Information Security and Privacy Requirements definition

Information Security and Privacy Requirements means all applicable Laws concerning the privacy, data protection or security of Personally Identifiable Information or the Selling Entities or Transferred EntitiesIT Systems or data, including the following Laws and their implementing regulations, in each case to the extent applicable: the Health Insurance Portability and Accountability Act, the CAN-SPAM Act, the Telephone Consumer Protection Act, state data security Laws, state data breach notification Laws, and Laws governing online marketing or telemarketing; the Selling Entities’ and Transferred Entities’ privacy policies; the requirements of any agreements or codes of conduct to which the Selling Entities or Transferred Entities are bound related to the processing of Personally Identifiable Information or the security of the Selling Entities’ and Transferred Entities’ IT Systems or data; and the Payment Card Industry Data Security Standards and, to the extent the Selling Entities or Transferred Entities purport to adhere to any other industry standards, such other industry standards.
Information Security and Privacy Requirements means the obligations and requirements set forth in Schedule E.
Information Security and Privacy Requirements means (a) all applicable Laws concerning the privacy, data protection or security of Personally Identifiable Information or the Selling Entities or Transferred EntitiesIT Systems or data, including the following Laws and their implementing regulations, in each case to the extent applicable: the Health Insurance Portability and Accountability Act, the CAN-SPAM Act, the Telephone Consumer Protection Act, state data security Laws, state data breach notification Laws, and Laws governing online marketing or telemarketing; (b) the Selling Entities’ and Transferred Entities’ privacy policies; (c) the requirements of any agreements or codes of conduct to which the Selling Entities or Transferred Entities are bound related to the processing of Personally Identifiable Information or the security of the Selling Entities’ and Transferred Entities’ IT Systems or data; and (d) the Payment Card Industry Data Security Standards and, to the extent the Selling Entities or Transferred Entities purport to adhere to any other industry standards, such other industry standards.

Examples of Information Security and Privacy Requirements in a sentence

  • Contractor must demonstrate its compliance with Los Angeles County Board of Supervisors Policies and the security and privacy standards set forth in Exhibit Q, Information Security and Privacy Requirements for Contracts and submit required Exhibit R, DMH Contractor’s Compliance with Information Security Requirements Exhibit annually.

  • The County will pay for the County requested audit unless the auditor finds that Contractor has materially breached this Contract, in which case Contractor must bear all costs of the audit; and if the audit reveals material non- compliance with this Paragraph 33.5 (Audit and Inspection, Information Security and Privacy Requirements), the County may exercise its termination rights provided by this Contract.

  • Any reports and related materials provided to the County pursuant to this Paragraph 33.5 (Audit and Inspection, Information Security and Privacy Requirements) must be provided at no charge to the County.

  • In the event of any conflict between this Agreement (or any portion thereof) and the Information Security and Privacy Requirements, the terms of the Information Security and Privacy Requirements shall prevail.

  • Business Associate must attest that it has implemented Exhibit Q Information Security and Privacy Requirements for Contracts.

  • The Information Security and Privacy Requirements applies to both Contractors and their Subcontractors.

  • This Information Security and Privacy Requirements Exhibit (“Exhibit”) sets forth the County and the Contractor’s commitment and agreement to fulfill each of their obligations under applicable state or federal laws, rules, or regulations, as well as applicable industry standards concerning privacy, Data protections, Information Security, Confidentiality, Availability, and Integrity of such Information.

  • If Provider will process, create, access, transmit, transfer, or store Adobe Confidential Information, including Personal Information, in any manner, Provider will comply with the Information Security and Privacy Requirements available at https://www.adobe.com/content/dam/cc/en/legal/terms/enterprise/pdfs/2013/Information_Se curity_and_Privacy_Requirements.pdf.

  • This Information Security and Privacy Requirements Exhibit (“Exhibit”) sets forth the County and the Contractor’s commitment and agreement to fulfill each of their obligations under applicable State or federal laws, rules, or regulations, as well as applicable industry standards concerning privacy, Data protections, Information Security, Confidentiality, Availability, and Integrity of such Information.

  • Refer to Paragraph 33.5 (Audit and Inspection, Information Security and Privacy Requirements) of the Contract.ATTACHMENT C.1COUNTY - INFORMATION SECURITY AND PRIVACY REQUIREMENTS EXHIBIT ADDENDUM A: CONTRACTOR HARDWARE CONNECTING TO COUNTY SYSTEMS Notwithstanding any other provisions in this Contract, the Contractor shall ensure the following provisions and security controls are established for any and all Systems or Hardware provided under this contract.

Related to Information Security and Privacy Requirements

  • Privacy and Security Requirements means (a) all Privacy Laws; (b) all applicable Privacy Contracts, and (c) all applicable Privacy Policies.

  • Privacy Requirements means all applicable Privacy Laws and all of the Company’s and the Company Subsidiaries’ policies, notices, and contractual obligations relating to the Processing of Personal Information.

  • Information Privacy and Security Laws means all applicable laws concerning the privacy, data protection, transfer, or security of Personal Confidential Information, including, to the extent applicable, the General Data Protection Regulation (EU), other state, and federal, data security laws, data breach notification laws, and consumer protection laws.

  • Information Security (GSN GISN 5) is all the means and functions ensuring the accessibility, confidentiality or integrity of information or communications, excluding the means and functions intended to safeguard against malfunctions. This includes "cryptography", "cryptographic activation", 'cryptanalysis', protection against compromising emanations and computer security.

  • Data Security Requirements means, collectively, all of the following to the extent relating to Data Treatment, to any privacy, security, or security breach notification requirements applicable to the Company or any Retained Subsidiary, to the conduct of the Management and Franchise Business, or to any System: (i) PCI-DSS, (ii) the Company’s and the Retained Subsidiaries’ own rules and policies and (iii) applicable Law.

  • Privacy and Security Laws means any and all international, local, country-specific, or U.S. State or Federal laws, regulations, directives, standards, guidelines, policies, or procedures, as amended, applicable to Supplier pertaining to the security, confidentiality, or privacy of Buyer Data.

  • Information Security Program means the administrative, technical, and physical safeguards that a licensee uses to access, collect, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle nonpublic information.

  • Security Requirements means the requirements regarding the security of Personal Data, as set out in the Data Protection Laws (including, in particular, the seventh data protection principle of the DPA and/ or the measures set out in Article 32(1) of the GDPR (taking due account of the matters described in Article 32(2) of the GDPR)) as applicable;

  • Privacy/Data Security Laws means all laws governing the receipt, collection, use, storage, processing, sharing, security, disclosure, or transfer of Personal Information or the security of Company’s Business Systems or Business Data.

  • Health Insurance Portability and Accountability Act means the Health Insurance Portability and Accountability Act of 1996, Pub. L. No. 104-191, 110 Stat. 1936, as amended.

  • Information Disclosure Requirements means the requirements to disclose information under:

  • Consumer Information Any personally identifiable information in any form (written electronic or otherwise) relating to a Mortgagor, including, but not limited to: a Mortgagor’s name, address, telephone number, Mortgage Loan number, Mortgage Loan payment history, delinquency status, insurance carrier or payment information, tax amount or payment information; the fact that the Mortgagor has a relationship with the Seller or Servicer or the originator of the related Mortgage Loan; and any other non-public personally identifiable information.

  • Customer Information means any information contained on a customer’s application or other form and all nonpublic personal information about a customer that a Party receives from the other Party. Customer Information shall include, but not be limited to, name, address, telephone number, social security number, health information, and personal financial information (which may include a Masterworks user account number).

  • Perfection Requirements means the making or procuring of filings, stampings, registrations, notarisations, endorsements, translations and/or notifications of any Finance Document (and/or any Security created under it) necessary for the validity, enforceability (as against the relevant Obligor or any relevant third party) and/or perfection of that Finance Document.

  • Security Requirement means the amount in Dollars (as certified by the Agent whose certificate shall, in the absence of manifest error, be conclusive and binding on the Borrowers and the Creditors) which is, at any relevant time:

  • Safety Requirements means Prudent Electrical Practices, CPUC General Order No. 167, Contractor Safety Program Requirements, and all applicable requirements of Law, PG&E, the Utility Distribution Company, the Transmission Provider, Governmental Approvals, the CAISO, CARB, NERC and WECC.

  • Customer information systems means any methods used to access, collect, store, use, transmit, protect, or dispose of customer in- formation.

  • Mass Privacy Act is defined in Section 9.2 hereof.

  • HIPAA Privacy Rule means the regulations promulgated under HIPAA by the United States Department of Health and Human Services to protect the privacy of Protected Health Information, including, but not limited to, 45 CFR Part 160 and 45 CFR Part 164, Subpart A and Subpart E.

  • Information Privacy Principles means the information privacy principles set out in the Privacy and Data Protection Act 2014 (Vic).

  • Data Privacy Laws means any state or national law or regulation protecting the privacy, confidentiality, or security of Personal Information.

  • National Security Information means information that has been determined pursuant to Executive Order 13526 or any predecessor order to require protection against unauthorized disclosure and is marked to indicate its classified status when in documentary form. Classified or national security information is specifically authorized to be protected from unauthorized disclosure in the interest of national defense or foreign policy under an Executive Order or Act of Congress.

  • Contractor information system means an information system belonging to, or operated by or for, the Contractor.

  • Environmental Information Regulations means the Environmental Information Regulations 2004 and any guidance and/or codes of practice issued by the Information Commissioner or relevant government department in relation to such regulations.

  • Perfection Requirement or “Perfection Requirements” shall have the meaning set forth in Section 4(j) of this Agreement.

  • Covered contractor information system means an information system that is owned or operated by a contractor that processes, stores, or transmits Federal contract information.