Information Security Terms definition

Information Security Terms means the Information Security Terms of IHS Markit attached hereto and identified as Exhibit C;
Information Security Terms means the Information Security Terms of MSFA attached hereto and identified as Exhibit C;

Examples of Information Security Terms in a sentence

  • Italicized terms not defined in this policy shall have the meanings contained in City Information Security Policy No. 13.00: Glossary of Information Security Terms.

  • Key TerminologyFor PCI DSS-specific terminology, the PCI Security Standards Council’s Glossary is the authoritative source for terminology definitions.1 For other cybersecurity terminology, the National Institute of Standards and Technology (NIST) IR 7298, Glossary of Key Information Security Terms, is the alternative reference document that ACME uses to define common cybersecurity terms.

  • As these key words have become more generally understood and guidance has become available through the NIST regarding specific key terms, suchas intranet, extranet, and internet, (see, for example, NIST IR 7298 Revision 1, Glossary of Key Information Security Terms, February 2011, available at http://csrc.nist.gov/publications/nistir/ir7298-rev1/nistir-7298-revision1.pdf), we believe the parenthetical language is no longer helpful.

  • If Supplier processes, stores or hosts Confidential Information during the performance of the Contract, Supplier must comply with CAE’s Information Security Terms for Suppliers available on CAE’s webpage for suppliers: https://www.cae.com/suppliers/.

  • This is notable as the May 2013 NIST Glossary of Key Information Security Terms cites the Committee on National Security Systems Instruction 4009, titled National Information Assurance (IA) Glossary, when defining cyber-attack, which includes “… stealing controlled information” (Glossary of Key Information Security Terms, 2013, p.

  • These IHS Markit Information Security Terms (“Information Security Terms”) constitute the information security terms with which IHS Markit shall use its reasonable efforts to comply in the course of providing the Services to Customer under the Agreement.

  • HortonWorks will log all attempted accesses to its servers (including time and date thereof) involved in performing obligations to or for Yahoo or otherwise conducted pursuant to these Information Security Terms and/or the Agreement, and the result of such attempts, successful or unsuccessful.

  • Yahoo may request suspension of any Personnel or Subcontractor (or Subcontractor personnel) if Yahoo reasonably believes (and reasonably demonstrates to HortonWorks) that such Personnel or Subcontractor (or Subcontractor personnel) has violated or risks violating any confidentiality obligations (as set forth in Section 10 (Confidentiality)) or Site access and data security obligations (as set forth in Section 11 (Site Access and Data Security) and Exhibit E (Information Security Terms)).

  • Innovative will make commercially reasonable efforts to provide Client notice of scheduled system maintenance 48 hours in advance.Exhibit DInnovative Interfaces Incorporated Information Security Terms and ConditionsUnless otherwise specified, capitalized terms in these Information Security Terms and Conditions have the same meaning as those in the GTCs. The terms set forth herein supplement, but do not replace or modify, the GTCs.

  • Yahoo will provide access to the Development Servers in accordance with this Agreement (including Section 11 (Site Access and Data Security) and Exhibit E (Information Security Terms)) to qualified HortonWorks Personnel with a valid business need to access the Development Servers.

Related to Information Security Terms

  • Information Security (GSN GISN 5) is all the means and functions ensuring the accessibility, confidentiality or integrity of information or communications, excluding the means and functions intended to safeguard against malfunctions. This includes "cryptography", "cryptographic activation", 'cryptanalysis', protection against compromising emanations and computer security.

  • Information Security Program means the administrative, technical, and physical safeguards that a licensee uses to access, collect, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle nonpublic information.

  • Information Security Breach means the unauthorized acquisition, access, use, disclosure, transmittal, storage or transportation of Confidential Information which is not permitted by law or by the terms of this Amendment, including, but not limited to, a Security Incident.

  • Information Security Incident means (i) any actual or suspected incident involving Seller Information System that may involve Buyer’s Sensitive Information, or (ii) any actual or suspected unauthorized access to, use, or disclosure of Buyer’s Sensitive Information.

  • Transaction Security means the Security created or expressed to be created in favour of the Security Agent pursuant to the Transaction Security Documents.

  • Confidential Information Memorandum means the Confidential Information Memorandum of the Borrower dated December 2010 delivered to the Lenders in connection with this Agreement.

  • Security Information means account numbers and/or Username as applicable, passwords and other information required to identify you for the purposes of you trading with us under this Agreement.

  • Security Tests means conduct tests of the processes and countermeasures contained in the Security Plan.

  • Transaction Security Documents means each of the documents listed as being a Transaction Security Document in paragraph 2(e) of Part I of Schedule 2 (Conditions Precedent) of the 2009 Financing Agreement and any document required to be delivered to the Administrative Agent under paragraph 3(d) of Part II of Schedule 2 (Conditions Precedent) of the 2009 Financing Agreement together with any other document entered into by any Obligor creating or expressed to create any Security over all or any part of its assets in respect of the obligations of any of the Obligors under any of the Finance Documents (and any other Debt Documents).

  • Phone/Electronic Transaction Security Procedures means security procedures for Phone/ Electronic Transactions as provided in writing to the Underwriter.

  • Commercial Information means information regarding the purchase and sale of goods and services, including, but not limited to, information regarding marketing strategy, production data, assessments of goods and services, mineral exploration records, and compilations of data regarding commercial activity.

  • Information Provider means the person or organisation providing the Information under this licence.

  • National Security Information means information that has been determined pursuant to Executive Order 13526 or any predecessor order to require protection against unauthorized disclosure and is marked to indicate its classified status when in documentary form. Classified or national security information is specifically authorized to be protected from unauthorized disclosure in the interest of national defense or foreign policy under an Executive Order or Act of Congress.

  • Intellectual Property Security Agreement means a Copyright Security Agreement, a Patent Security Agreement or a Trademark Security Agreement.

  • Confidential commercial information means records provided to the govern- ment by a submitter that arguably contain material exempt from release under Exemption 4 of the Freedom of Information Act, 5 U.S.C. 552(b)(4), be- cause disclosure could reasonably be expected to cause substantial competi- tive harm.

  • Underwriter Information means the information set forth in the third paragraph (regarding concessions and discounts) and the second sentence of the thirteenth paragraph (regarding market making) under the caption “Underwriting” in the Preliminary Prospectus or Prospectus. This indemnity agreement will be in addition to any liability that each Underwriter may otherwise have.

  • E-Auction Process Information Document means this document including all the appendices hereto, for the purposes of setting out the process for submission of a bid and selection of Successful Bid in accordance with the provisions of the IBC and shall include all supplements, modifications, amendments, alterations or clarifications thereto issued in accordance with the terms hereof.

  • Phone/Electronic Transaction Security Procedures means security procedures for Phone/ Electronic Transactions as provided in writing to the Underwriter.

  • Information Privacy and Security Laws means all applicable laws concerning the privacy, data protection, transfer, or security of Personal Confidential Information, including, to the extent applicable, the General Data Protection Regulation (EU), other state, and federal, data security laws, data breach notification laws, and consumer protection laws.

  • Information Circular means a completed Form 51-102F5 Information Circular; “informed person” means

  • Regulatory Information Service means a regulatory information service as defined in the Takeover Rules.

  • Privacy/Data Security Laws means all laws governing the receipt, collection, use, storage, processing, sharing, security, disclosure, or transfer of Personal Information or the security of Company’s Business Systems or Business Data.

  • Data Room Information means the information and documents listed in the index of documents contained in the Data Site attached to the Company Disclosure Letter;

  • Confidential commercial or financial information means any business information (other than trade secrets) which is exempt from the mandatory disclosure requirement of the Freedom of Information Act, 5 U.S.C. 552. Exemptions from mandatory disclosure which may be applicable to business information contained in proposals include exemption (4), which covers “commercial and financial information obtained from a person and privileged or confidential,” and exemption (9), which covers “geological and geophysical information, including maps, concerning wells.”

  • Intellectual Property Security Agreements has the meaning specified in the Security Agreement.

  • ABS Underwriter Derived Information means any analytical or computational materials as described in clause (5) of footnote 271 of Commission Release No. 33-8591, issued July 19, 2005 (Securities Offering Reform) (the “Securities Offering Reform Release”).