach such that data is compromised, manipulated or stolen or the system damaged.

  • Evaluation rubric means a set of criteria, measures, and processes used to evaluate all teaching staff members in a specific school district or local education agency. Evaluation rubrics consist of measures of professional practice, based on educator practice instruments and student outcomes. Each Board of Education will have an evaluation rubric specifically for teachers, another specifically for Principals, Vice Principals, and Assistant Principals, and evaluation rubrics for other categories of teaching staff members.

  • Processes with Significant Environmental Aspects means the Equipment which, during regular operation or if not properly operated or maintained, may cause or are likely to cause an adverse effect.

  • General Data Protection Regulation GDPR" means regulation (EU) 2016/679 of the European parliament and of the council as amended from time to time.

  • Electronic Protected Health Information means Protected Health Information that is maintained in or transmitted by electronic media.

  • Consumer Information Any personally identifiable information in any form (written electronic or otherwise) relating to a Mortgagor, including, but not limited to: a Mortgagor’s name, address, telephone number, Mortgage Loan number, Mortgage Loan payment history, delinquency status, insurance carrier or payment information, tax amount or payment information; the fact that the Mortgagor has a relationship with the Seller or Servicer or the originator of the related Mortgage Loan; and any other non-public personally identifiable information.

  • Disaster Management Act means the Disaster Management Act, 2002 (Act No.57 of 2002)

  • AML/KYC Procedures means the customer due diligence procedures of a Reporting Finnish Financial Institution pursuant to the anti-money laundering or similar requirements of Finland to which such Reporting Finnish Financial Institution is subject.

  • Sex trafficking means the recruitment, harboring, transportation, provision, or obtaining of a person for the purpose of a commercial sex act.

  • freezing of economic resources means preventing the use of economic resources to obtain funds, goods or services in any way, including, but not limited to, by selling, hiring or mortgaging them;

  • Technological safeguards means the technology and the policy and procedures for use of the technology to protect and control access to personal information.

  • Geographic information system or “GIS” means a system designed to capture, store, manipulate, analyze, manage, and present spatial or geographical data.

  • Contractor Commercially Sensitive Information means the information listed in the Contractor Commercial Sensitive Information Annex to the Contract being information notified by the Contractor to the Authority which is acknowledged by the Authority as being commercially sensitive information.

  • Drug Free Workplace Act Party will assure a drug-free workplace in accordance with 45 CFR Part 76.

  • Health information exchange or “HIE” shall mean the Common HIE Resources and infrastructure made available to Participants by CRISP for Permitted Purposes, as defined in Section 3.02 of the Terms and Conditions, subject to the terms of the Agreement. Common HIE Resources shall not include the technological infrastructure provided by the Direct Technology Provider for the Direct Service.

  • Technical safeguards means the technology and the policy and procedures for its use that 27 protect electronic PHI and control access to it.