Security Packet definition

Security Packet means, in relation to a Receivable, each packet of Relevant Documents relating to that Receivable.

Examples of Security Packet in a sentence

  • Migration and future development should be easier in a standards based environment due to the stability of the original framework.

  • Where sufficient to allow Client to complete its risk- based assessment of Xxxxxx’x information security program and administrative, technical, and physical safeguards applicable to Client’s Confidential Information, Client shall refer to Xxxxxx’x Security Packet.

  • For example: An ePACES user ID is assigned systematically via email while an FTP user ID is assigned after the submission of a Security Packet B.

  • If Client requests that Smarsh complete Client’s security or other questionnaire(s) in lieu of, or in addition to, the Security Packet, Client must execute an order form and pay a professional services fee based on the size and scope of such questionnaire(s).

  • Campus Security Packet will be handed out at student orientation.

  • Smarsh will make an executive summary of the BCP available in its Security Packet.

  • To facilitate Client’s risk-based assessment of Xxxxxx’x information security program and administrative, technical, and physical safeguards applicable to Client’s Confidential Information, Smarsh will make its Security Packet available to Client via xxxxx://xxxxxxx.xxxxxx.xxx xxxxx://xxxxxxx.xxxxxx.xxx/s/.

  • Smarsh will make a copy of the BCP available in its Security Packet.

  • We build a module consisting of two MLPs stacked with Global Average Pooling (GAP) [18].

  • Key GenerationKey generation is the process of generating keys in cryptography.A key is used to encrypt and decrypt whatever data is being encrypted/decrypted.Detection of misbehavior nodes using Security Packet, then send communication between source to destination node.Security algorithms are mainly used for encrypt and decrypt messages.

Related to Security Packet

  • Security Party means the Borrowers, the Corporate Guarantor, the Shareholder or any other person who may at any time be a party to any of the Security Documents (other than the Banks);

  • Ship means a vessel of any type whatsoever operating in the marine environment and includes hydrofoil boats, air-cushion vehicles, submersibles, floating craft and fixed or floating platforms.

  • Security Parties means at any relevant time, the Borrower, the Guarantor, the Pledgor, the Target, the Vessel Owners and any other person who may at any time during the Facility Period be liable for, or provide security for, all or any part of the Indebtedness, and “Security Party” means any one of them.

  • Information Security Program means the administrative, technical, and physical safeguards that a licensee uses to access, collect, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle nonpublic information.

  • Security procedure means a procedure employed for the purpose of verifying that an electronic signature, record, or performance is that of a specific person or for detecting changes or errors in the information in an electronic record. The term includes a procedure that requires the use of algorithms or other codes, identifying words or numbers, encryption, or callback or other acknowledgment procedures.

  • Security Provider means you and/or any other person or entity furnishing security for any Credit Facilities and/or any party to any security document.

  • Security Plan means the Contractor’s security plan prepared pursuant to paragraph 3 of Schedule (Security Requirements & Plan)

  • Security Policy means the Authority’s Security Policy annexed to Schedule (Security Requirements and Plan) as updated from time to time.

  • Security Bond means an amount payable by a tenant as security for the performance of his obligations under a residential tenancy agreement, including an amount referred to in section 29(1)(b)(ii);

  • Security Procedures means rules and regulations governing access to, and health and safety procedures while on, Government premises; and information technology security protocols;

  • Approved Vendor List means a list of approved vendors established under Section 63G-6a-507.

  • ISM Code Documentation means, in relation to a Vessel, the document of compliance (DOC) and safety management certificate (SMC) issued by a Classification Society pursuant to the ISM Code in relation to that Vessel within the periods specified by the ISM Code;

  • Log means the up-to-date log that is used to track all Modifications to the Facility since the date of this Certificate as required by the Documentation Requirements conditions of this Certificate.

  • technical and organisational security measures means those measures aimed at protecting personal data against accidental or unlawful destruction or accidental loss, alteration, unauthorised disclosure or access, in particular where the processing involves the transmission of data over a network, and against all other unlawful forms of processing.

  • Security Clearance means that level of security clearance required by the City or its police department for Contractor personnel accessing the information or premises required to be accessed in order to perform the Work under this Contract;

  • PPSR means the Personal Property Securities Register;