Security Control Requirements definition

Security Control Requirements has the meaning set out in para 3.1.1 of Schedule 7.

Examples of Security Control Requirements in a sentence

  • Third Party desires to retain access to certain Confidential Utility Information (as defined previously in this Data Security Agreement), Third Party must THEREFORE self-attest to Third Party’s compliance with the Information Security Control Requirements (“Requirements”) as listed herein.

  • Third Party desires to retain access to certain Confidential Utility Information1 (as defined in this Data Security Agreement), Third Party must THEREFORE self- attest to Third Party’s compliance with the Information Security Control Requirements (“Requirements”) as listed herein.

  • Third Party desires to retain access to certain Confidential Customer Utility Information1 (as defined in this Data Security Agreement), Third Party must THEREFORE self-attest to Third Party’s compliance with the Information Security Control Requirements (“Requirements”) as listed herein.

  • Third Party desires to retain access to certain Confidential Utility Information2 (as defined in this Data Security Agreement), Third Party must THEREFORE self- attest to Third Party’s compliance with the Information Security Control Requirements (“Requirements”) as listed herein.

  • Any exceptions must be listed within the bid and must include both the excluded end products and the country of origin of each.While the Government will consider paper manufacturers outside of the United States that can best meet the requirements of the specifications, the supply chain of all materials will be subject to the Security Control Requirements.

  • Subscribing LEA: BY: Date: Printed Name: Title/Position: TO ACCEPT THE GENERAL OFFER, THE SUBSCRIBING LEA MUST DELIVER THIS SIGNED EXHIBIT TO THE PERSON AND EMAIL ADDRESS LISTED ABOVE These Zoom Minimum Security Control Requirements (“Minimum Control Requirements”) are stated at a relatively high level.

  • We will also provide you with a Business Online Banking Customer Security Control Requirements and Best Practices Checklist, which we recommend you carefully read and consider prior to executing.

  • ESE desires to retain access to certain Confidential Company Information1 (as defined in this Data Security Agreement), ESE must THEREFORE self- attest to ESE’s compliance with the Information Security Control Requirements (“Requirements”) as listed herein.

  • SECTION 4: Security Control Requirements Overview This section defines requirements that must be met for agencies to properly protect confidential information under their administrative control.

  • Explain how you comply with Security Control Requirements governing identity theft initiatives.

Related to Security Control Requirements

  • Security Control means a safeguard or countermeasure prescribed for an information system or an organization designed to protect the confidentiality, integrity, and availability of its information and to meet a set of defined security requirements.

  • MREL Requirements means the laws, regulations, requirements, guidelines, rules, standards and policies relating to minimum requirements for own funds and eligible liabilities applicable to the Issuer and/or the Group, from time to time, (including any applicable transitional or grandfathering provisions), including, without limitation to the generality of the foregoing, any delegated or implementing acts (such as regulatory technical standards) adopted by the European Commission and any regulations, requirements, guidelines, rules, standards and policies relating to minimum requirements for own funds and eligible liabilities adopted by the Federal Republic of Germany or the Republic of Italy, a relevant resolution authority or the European Banking Authority from time to time (whether or not such requirements, guidelines or policies are applied generally or specifically to the Issuer and/or the Group), as any of the preceding laws, regulations, requirements, guidelines, rules, standards, policies or interpretations may be amended, supplemented, superseded or replaced from time to time.

  • Security Requirements means the requirements regarding the security of Personal Data, as set out in the Data Protection Laws (including, in particular, the seventh data protection principle of the DPA and/ or the measures set out in Article 32(1) of the GDPR (taking due account of the matters described in Article 32(2) of the GDPR)) as applicable;

  • control room means a room on any premises which is specifically designed, built and equipped to coordinate and control an emergency situation in or on the premises in question;

  • Collateral Requirement for Party B shall be zero. The “Collateral Requirement” for Party A (the “Pledging Party”) means the Secured Party’s Net Exposure minus the sum of:”

  • Operational requirements means the need to ensure that the Agency is to be operated as effectively, efficiently and economically as possible.

  • Capital Requirements means, as to any person, any matter, directly or indirectly, (i) regarding capital adequacy, capital ratios, capital requirements, the calculation of such person’s capital or similar matters, or (ii) affecting the amount of capital required to be obtained or maintained by such person or any person controlling such person (including any direct or indirect holding company), or the manner in which such person or any person controlling such person (including any direct or indirect holding company), allocates capital to any of its contingent liabilities (including letters of credit), advances, acceptances, commitments, assets or liabilities.

  • Air pollution control equipment means a mechanism, device, or contrivance used to control or prevent air pollution, that is not, aside from air pollution control laws and administrative regulations, vital to production of the normal product of the source or to its normal operation.

  • Security Codes are the credentials (such as codes and passwords) that are associated with you and used by us to verify the authenticity of Communications from you. Security Codes are used to access Accounts and to use the Services. The Security Codes include any supplemental or alternative method used to verify the authenticity of Communications that may be offered or presented to you by us from time to time. • “Service(s)” and “Online Banking” are the online banking interface and the banking services described in this Agreement.

  • MREL Requirement means the minimum requirement for own funds and eligible liabilities which is or, as the case may be, will be applicable to the Issuer;

  • Listings Requirements means the listings requirements of the JSE from time to time;

  • Security Code means a sequence of numbers and/or letters or such other codes or procedures, whether generated by a Security Mechanism or otherwise, for use in connection with access to and/or use of the EB Services;

  • Data Security Requirements means, collectively, all of the following, to the extent relating to privacy or data security and applicable to the Company or to its conduct of the Business: (i) the Company’s own rules, policies, and procedures; (ii) all applicable laws; (iii) industry standards applicable to the industry in which the Company operates; and (iv) Contracts into which the Company has entered or by which it is otherwise bound.

  • Transaction Liens means the Liens granted by the Lien Grantors under the Security Documents.

  • Collateral and Guarantee Requirement means, at any time, the requirement that:

  • Regulated motor vehicle surface means any of the following, alone or in combination:

  • Safety Requirements means Prudent Electrical Practices, CPUC General Order No. 167, Contractor Safety Program Requirements, and all applicable requirements of Law, PG&E, the Utility Distribution Company, the Transmission Provider, Governmental Approvals, the CAISO, CARB, NERC and WECC.

  • Privacy Requirements means all applicable Privacy Laws and all of the Company’s and the Company Subsidiaries’ policies, notices, and contractual obligations relating to the Processing of Personal Information.

  • Control equipment means equipment necessary for the setting and/or unsetting of an immobilizer.

  • Inventory control system means a system described in Section 4-41a-103.

  • OHS Requirements means all Laws applicable to the Supply and related to occupational health or safety, and all of the City Policies that relate to occupational health or safety, and includes without limitation the WCA;

  • Control Collateral means any Collateral consisting of any Certificated Security (as defined in Section 8-102 of the Uniform Commercial Code), Investment Property, Deposit Account, Instruments and any other Collateral as to which a Lien may be perfected through possession or control by the secured party, or any agent therefor.

  • Security Requirement means the amount in Dollars (as certified by the Agent whose certificate shall, in the absence of manifest error, be conclusive and binding on the Borrowers and the Creditors) which is, at any relevant time:

  • Technical Requirements means the Technical Requirements in Section VII of the tendering documents.

  • Governmental Requirements means all federal, state, and local laws, statutes, ordinances, rules, regulations, orders, and decrees of any court, administrative body, or tribunal related to the activities and performances under this Agreement.

  • Control apparatus means any device which prevents or controls the emission of any air contaminant directly or indirectly into the outdoor atmosphere.