Privacy and Security definition

Privacy and Security. Policies shall mean the HIPAA compliant policies and procedures developed and adopted by each Party that govern the privacy and security of access to NC HealthConnex and the NC HealthConnex Resources.
Privacy and Security means the maintenance of health care records in a manner which ensures that access is available only to individuals and/or agencies that have a right to the information.
Privacy and Security. The Xchange Market Platform conforms to better than industry standard privacy and security standards with multiple redundant back-up systems. Each Reseller’s confidential data is accessible only by that Reseller and Xchange Market Corporation, and not any other Vendor or Reseller. NDA’s between Vendor and Xchange Market Corporation are executed prior to system set up.

Examples of Privacy and Security in a sentence

  • The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education.

  • Contractor shall initially report to HHS's Privacy and Security Officers via email at: privacy@HHSC.state.tx.us and to the HHS division responsible for the Base Contract.Contractor shall report all information reasonably available to Contractor about the Breach.Contractor shall provide contact information to HHS for Contractor's single point of contact who will communicate with HHS both on and off business hours during the incident response period.

  • Education Law Section 2-d requires that Contractor provide the EA with a Data Privacy and Security Plan that outlines such safeguards, measures and controls including how the Contractor will implement all applicable state, federal and local data security and privacy requirements.

  • As required by Education Law Section 2-d, the Parents Bill of Rights for Data Privacy and Security and the supplemental information for the Service Agreement are included as Exhibit A and Exhibit B, respectively, and incorporated into this DPA.

  • Any ambiguity in this Agreement shall be resolved to permit Covered Entity to comply with the Privacy and Security Rules.

  • Not to use or disclose DHCS PI or PII other than as permitted or 14 required by this Personal Information Privacy and Security Contract or as required by applicable state 15 and federal law.

  • In the event of any conflict between the mandatory provisions of HIPAA, the HITECH Act or the Privacy and Security Rule, and the provisions of this BAA, HIPAA, the HITECH Act or the Privacy and Security Rule shall control.

  • This BAA shall be interpreted as broadly as necessary to implement and comply with HIPAA, the HITECH Act, the Privacy and Security Rule and applicable state and federal laws.

  • If CE is required to document a disclosure of PHI made by BA, BA shall assist CE in documenting disclosures of PHI made by BA so that CE may respond to a request for an accounting in accordance with HIPAA, the HITECH Act, and the Privacy and Security Rule.

  • Where the provisions of this BAA differ from those mandated by HIPAA, the HITECH Act or the Privacy and Security Rule but are nonetheless permitted by HIPAA, the HITECH Act or the Privacy and Security Rule, the provisions of the BAA shall control.


More Definitions of Privacy and Security

Privacy and Security. Data collected and stored by Nelnet pursuant to this Agreement is governed by the Institution's privacy policy. This data will not be used by Nelnet in any manner not approved by the Institution unless required by law (for example, a court order or subpoena). Access to the data shall be restricted to authorized associates and shall be used only for the purposes of providing service to you or the Institution. Nelnet maintains physical, procedural, and electronic safeguards to protect data from being accessed by unauthorized third parties. Nelnet privacy policy will govern use of your information only in the event that you request additional services directly from Nelnet or its affiliates.
Privacy and Security. We care about the privacy of our Users. You understand that by using the Services you consent to the collection, use and disclosure of your personally identifiable information and aggregate data as set forth in

Related to Privacy and Security

  • Privacy and Security Laws means any and all international, local, country-specific, or U.S. State or Federal laws, regulations, directives, standards, guidelines, policies, or procedures, as amended, applicable to Supplier pertaining to the security, confidentiality, or privacy of Buyer Data.

  • Privacy and Security Requirements means (a) all Privacy Laws; (b) all applicable Privacy Contracts, and (c) all applicable Privacy Policies.

  • Information Privacy and Security Laws means all applicable laws concerning the privacy, data protection, transfer, or security of Personal Confidential Information, including, to the extent applicable, the General Data Protection Regulation (EU), other state, and federal, data security laws, data breach notification laws, and consumer protection laws.

  • Privacy/Data Security Laws means all laws governing the receipt, collection, use, storage, processing, sharing, security, disclosure, or transfer of Personal Information or the security of Company’s Business Systems or Business Data.

  • Privacy Shield means the European Union (EU) -U.S. and Switzerland – U.S. Privacy Shield frameworks.

  • Data Security Requirements means, collectively, all of the following to the extent relating to Data Treatment, to any privacy, security, or security breach notification requirements applicable to the Company or any Retained Subsidiary, to the conduct of the Management and Franchise Business, or to any System: (i) PCI-DSS, (ii) the Company’s and the Retained Subsidiaries’ own rules and policies and (iii) applicable Law.

  • Privacy Act means the Privacy Act 1988 (Cth).

  • Mass Privacy Act is defined in Section 9.2 hereof.

  • Privacy Requirements means all applicable Privacy Laws and all of the Company’s and the Company Subsidiaries’ policies, notices, and contractual obligations relating to the Processing of Personal Information.

  • Privacy Standards means the standards of the privacy of individually identifiable health information, as pursuant to HIPAA.

  • Customer information systems means any methods used to access, collect, store, use, transmit, protect, or dispose of customer in- formation.

  • Information Security (GSN GISN 5) is all the means and functions ensuring the accessibility, confidentiality or integrity of information or communications, excluding the means and functions intended to safeguard against malfunctions. This includes "cryptography", "cryptographic activation", 'cryptanalysis', protection against compromising emanations and computer security.

  • The HIPAA Privacy Rule means the Standards for Privacy of Individually 10 Identifiable Health Information at 45 CFR Part 160 and Part 164, Subparts A and E.

  • Contractor information system means an information system belonging to, or operated by or for, the Contractor.

  • Privacy Rule means the Standards for Privacy of Individually Identifiable Health Information at 45 C.F.R. part 160 and part 164, subparts A and E.

  • Consumer Information Any personally identifiable information in any form (written electronic or otherwise) relating to a Mortgagor, including, but not limited to: a Mortgagor’s name, address, telephone number, Mortgage Loan number, Mortgage Loan payment history, delinquency status, insurance carrier or payment information, tax amount or payment information; the fact that the Mortgagor has a relationship with the Seller or Servicer or the originator of the related Mortgage Loan; and any other non-public personally identifiable information.

  • Guaranty and Security Agreement means a guaranty and security agreement, dated as of even date with this Agreement, in form and substance reasonably satisfactory to Agent, executed and delivered by each of the Loan Parties to Agent.

  • air traffic means all aircraft in flight or operating on the manoeuvring area of an aerodrome;

  • Customer Information means any information contained on a customer’s application or other form and all nonpublic personal information about a customer that a Party receives from the other Party. Customer Information shall include, but not be limited to, name, address, telephone number, social security number, health information, and personal financial information (which may include a Masterworks user account number).

  • Patient Information means information (however recorded) which—

  • HIPAA Privacy Rule means the regulations promulgated under HIPAA by the United States Department of Health and Human Services to protect the privacy of Protected Health Information, including, but not limited to, 45 CFR Part 160 and 45 CFR Part 164, Subpart A and Subpart E.

  • Customer User means an employee of Customer, a Customer Affiliate or Business Partner.

  • GLO Data means any data or information owned by the GLO, including PII or SPI as defined below, that Provider creates, obtains, accesses (via records, systems, or otherwise), receives (from the GLO or on behalf of the GLO), or uses in the performance of the Contract or any documents related thereto.

  • Privacy means a specific area or time over which the resident maintains a large degree of control. Privacy is supported with services that are delivered with respect for the resident's civil rights.

  • Reference Security means the security specified as such in the relevant Final Terms. If a Reference Security is no longer outstanding, a Similar Security will be chosen by the Quotation Agent at 11:00 a.m. (CET) on the third Business Day preceding the Make-whole Redemption Date, quoted in writing by the Quotation Agent to the Issuer and published in accordance with Condition 12 (Notices).

  • Loaned Security means any “security” which is delivered as a Loan under a Securities Loan Agreement; provided that, if any new or different security shall be exchanged for any Loaned Security by recapitalization, merger, consolidation, or other corporate action, such new or different security shall, effective upon such exchange, be deemed to become a Loaned Security in substitution for the former Loaned Security for which such exchange was made.