Information Security Program Requirements definition

Information Security Program Requirements shall have the meaning set forth in Section 3.05(c).
Information Security Program Requirements has the meaning set forth in Section 5.1(f)(x)(B).

Examples of Information Security Program Requirements in a sentence

  • Agent agrees that it will implement all appropriate safeguards, including at least the minimum provisions set forth in Company’s Vendor Information Security Program Requirements Document, the terms of which are incorporated into this Business Associate Agreement by reference to prevent the access, use or disclosure of PHI other than pursuant to the terms and conditions of this Addendum.

  • VVTA shall be responsible for carrying out its obligations, which include: providing Revenue Vehicles and Non-Revenue Vehicles; providing equipment and inventory; providing the ITS system and components; posting and maintaining bus stop signs; providing fare media including, but not limited to, blank and preprinted fare media; providing planning and marketing services; and paying CNG and unleaded fuel costs for Revenue and Non-Revenue Vehicles supplied by VVTA.

  • During the Term and thereafter for as long as Receiving Party retains Disclosing Party Confidential Information, Disclosing Party, its representatives and agents will be entitled to conduct audits of Receiving Party’s relevant operations, facilities, and systems to confirm that Receiving Party has complied with the Disclosing Party Security Requirements and the Information Security Program Requirements (each, a “Security Audit”).

  • During the Term and thereafter for as long as Feinberg Rozen retains Claimant information or other personal information, BP and its representatives and agents shall be entitled to conduct audits of Xxxxxxxx Rozen’s and its Subcontractors’ relevant operations, facilities, and systems to confirm that Xxxxxxxx Rozen and its Subcontractors have complied with the Security Requirements and the Information Security Program Requirements (the “Security Audits”).

  • This is a Repeat Finding.2021-03: Improve Database SecurityJames Madison University 2021-01: Improve Compliance over Enrollment Reporting2021-02: Promptly Return Unclaimed Aid to the Department of Education2021-03: Properly Complete Exit Counseling for Federal Direct Loan Borrowers Norfolk State University 2021-01: Implement Information Security Program Requirements for the Gramm-Leach-Bliley Act2021-02: Improve Compliance over Enrollment Reporting.

  • Education Christopher Newport University 2021-01: Develop and Implement Database Configuration Procedures2021-02: Develop and Implement a Process to Maintain Oversight over Service Providers 2021-03: Implement Cybersecurity Requirements of the Gramm-Leach-Bliley Act George Mason University 2021-01: Implement Information Security Program Requirements for the Gramm-Leach-Bliley Act2021-02: Continue Improving Security Awareness Training.

Related to Information Security Program Requirements

  • Information Security Program means the administrative, technical, and physical safeguards that a licensee uses to access, collect, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle nonpublic information.

  • Program Requirements means certain minimum program entry requirements as well as ongoing program requirements, to be fulfilled by Partner, some of which are general PartnerEdge requirements, some of which are specific for the “Sell Engagement” and some of which are specific for the different “Cloud” Product Families, including, without limitation payment of the Program Fee(s), meeting certain minimum annual revenue requirements, upholding a Sell Authorization for at least one “Cloud” Product Family and other requirements as set out in detail in the PartnerEdge Program Guide and the RSPI.

  • Information Security (GSN GISN 5) is all the means and functions ensuring the accessibility, confidentiality or integrity of information or communications, excluding the means and functions intended to safeguard against malfunctions. This includes "cryptography", "cryptographic activation", 'cryptanalysis', protection against compromising emanations and computer security.

  • Data Security Requirements means, collectively, all of the following to the extent relating to Data Treatment, to any privacy, security, or security breach notification requirements applicable to the Company or any Retained Subsidiary, to the conduct of the Management and Franchise Business, or to any System: (i) PCI-DSS, (ii) the Company’s and the Retained Subsidiaries’ own rules and policies and (iii) applicable Law.

  • Information Regulator means the Information Regulator as established in terms of Section 39 of POPIA;

  • Covered contractor information system means an information system that is owned or operated by a contractor that processes, stores, or transmits Federal contract information.

  • Information Security Breach means the unauthorized acquisition, access, use, disclosure, transmittal, storage or transportation of Confidential Information which is not permitted by law or by the terms of this Amendment, including, but not limited to, a Security Incident.

  • Security Procedures means rules and regulations governing access to, and health and safety procedures while on, Government premises; and information technology security protocols;

  • Privacy Requirements means all applicable Privacy Laws and all of the Company’s and the Company Subsidiaries’ policies, notices, and contractual obligations relating to the Processing of Personal Information.

  • Phone/Electronic Transaction Security Procedures means security procedures for Phone/ Electronic Transactions as provided in writing to the Underwriter.

  • Contractor information system means an information system belonging to, or operated by or for, the Contractor.

  • Phone/Electronic Transaction Security Procedures means security procedures for Phone/ Electronic Transactions as provided in writing to the Underwriter.

  • Safeguards Monitoring Report means each report prepared and submitted by the Borrower to ADB that describes progress with implementation of and compliance with the EMP and the RP, including any corrective and preventative actions;

  • Privacy and Security Requirements means (a) all Privacy Laws; (b) all applicable Privacy Contracts, and (c) all applicable Privacy Policies.

  • ISM Code Documentation includes, in respect of a Ship:

  • Regulatory Requirement means any law, regulation or court order, or any rule, direction, guideline, code, notice or restriction (whether or not having the force of law) issued by any regulatory authority, governmental agency (including tax authority), clearing or settlement bank or exchange, or industry or self-regulatory body, whether in or outside Hong Kong, to which HKICL, we or any other Participant or the respective affiliates or group companies, or you are subject or are expected to comply with from time to time.

  • Customer information systems means any methods used to access, collect, store, use, transmit, protect, or dispose of customer in- formation.

  • Cardholder Information means any non-public, sensitive information about a Cardholder, including any combination of Cardholder name plus the Cardholder’s social security number, driver’s license or other identification number or credit or debit card number, or other bank account number.

  • Information Provider means the person or organisation providing the Information under this licence.

  • technical and organizational security measures means those measures aimed at protecting personal data against accidental or unlawful destruction or accidental loss, alteration, unauthorized disclosure or access, in particular where the processing involves the transmission of data over a network, and against all other unlawful forms of processing.

  • Regulatory Requirements means all applicable federal and state statutes, regulations, regulatory guidance, judicial or administrative rulings, requirements of Governmental Contracts and standards and requirements of any accrediting or certifying organization, including, but not limited to, the requirements set forth in a Product Attachment.

  • Information Service Traffic Traffic delivered to or from an Information Service Provider for the provision of Information Service. ISP-Bound Traffic is a subset of Information Service Traffic. Inside Wire or Inside Wiring: Wiring within the customer Premises that extends to the Demarcation Point of CenturyLink’s outside plant. Inside Wire is owned or controlled by the End User (unless otherwise specified herein or under Applicable Law).

  • Information processing system means an electronic system for creating, generating, sending, receiving, storing, displaying, or processing information.

  • Coordinated licensure information system means an integrated process for collecting, storing, and sharing information on nurse licensure and enforcement activities related to nurse licensure laws that is administered by a nonprofit organization composed of and controlled by licensing boards.

  • Applicable Technical Requirements and Standards means those certain technical requirements and standards applicable to interconnections of generation and/or transmission facilities with the facilities of an Interconnected Transmission Owner or, as the case may be and to the extent applicable, of an Electric Distributor, as published by Transmission Provider in a PJM Manual provided, however, that, with respect to any generation facilities with maximum generating capacity of 2 MW or less (synchronous) or 5 MW or less (inverter-based) for which the Interconnection Customer executes a Construction Service Agreement or Interconnection Service Agreement on or after March 19, 2005, “Applicable Technical Requirements and Standards” shall refer to the “PJM Small Generator Interconnection Applicable Technical Requirements and Standards.” All Applicable Technical Requirements and Standards shall be publicly available through postings on Transmission Provider’s internet website.

  • Security Requirements means the requirements regarding the security of Personal Data, as set out in the Data Protection Laws (including, in particular, the seventh data protection principle of the DPA and/ or the measures set out in Article 32(1) of the GDPR (taking due account of the matters described in Article 32(2) of the GDPR)) as applicable;