Security Best Practices definition

Security Best Practices means security procedures that are at the highest of the following: (i) privacy & IT security best practices of any standards agreed upon by the parties (e.g., ISO, SANS); (ii) the privacy and security requirements mandated by Data Protection Laws; and (iii) the security requirements, obligations, specifications, and event reporting procedures set forth in this Exhibit.
Security Best Practices. The Bank provides important information, recommendations and best practices for Internet banking security on its Account.” If you close your Primary Checking Account, you must contact us immediately to designate another Account as your Primary Checking Account. You agree to pay any and all additional charges for services you request which are not covered by this Agreement. You are also responsible for telephone and Internet service fees you incur in connection with your use of Online Banking.
Security Best Practices means, as applicable, standards, requirements, specifications or obligations that are at levels the highest of the following: (a) Privacy & IT Security Best Practices (as defined by ISO 27001/27002); (b) Cloud Security Alliance assessments against the Cloud Controls Matrix (for hosted services); (c) SSAE 16, SOC 2 and SOC 3 auditing standards; (d) Shared Services Assessment certifications (xxx.xxxxxxxxxxxxxxxxx.xxx); (e) the U.S. Federal Risk and Authorization Management Program (FedRAMP); (vi) measurements and standards developed by the National Institute of Standards and Technology (NIST); (f) any security requirements, standards, obligations, specifications and/or event reporting procedures required by any Data Law; and (g) industry best and leading practices related to information security, physical access, logical access, security architecture and design, system and network management, records management, data handling and data transfer, remediation and breach notification.

Examples of Security Best Practices in a sentence

  • The Requester agrees through the submission of the DAR that the PI named has reviewed and understands the principles for responsible research use and data management of the genomic datasets as defined in the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy.

  • The IT Director is expected to have the authority and capacity to ensure that the NIH Security Best Practices for Controlled-Access Data Subject to the NIH GDS Policy and the Requester’s IT security requirements and policies are followed by all of the Requester’s Approved Users.

  • The Requester and Approved Users, including the Requester’s IT Director, acknowledge NIH’s expectation that they have reviewed and agree to manage the requested controlled-access dataset(s) and any Data Derivatives of controlled-access datasets according to NIH’s expectations set forth in the current NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy and the Requester’s IT security requirements and policies.

  • If approved by NIH to use cloud computing for the proposed research project, as outlined in the Research and Cloud Computing Use Statements of the Data Access Request, the Requester acknowledges that the IT Director has reviewed and understands the cloud computing guidelines in the NIH Security Best Practices for Controlled-Access Data Subject to the NIH GDS Policy.

  • Each Approved User will follow all data security practices and other terms of use defined in this Agreement, the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy, and the Requester’s IT security requirements and policies.

  • In addition, the PI is expected to include in any contract agreement requirements to ensure that any of the contractor’s employees who have access to the data adhere to the NIH GDS Policy, this Data Use Certification Agreement, and the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy.

  • A Requester who retains data for any of these purposes continues to be a xxxxxxx of the data and is responsible for the management of the retained data in accordance with the NIH Security Best Practices for ControlledAccess Data Subject to the NIH Genomic Data Sharing (GDS) Policy, and any institutional policies.

  • If approved by NIH to use cloud computing for the proposed research project, as outlined in the Research and Cloud Computing Use Statements of the Data Access Request, the Requester acknowledges that the IT Director has reviewed and understands the cloud computing guidelines in the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy.

  • All data security practices and other terms of use defined in this agreement and the dbGaP Security Best Practices for the raw data are expected to be followed for the derived data, including any transmission of the data.

  • Each Approved User will follow all data security practices and other terms of use defined in this Agreement, the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy and the Requester’s IT security requirements and policies.

Related to Security Best Practices

  • Best Practice means solutions, techniques, methods and approaches which are appropriate, cost-effective and state of the art (at Member State and sector level), and which are implemented at an operational scale and under conditions that allow the achievement of the impacts set out in the award criterion ’Impact’ first paragraph (see below).

  • Standards of Practice means the care, skill, and

  • Best management practices (BMP) means schedules of activities, prohibitions of practices, maintenance procedures, and other management practices to prevent or reduce the pollution of waters of the United States. BMPs include treatment requirements, operation procedures, and practices to control plant site runoff, spillage or leaks, sludge or waste disposal, or drainage from raw material storage.

  • Forest practice means any activity conducted on or directly pertaining to forest land and relating to growing, harvesting, or processing timber, including but not limited to:

  • Best Management Practices (BMPs means schedules of activities, prohibitions of practices, maintenance procedures, and other management practices to prevent or reduce the pollution of waters of the state. BMPs also include treatment requirements, operating procedures, and practices to control site runoff, spillage or leaks, sludge or waste disposal, or drainage from raw material storage.

  • New Jersey Stormwater Best Management Practices (BMP) Manual or “BMP Manual” means the manual maintained by the Department providing, in part, design specifications, removal rates, calculation methods, and soil testing procedures approved by the Department as being capable of contributing to the achievement of the stormwater management standards specified in this chapter. The BMP Manual is periodically amended by the Department as necessary to provide design specifications on additional best management practices and new information on already included practices reflecting the best available current information regarding the particular practice and the Department’s determination as to the ability of that best management practice to contribute to compliance with the standards contained in this chapter. Alternative stormwater management measures, removal rates, or calculation methods may be utilized, subject to any limitations specified in this chapter, provided the design engineer demonstrates to the municipality, in accordance with Section IV.F. of this ordinance and N.J.A.C. 7:8-5.2(g), that the proposed measure and its design will contribute to achievement of the design and performance standards established by this chapter.

  • Prudent Utility Practices means those practices, methods, techniques and standards, that are generally accepted for use in electric utility industries taking into account conditions in India, and commonly used in prudent electric utility engineering and operations to design, engineer, construct, test, operate and maintain equipment lawfully, safely, efficiently and economically as applicable to power stations of the size, service and type of the Project, and that generally conform to the manufacturers' operation and maintenance guidelines.

  • Good Industry Practices means the practices that would be adopted by, and the exercise of that degree of care, skill, diligence, prudence and foresight that reasonably would be expected from, a competent contractor in the international oil and gas industry experienced in performing work similar in nature, size, scope and complexity to the Work and under conditions comparable to those applicable to the Work, where such work is subject to, and such contractor is seeking to comply with, the standards and codes specified in the Contract or (to the extent that they are not so specified) such national or international standards and codes as are most applicable in the circumstances, and the applicable Law.

  • Best management practice or "BMP" means schedules of activities, prohibitions of practices, including both structural and nonstructural practices, maintenance procedures, and other management practices to prevent or reduce the pollution of surface waters and groundwater systems from the impacts of land-disturbing activities.

  • Scope of practice means defined parameters of various duties or services that may be provided by an individual with specific credentials. Whether regulated by rule, statute, or court decision, it tends to represent the limits of services an individual may perform.

  • coercive practices means harming or threatening to harm, directly or indirectly, persons, or their property to influence their participation in a procurement process, or affect the execution of a contract;

  • Best Industry Practice means that degree of skill, care and foresight and operating practice that would reasonably and ordinarily be expected of a skilled and competent supplier of services engaged in the same type of undertaking as that of the Recipient or any contractors (as applicable) under the same or similar circumstances as those contemplated by this Agreement.