Information Security Program means the administrative, technical, and physical safeguards that a licensee uses to access, collect, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle nonpublic information.
Program Requirements means that Partner has to fulfill certain program requirements as described in detail in the applicable SAP PartnerEdge Model and the PartnerEdge Program Guide.
Information Security shall have the same meanings as the terms “information technology” and “information security”, respectively, in §24-37.5-102, C.R.S. Capitalized terms used herein and not otherwise defined herein or in the HIPAA Rules shall have the meanings ascribed to them in the Contract.
Data Security Requirements means, collectively, all of the following, to the extent relating to privacy or data security and applicable to the Company or to its conduct of the Business: (i) the Company’s own rules, policies, and procedures; (ii) all applicable laws; (iii) industry standards applicable to the industry in which the Company operates; and (iv) Contracts into which the Company has entered or by which it is otherwise bound.
Information Regulator means the Information Regulator as established in terms of Section 39 of POPIA;
Covered contractor information system means an information system that is owned or operated by a contractor that processes, stores, or transmits Federal contract information.
Information Security Breach means the unauthorized acquisition, access, use, disclosure, transmittal, storage or transportation of Confidential Information which is not permitted by law or by the terms of this Amendment, including, but not limited to, a Security Incident.
Security Procedures means rules and regulations governing access to, and health and safety procedures while on, Government premises; and information technology security protocols;
Privacy Requirements means all applicable Privacy Laws and all of the Company’s and the Company Subsidiaries’ policies, notices, and contractual obligations relating to the Processing of Personal Information.
Phone/Electronic Transaction Security Procedures means security procedures for Phone/ Electronic Transactions as provided in writing to the Underwriter.
Contractor information system means an information system belonging to, or operated by or for, the Contractor.
Phone/Electronic Transaction Security Procedures means security procedures for Phone/ Electronic Transactions as provided in writing to the Underwriter.
Safeguards Monitoring Report means each report prepared and submitted by the Borrower to ADB that describes progress with implementation of and compliance with the EMP and the RP (as applicable), including any corrective and preventative actions;
Privacy and Security Requirements means (a) all Privacy Laws; (b) all applicable Privacy Contracts, and (c) all applicable Privacy Policies.
ISM Code Documentation includes, in respect of a Ship:
Regulatory Requirement means any law, regulation or court order, or any rule, direction, guideline, code, notice or restriction (whether or not having the force of law) issued by any regulatory authority, governmental agency (including tax authority), clearing or settlement bank or exchange, or industry or self-regulatory body, whether in or outside Hong Kong, to which HKICL, we or any other Participant or the respective affiliates or group companies, or you are subject or are expected to comply with from time to time.
Customer information systems means any methods used to access, collect, store, use, transmit, protect, or dispose of customer in- formation.
Cardholder Information means any non-public, sensitive information about a Cardholder, including any combination of Cardholder name plus the Cardholder’s social security number, driver’s license or other identification number or credit or debit card number, or other bank account number.
Information Provider means the person or organisation providing the Information under this licence.
technical and organizational security measures means those measures aimed at protecting personal data against accidental or unlawful destruction or accidental loss, alteration, unauthorized disclosure or access, in particular where the processing involves the transmission of data over a network, and against all other unlawful forms of processing.
Regulatory Requirements means all applicable laws, rules, regulations, orders, requirements, guidelines, interpretations, directives and requests (whether or not having the force of law) from and of, and plans, memoranda and agreements with, any Regulatory Authority.
Information Service Traffic Traffic delivered to or from an Information Service Provider for the provision of Information Service. ISP-Bound Traffic is a subset of Information Service Traffic. Inside Wire or Inside Wiring: Wiring within the customer Premises that extends to the Demarcation Point of CenturyLink’s outside plant. Inside Wire is owned or controlled by the End User (unless otherwise specified herein or under Applicable Law).
Information processing system means an electronic system for creating, generating, sending, receiving, storing, displaying, or processing information.
Coordinated licensure information system means an integrated process for collecting, storing, and sharing information on nurse licensure and enforcement activities related to nurse licensure laws that is administered by a nonprofit organization composed of and controlled by licensing boards.
Applicable Technical Requirements and Standards means those certain technical requirements and standards applicable to interconnections of generation and/or transmission facilities with the facilities of an Interconnected Transmission Owner or, as the case may be and to the extent applicable, of an Electric Distributor, as published by Transmission Provider in a PJM Manual provided, however, that, with respect to any generation facilities with maximum generating capacity of 2 MW or less (synchronous) or 5 MW or less (inverter-based) for which the Interconnection Customer executes a Construction Service Agreement or Interconnection Service Agreement on or after March 19, 2005, “Applicable Technical Requirements and Standards” shall refer to the “PJM Small Generator Interconnection Applicable Technical Requirements and Standards.” All Applicable Technical Requirements and Standards shall be publicly available through postings on Transmission Provider’s internet website.
Security Requirements means the requirements regarding the security of Personal Data, as set out in the Data Protection Laws (including, in particular, the seventh data protection principle of the DPA and/ or the measures set out in Article 32(1) of the GDPR (taking due account of the matters described in Article 32(2) of the GDPR)) as applicable;