Security and Privacy definition

Security and Privacy means the Security and Privacy Documentation applicable to the specific Services purchased by Customer, as updated from time to time, and accessible via xxxxx://xxx.xxxxxxxxxxxx.xxx, or as otherwise made reasonably available by ITG.
Security and Privacy. CoVantage has taken steps to protect the privacy and security of your personal information as well as financial transactions with us. You should read our privacy notice before completing the enrollment process for this Service or consenting to this Agreement. Our privacy notice is available on our website. MyCoVantage utilizes a comprehensive layered security strategy to protect your accounts and transactions conducted over the Internet and using all other applicable virtual channels. Registration and activation of your access to MyCoVantage is based on verification of your identity against information associated with the eligible account(s) that you request to be accessible via MyCoVantage. Successful registration is additionally dependent on passing an Out Of Band authentication procedure which consists of either a call or a text to a phone number already on file on the account. Any member utilizing the CoVantage Credit Union Skills enabled through an Alexa or Google Assistant enabled device is responsible for any interaction between CoVantage Credit Union and the Alexa enabled device or Google Assistant enabled device. It is possible that settings on the device may allow verbal requests from anyone who uses the device with access to your PIN. As well, it is also possible for someone other than you could interact with CoVantage Credit Union via the Alexa or the Google enabled device, overhear confidential information while performing a transaction, or other enabled skill within the Alexa enabled device. An Alexa or Google Assistant enabled device may send member data to Amazon OR Google. Consult your agreement with Amazon and/or Google to determine how to treat those interactions. By enabling the CoVantage Credit Union Skill on the Alexa or Google Assistant enabled device, you are responsible for how the CoVantage Credit Union Skill is utilized in the environment in which it is used. This includes any communication to or from CoVantage Credit Union from your device. You are responsible for keeping your user name/ID, password and/or other personally identifiable account information secure and confidential. You determine your own password, which is encrypted in our database. No one at CoVantage has access to this information. EXCEPT AS SET FORTH IN THIS AGREEMENT, COVANTAGE WILL NOT BE LIABLE FOR ANY LOSS SUFFERED BY ANY MEMBER AS A RESULT, DIRECTLY OR INDIRECTLY, OF ANY UNAUTHORIZED PERSON GAINING ACCESS TO OR OTHERWISE MAKING USE OF MYCOVANTAGE, EXCEPT A...

Examples of Security and Privacy in a sentence

  • Please note that any proposed compensating controls and/or requirement modifications must be noted in Appendix A - Compensating Controls to Security and Privacy Requirements.

  • Complete and return with the Base Contract to HHS, attached as Attachment 2 to this DUA, the HHS Security and Privacy Initial Inquiry (SPI) at https://hhs.texas.gov/laws- regulations/forms/miscellaneous/hhs-information-security-privacy-initial-inquiry-spi.

  • The IT-RA shall be consistent, in form and content, with NIST SP 800-30, Risk Management Guide for Information Technology Systems, and any additions or augmentations described in the HHS-OCIO Information Systems Security and Privacy Policy.

  • HHS-OCIO Information Systems Security and Privacy Policy.2. IT Risk Assessment (IT-RA) - due within 30 days after contract award.

  • The SSP shall comply with the NIST SP 800-18, Guide for Developing Security Plans for Federal Information Systems, the Federal Information Processing Standard (FIPS) 200, Recommended Security Controls for Federal Information Systems, and NIST SP 800-53, Security and Privacy Controls for Federal Information Systems and Organizations applicable baseline requirements, and other applicable NIST guidance as well as HHS and NIH policies and other guidance.

  • As more fully described herein, throughout the term of the Master Agreement, Vendor will have a Data Security and Privacy Plan in place to protect the confidentiality, privacy and security of the Protected Data it receives from the District.

  • The security controls must be designed, developed, approved by VA, and implemented in accordance with the provisions of VA security system development life cycle as outlined in NIST Special Publication 800-37, Guide for Applying the Risk Management Framework to Federal Information Systems, VA Handbook 6500, Information Security Program and VA Handbook 6500.5, Incorporating Security and Privacy in System Development Lifecycle.

  • Contractor’s Data Security and Privacy Plan is attached to this DPA as Exhibit C.

  • Such policy shall also include coverage for losses arising from the breach of information security or cyber liability (including Errors & Omissions, Security and Privacy Liability and Media Liability), whether combined with the Professional Liability policy or placed as a separate policy, but carrying the same limits of liability.

  • Obtain the HHS Information Security Program security requirements, outlined in the HHS Information Security and Privacy Policy (IS2P), by contacting the CO/COR or emailing fisma@hhs.gov.

Related to Security and Privacy

  • Information Privacy and Security Laws means all applicable laws concerning the privacy, data protection, transfer, or security of Personal Confidential Information, including, to the extent applicable, the General Data Protection Regulation (EU), other state, and federal, data security laws, data breach notification laws, and consumer protection laws.

  • Privacy and Security Laws means applicable Laws that govern the Processing, privacy or security of Personal Information.

  • Security and Pledge Agreement shall have the meaning set forth in Section 4.01(c).

  • Privacy means a specific area or time over which the resident maintains a large degree of control. Privacy is supported with services that are delivered with respect for the resident's civil rights.

  • Privacy and Security Requirements means (a) all Privacy Laws; (b) all applicable Privacy Contracts, and (c) all applicable Privacy Policies.

  • Privacy/Data Security Laws means all Laws governing the receipt, collection, use, storage, processing, sharing, security, disclosure, or transfer of Personal Information and any applicable Laws concerning requirements for website and mobile application privacy policies and practices, call or electronic monitoring or recording or any outbound communications (including outbound calling and text messaging, telemarketing, and e-mail marketing).

  • Data Privacy Laws means any state or national law or regulation protecting the privacy, confidentiality, or security of Personal Information.

  • The HIPAA Privacy Rule means the Standards for Privacy of Individually 10 Identifiable Health Information at 45 CFR Part 160 and Part 164, Subparts A and E.

  • Security Rule means the Security Standards for the Protection of Electronic Protected Health Information at 45 C.F.R. part 160 and part 164, subpart A and C.

  • HIPAA Privacy Rule as defined in 45 CFR Part 164, Subparts A and E.

  • Guaranty and Security Agreement means a guaranty and security agreement, dated as of even date with the Agreement, in form and substance reasonably satisfactory to Agent, executed and delivered by each of the Borrowers and each of the Guarantors to Agent.

  • Food Security Act means the Food Security Act of 1985, 7 U.S.C. §1631, as amended, and the regulations promulgated thereunder.

  • Consumer Information Any personally identifiable information in any form (written electronic or otherwise) relating to a Mortgagor, including, but not limited to: a Mortgagor’s name, address, telephone number, Mortgage Loan number, Mortgage Loan payment history, delinquency status, insurance carrier or payment information, tax amount or payment information; the fact that the Mortgagor has a relationship with the Seller or Servicer or the originator of the related Mortgage Loan; and any other non-public personally identifiable information.

  • Trademark Security Agreements means the Trademark Security Agreements made in favor of Agent, on behalf of itself and Lenders, by each applicable Credit Party.

  • Trademark Security Agreement means each Trademark Security Agreement executed and delivered by Grantors, or any of them, and Agent, in substantially the form of Exhibit D.

  • Security Policy Framework means the Cabinet Office Security Policy Framework (available from the Cabinet Office Security Policy Division);

  • Privacy Act means the Privacy Act 1988 (Cth).

  • Security Vulnerability means a flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in a security breach such that data is compromised, manipulated or stolen or the system damaged.

  • Security Policy means the Authority’s Security Policy annexed to Schedule (Security Requirements and Plan) as updated from time to time.

  • Security Agreement Collateral means all "Collateral" as defined in the Security Agreement.

  • Security freeze means a notice placed in a credit report, at the

  • Security Agreements means the U.S. Security Agreement and the Canadian Security Agreement.

  • Security Standards means the final rule implementing HIPAA’s Security Standards for the Protection of Electronic PHI, as amended.

  • Guaranty and Collateral Agreement means the Guaranty and Collateral Agreement dated as of the date hereof executed and delivered by the Loan Parties, together with any joinders thereto and any other guaranty and collateral agreement executed by a Loan Party, in each case in form and substance satisfactory to the Administrative Agent.

  • Patent and Trademark Security Agreement means the Patent and Trademark Security Agreement by the Borrower in favor of the Lender of even date herewith.