Protective Data Security Standards definition

Protective Data Security Standards means any standard issued under Part 4 of the Privacy and Data Protection Act 2014 (Vic) and any policies or protocols issued by the Organisation to ensure compliance with those standards.
Protective Data Security Standards means any standard issued under Part 4 of the Privacy and Data Protection Act 2014 (Vic) and any policies or protocols issued by CSV to ensure compliance with those standards. Purchase Order means the purchase order attached to these Terms and Conditions or any form of order or acknowledgment from CSV for the supply of the Goods and/or the provision of the Services which incorporates these Terms and Conditions. Services means the services as specified in the Purchase Order.

Examples of Protective Data Security Standards in a sentence

  • The Licensee acknowledges that the School Council is bound by the Protective Data Security Standards.

  • The Supplier agrees to be bound by the Protective Data Security Standards and will not do any act or engage in any practice that contravenes a Protective Data Security Standard in respect of any data collected, held, used, managed, disclosed or transferred by the Supplier, on behalf of the School Council, under or in connection with this Contract.

  • BDRC is bound by the following legislation, standards and principles:  The Privacy and Data Protection Act 2014 (Vic) and the Victorian Protective Data Security Standards (VPDSS).

  • An exempt authorised nominee refers to an authorised nominee defined under the SICDA which is exempted from compliance with the provisions of subsection 25A(1) of SICDA.

  • The Supplier acknowledges that the School Council is bound by the Protective Data Security Standards.

  • Meanwhile, Victoria uses the Victorian Protective Data Security Standards V2.0 (VPDSS)7 with 12 discrete controls.

  • A study found that stress created by immigration raids is linked to an increase in premature births and low birth weights.79 70.

  • The Supplier further acknowledges and agrees that it will be bound by the Protective Data Security Standards and must not do any act or engage in any practice that contravenes a Protective Data Security Standard in respect of any data collected, held, used, managed, disclosed or transferred by the Supplier, on behalf of CPVV, under or in connection with this Agreement, including all CPVV Data.

  • Furthermore, the System will be subject to the Victorian Protective Data Security Standards.

  • Ensuring all staff receive full training to ensure understanding. Audit Gippsland Water’s compliance with the Victorian Protective Data Security Standards.


More Definitions of Protective Data Security Standards

Protective Data Security Standards has the meaning given to that term in the Privacy and Data Protection Act 2014 (Vic). Purpose has the meaning given to that term in paragraph C of the Background. Software means a set of coded instructions that performs functions or provides working data or parameters to enable a device or system to operate in a specified manner, and be loaded into a system or device dynamically by a user and includes all firmware and operating systems required by a system or subsystem to perform in a specified manner, and includes all software used by the System where the Intellectual Property Rights in such Software are owned by the VRQA’s licensor and/or third party suppliers. State means the State of Victoria. System has the meaning given to that term in paragraph C of the Background. Term has the meaning given to that term in clause 1.
Protective Data Security Standards means the standards issued under Part 4 of the

Related to Protective Data Security Standards

  • Security Standards means the final rule implementing HIPAA’s Security Standards for the Protection of Electronic PHI, as amended.

  • Data Safeguards means the highest industry-standard safeguards (including administrative, physical, technical, and procedural safeguards) against the destruction, loss, misuse, unauthorized disclosure, or alteration of the JBE Data or Confidential Information, and such other related safeguards that are set forth in Applicable Laws, a Statement of Work, or pursuant to JBE policies or procedures.

  • Privacy/Data Security Laws means all laws governing the receipt, collection, use, storage, processing, sharing, security, disclosure, or transfer of Personal Information or the security of Company’s Business Systems or Business Data.

  • Technical safeguards means the technology and the policy and procedures for its use that 27 protect electronic PHI and control access to it.

  • Privacy Standards means the standards of the privacy of individually identifiable health information, as pursuant to HIPAA.

  • Customer information systems means any methods used to access, collect, store, use, transmit, protect, or dispose of customer in- formation.

  • Web Site Accessibility Standards/Specifications means standards contained in Title 1 Texas Administrative Code Chapter 206.

  • Data Security Requirements means, collectively, all of the following to the extent relating to Data Treatment, to any privacy, security, or security breach notification requirements applicable to the Company or any Retained Subsidiary, to the conduct of the Management and Franchise Business, or to any System: (i) PCI-DSS, (ii) the Company’s and the Retained Subsidiaries’ own rules and policies and (iii) applicable Law.

  • Technological safeguards means the technology and the policy and procedures for use of the technology to protect and control access to personal information.

  • Information Technology Systems means all information technology systems, Software, computers, workstations, databases, routers, hubs, switches, networks and other information technology equipment used or held for use in, or otherwise relating to, the Business.

  • Biometric information means any information, regardless of how it is captured, converted, stored, or shared, based on an individual’s biometric identifier used to identify an individual. Biometric information does not include information derived from items or procedures excluded under the definition of biometric identifiers.

  • Information Technology means computers, software, databases, firmware, middleware, servers, workstations, networks, systems, routers, hubs, switches, data communications lines, and all other information technology equipment and associated documentation.

  • Information Technologies means all information processing and communications-related hardware, Software, supplies, and consumable items that the Supplier is required to supply and install under the Contract.

  • Database Management System (DBMS) A system of manual procedures and computer programs used to create, store and update the data required to provide Selective Routing and/or Automatic Location Identification for 911 systems. Day: A calendar day unless otherwise specified. Dedicated Transport: UNE transmission path between one of CenturyLink’s Wire Centers or switches and another of CenturyLink’s Wire Centers or switches within the same LATA and State that are dedicated to a particular customer or carrier. Default: A Party’s violation of any material term or condition of the Agreement, or refusal or failure in any material respect to properly perform its obligations under this Agreement, including the failure to make any undisputed payment when due. A Party shall also be deemed in Default upon such Party’s insolvency or the initiation of bankruptcy or receivership proceedings by or against the Party or the failure to obtain or maintain any certification(s) or authorization(s) from the Commission which are necessary or appropriate for a Party to exchange traffic or order any service, facility or arrangement under this Agreement, or notice from the Party that it has ceased doing business in this State or receipt of publicly available information that signifies the Party is no longer doing business in this State.

  • National Ambient Air Quality Standards or “NAAQS” means national ambient air quality standards that are promulgated pursuant to Section 109 of the Act, 42 U.S.C. § 7409.

  • Data Security Breach means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, Personal Data transmitted, stored, or otherwise processed.

  • Database Management System (“DBMS”) is a computer process used to store, sort, manipulate and update the data required to provide Selective Routing and ALI.

  • Information technology services means services designed to do any of the following:

  • Information Technology Resources means agency budgetary resources, personnel, equipment, facilities, or services that are primarily used in the management, operation, acquisition, disposition, and transformation, or other activity related to the lifecycle of information technology; acquisitions or interagency agreements that include information technology and the services or equipment provided by such acquisitions or interagency agreements; but does not include grants to third parties which establish or support information technology not operated directly by the Federal Government. (0MB M-15-14)

  • Security Management Plan means the Supplier's security management plan prepared pursuant to paragraph 3 of schedule 2 an outline of which is set out in paragraph 2.7 of the Order Form as updated from time to time;

  • Accessibility Standards means accessibility standards and specifications for Texas agency and institution of higher education websites and EIR set forth in 1 TAC Chapter 206 and/or Chapter 213.

  • Customer Proprietary Network Information (“CPNI”) is as defined in the Act.

  • Safety Standards means all laws, union rules and trade or industry custom or codes of any kind whatsoever, in effect from the date of this Agreement through Final Acceptance of the construction work, pertaining to worker safety and accident prevention applicable to the Project and/or the construction work (including, but not limited to, rules, regulations and standards adopted pursuant to the Occupational Safety and Health Act of 1970, as amended from time to time).

  • Procurement Code means §13-1-101, et seq., XXXX 0000, as amended and supplemented from time to time.

  • NIST Cybersecurity Framework means the U.S. Department of Commerce National Institute for Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity (Version 1.1).

  • HITECH means the Health Information Technology for Economic and Clinical Health Act.