Security Control Requirements definition

Security Control Requirements has the meaning set out in para 3.1.1 of Schedule 7.

Examples of Security Control Requirements in a sentence

  • Third Party desires to retain access to certain Confidential Utility Information (as defined previously in this Data Security Agreement), Third Party must THEREFORE self-attest to Third Party’s compliance with the Information Security Control Requirements (“Requirements”) as listed herein.

  • Third Party desires to retain access to certain Confidential Utility Information1 (as defined in this Data Security Agreement), Third Party must THEREFORE self- attest to Third Party’s compliance with the Information Security Control Requirements (“Requirements”) as listed herein.

  • Any exceptions must be listed within the bid and must include both the excluded end products and the country of origin of each.While the Government will consider paper manufacturers outside of the United States that can best meet the requirements of the specifications, the supply chain of all materials will be subject to the Security Control Requirements.

  • The proposed use is compatible with existing land uses and there is access to established public infrastructure.

  • Security requirements (i.e., complying with the Information Security Standard and Information Security Control Requirements, which incorporate the HIPAA Security Rule, adhering to proper building security protocols, and performing a Security Rule risk assessment).

  • Third Party desires to retain access to certain Confidential Customer Utility Information1 (as defined in this Data Security Agreement), Third Party must THEREFORE self-attest to Third Party’s compliance with the Information Security Control Requirements (“Requirements”) as listed herein.

  • In urgent cases the Purchaser shall be entitled to carry out the necessary repairs in-house or have them performed by a third party with the prior agreement of the Supplier.

  • ESE desires to retain access to certain Confidential Company Information1 (as defined in this Data Security Agreement), ESE must THEREFORE self- attest to ESE’s compliance with the Information Security Control Requirements (“Requirements”) as listed herein.

  • We will also provide you with a Business Online Banking Customer Security Control Requirements and Best Practices Checklist, which we recommend you carefully read and consider prior to executing.

  • See RFP Solicitation Requirements, Baseline Security Control Requirements Exhibit D.

Related to Security Control Requirements

  • Security Control means a safeguard or countermeasure prescribed for an information system or an organization designed to protect the confidentiality, integrity, and availability of its information and to meet a set of defined security requirements.

  • Security Requirements means the requirements regarding the security of Personal Data, as set out in the Data Protection Laws (including, in particular, the seventh data protection principle of the DPA and/ or the measures set out in Article 32(1) of the GDPR (taking due account of the matters described in Article 32(2) of the GDPR)) as applicable;

  • control room means a room on any premises which is specifically designed, built and equipped to coordinate and control an emergency situation in or on the premises in question;

  • Collateral Requirement means the requirement that:

  • Operational requirements means the need to ensure that the Agency is to be operated as effectively, efficiently and economically as possible.

  • Capital Requirements means, as to any person, any matter, directly or indirectly, (i) regarding capital adequacy, capital ratios, capital requirements, the calculation of such person’s capital or similar matters, or (ii) affecting the amount of capital required to be obtained or maintained by such person or any person controlling such person (including any direct or indirect holding company), or the manner in which such person or any person controlling such person (including any direct or indirect holding company), allocates capital to any of its contingent liabilities (including letters of credit), advances, acceptances, commitments, assets or liabilities.

  • Security Codes are the credentials (such as codes and passwords) that are associated with you and used by us to verify the authenticity of Communications from you. Security Codes are used to access Accounts and to use the Services. The Security Codes include any supplemental or alternative method used to verify the authenticity of Communications that may be offered or presented to you by us from time to time. • “Service(s)” and “Online Banking” are the online banking interface and the banking services described in this Agreement.

  • Listings Requirements means the listings requirements of the JSE, as amended from time to time;

  • Security Code means a sequence of numbers and/or letters or such other codes or procedures, whether generated by a Security Mechanism or otherwise, for use in connection with access to and/or use of the EB Services;

  • Data Security Requirements means, collectively, all of the following to the extent relating to Data Treatment or otherwise relating to privacy, security or security breach notification requirements and applicable to Seller, any IT Systems or any Personal Information: (i) Seller’s own rules, policies, and procedures; (ii) all Laws applicable to Seller; (iii) industry standards applicable to the industry in which Seller operates; and (iv) Contracts to which Seller is a party or otherwise subject.

  • Transaction Liens means the Liens granted by the Lien Grantors under the Security Documents.

  • Collateral and Guarantee Requirement means, at any time, the requirement that:

  • Safety Requirements means Prudent Electrical Practices, CPUC General Order No. 167, Contractor Safety Program Requirements, and all applicable requirements of Law, PG&E, the Utility Distribution Company, the Transmission Provider, Governmental Approvals, the CAISO, CARB, NERC and WECC.

  • Privacy Requirements means all applicable Privacy Laws and all of the Acquired Companies’ policies, notices, and contractual obligations relating to the receipt, collection, compilation, use, storage, processing, sharing, safeguarding, security (technical, physical and administrative), disposal, destruction, disclosure, or transfer (including cross-border) of Personal Information.

  • Control equipment means equipment necessary for the setting and/or unsetting of an immobilizer.

  • Inventory control system means a system described in Section 4-41a-103.

  • Control Collateral means any Collateral consisting of any Certificated Security (as defined in Section 8-102 of the Uniform Commercial Code), Investment Property, Deposit Account, Instruments and any other Collateral as to which a Lien may be perfected through possession or control by the secured party, or any agent therefor.

  • Security Requirement means the amount in Dollars (as certified by the Agent whose certificate shall, in the absence of manifest error, be conclusive and binding on the Borrowers and the Creditors) which is, at any relevant time:

  • Technical Requirements means the Technical Requirements in Section VII of the tendering documents.

  • Governmental Requirements means all judgments, orders, writs, injunctions, decrees, awards, laws, ordinances, statutes, regulations, rules, franchises, permits, certificates, licenses, authorizations and the like and any other requirements of any government or any commission, board, court, agency, instrumentality or political subdivision thereof.