Security Packet definition

Security Packet means, in relation to a Receivable, each packet of Relevant Documents relating to that Receivable.

Examples of Security Packet in a sentence

  • For example: An ePACES user ID is assigned systematically via email while an FTP user ID is assigned after the submission of a Security Packet B.

  • Where sufficient to allow Client to complete its risk- based assessment of Xxxxxx’x information security program and administrative, technical, and physical safeguards applicable to Client’s Confidential Information, Client shall refer to Xxxxxx’x Security Packet.

  • The Security Packet includes, among other documentation, Xxxxxx’x completed industry-standard information gathering questionnaire (“SIG”) and Xxxxxx’x annual independent SSAE 16 SOC 2 Type II report.

  • If Client requests that Smarsh complete Client’s security or other questionnaire(s) in lieu of, or in addition to, the Security Packet, Client must execute an order form and pay a professional services fee based on the size and scope of such questionnaire(s).

  • Smarsh will make an executive summary of the BCP available in its Security Packet.

  • To facilitate Client’s risk-based assessment of Xxxxxx’x information security program and administrative, technical, and physical safeguards applicable to Client’s Confidential Information, Smarsh will make its Security Packet available to Client via xxxxx://xxxxxxx.xxxxxx.xxx xxxxx://xxxxxxx.xxxxxx.xxx/s/.

  • Refer to Security Packet B containing the forms to obtain an eMedNY user access key.

  • FDP_ACC.1.1(IPC) The TSF shall enforce the RACF UNIX IPC access control policy on subjects repre- sented by a UNIX System Services Credentials Structure for IPC (CREI), the UNIX IPC resources represented by an IPC Security Packet (ISP) as objects and the UNIX access modes of read and write as operations among subjects and objects cov- ered by the SFP.Application Note: The ISP needs to be created by the caller.

  • In paper [16] a more efficient Routing Protocol named Wormhole attack Detection Protocol using Time Stamp with Security Packet.

  • The checklist is to be retained with a copy of the Trust Deed in the client’s Security Packet.

Related to Security Packet

  • Security Party means the Borrowers, the Corporate Guarantor, the Shareholder or any other person who may at any time be a party to any of the Security Documents (other than the Banks);

  • Ship means a vessel of any type whatsoever operating in the marine environment and includes hydrofoil boats, air-cushion vehicles, submersibles, floating craft and fixed or floating platforms.

  • Security Parties means at any relevant time, the Borrower, the Guarantor, the Pledgor, the Target, the Vessel Owners and any other person who may at any time during the Facility Period be liable for, or provide security for, all or any part of the Indebtedness, and “Security Party” means any one of them.

  • Security Policy Framework means the Cabinet Office Security Policy Framework (available from the Cabinet Office Security Policy Division);

  • Information Security Program means the administrative, technical, and physical safeguards that a licensee uses to access, collect, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle nonpublic information.

  • Security procedure means a procedure employed for the purpose of verifying that an electronic signature, record, or performance is that of a specific person or for detecting changes or errors in the information in an electronic record. The term includes a procedure that requires the use of algorithms or other codes, identifying words or numbers, encryption, or callback or other acknowledgment procedures.

  • Security Provider means a person which, in accordance with the provisions of this Agreement, provides or is to provide any guarantee or other surety or security in respect of that Party’s obligations under this Agreement;

  • Security Plan means the Contractor’s security plan prepared pursuant to paragraph 3 of Schedule (Security Requirements & Plan)

  • Security alarm system means a device or series of devices, intended to summon law enforcement personnel during, or as a result of, an alarm condition. Devices may include hard- wired systems and systems interconnected with a radio frequency method such as cellular or private radio signals that emit or transmit a remote or local audible, visual, or electronic signal; motion detectors, pressure switches, duress alarms (a silent system signal generated by the entry of a designated code into the arming station to indicate that the user is disarming under duress); panic alarms (an audible system signal to indicate an emergency situation); and hold-up alarms (a silent system signal to indicate that a robbery is in progress).

  • Security Policy means the Authority’s Security Policy annexed to Schedule (Security Requirements and Plan) as updated from time to time.

  • Security Bond means an amount payable by a tenant as security for the performance of his obligations under a residential tenancy agreement, including an amount referred to in section 29(1)(b)(ii);

  • Security Procedures means rules and regulations governing access to, and health and safety procedures while on, Government premises; and information technology security protocols;

  • Security freeze means a notice, at the request of the consumer and subject to certain exceptions,

  • Aerial applicator means aircraft or rotorcraft used exclusively for the purpose of

  • Commercial applicator means a person who, by contract or for hire, engages in the

  • ISM Code Documentation includes, in respect of a Ship:

  • NIST Cybersecurity Framework means the U.S. Department of Commerce National Institute for Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity (Version 1.1).

  • Security Management Plan means the Supplier's security management plan prepared pursuant to paragraph 3 of schedule 2 an outline of which is set out in paragraph 2.7 of the Order Form as updated from time to time;

  • Security Tests means conduct tests of the processes and countermeasures contained in the Security Plan.

  • Log means the up-to-date log that is used to track all Modifications to the Facility since the date of this Certificate as required by the Documentation Requirements conditions of this Certificate.

  • technical and organisational security measures means those measures aimed at protecting personal data against accidental or unlawful destruction or accidental loss, alteration, unauthorised disclosure or access, in particular where the processing involves the transmission of data over a network, and against all other unlawful forms of processing.

  • Security Clearance means that level of security clearance required by the City or its police department for Contractor personnel accessing the information or premises required to be accessed in order to perform the Work under this Contract;

  • travel document means a passport or other equivalent document entitling the holder to cross the external borders and to which a visa may be affixed;

  • HMG Security Policy Framework means the Cabinet Office Security Policy Framework (available from the Cabinet Office Security Policy Division) as updated from time to time.

  • PPSR means the Personal Property Securities Register established under Personal Property Securities Act 2009 (Cth);

  • Vessel means the vessel/craft belonging to the Contractor for carrying out the work.