Security Control Requirements definition

Security Control Requirements has the meaning set out in para 3.1.1 of Schedule 7.

Examples of Security Control Requirements in a sentence

  • Third Party desires to retain access to certain Confidential Utility Information (as defined previously in this Data Security Agreement), Third Party must THEREFORE self-attest to Third Party’s compliance with the Information Security Control Requirements (“Requirements”) as listed herein.

  • Third Party desires to retain access to certain Confidential Utility Information1 (as defined in this Data Security Agreement), Third Party must THEREFORE self- attest to Third Party’s compliance with the Information Security Control Requirements (“Requirements”) as listed herein.

  • Any exceptions must be listed within the bid and must include both the excluded end products and the country of origin of each.While the Government will consider paper manufacturers outside of the United States that can best meet the requirements of the specifications, the supply chain of all materials will be subject to the Security Control Requirements.

  • Third Party desires to retain access to certain Confidential Utility Information2 (as defined in this Data Security Agreement), Third Party must THEREFORE self- attest to Third Party’s compliance with the Information Security Control Requirements (“Requirements”) as listed herein.

  • Third Party desires to retain access to certain Confidential Customer Utility Information1 (as defined in this Data Security Agreement), Third Party must THEREFORE self-attest to Third Party’s compliance with the Information Security Control Requirements (“Requirements”) as listed herein.

  • Subscribing LEA: BY: Date: Printed Name: Title/Position: TO ACCEPT THE GENERAL OFFER, THE SUBSCRIBING LEA MUST DELIVER THIS SIGNED EXHIBIT TO THE PERSON AND EMAIL ADDRESS LISTED ABOVE These Zoom Minimum Security Control Requirements (“Minimum Control Requirements”) are stated at a relatively high level.

  • ESE desires to retain access to certain Confidential Company Information1 (as defined in this Data Security Agreement), ESE must THEREFORE self- attest to ESE’s compliance with the Information Security Control Requirements (“Requirements”) as listed herein.

  • We will also provide you with a Business Online Banking Customer Security Control Requirements and Best Practices Checklist, which we recommend you carefully read and consider prior to executing.

  • Explain how you comply with Security Control Requirements governing identity theft initiatives.

  • SECTION 4: Security Control Requirements Overview This section defines requirements that must be met for agencies to properly protect confidential information under their administrative control.

Related to Security Control Requirements

  • Security Requirements means the requirements regarding the security of Personal Data, as set out in the Data Protection Laws (including, in particular, the seventh data protection principle of the DPA and/ or the measures set out in Article 32(1) of the GDPR (taking due account of the matters described in Article 32(2) of the GDPR)) as applicable;

  • Collateral and Guarantee Requirement means, at any time, the requirement that:

  • Control equipment means equipment necessary for the setting and/or unsetting of an immobilizer.