Security Procedures means rules and regulations governing access to, and health and safety procedures while on, Government premises; and information technology security protocols;
Security procedure means a procedure employed for the purpose of verifying that an electronic signature, record, or performance is that of a specific person or for detecting changes or errors in the information in an electronic record. The term includes a procedure that requires the use of algorithms or other codes, identifying words or numbers, encryption, or callback or other acknowledgment procedures.
Security Property means all right, title and interest in, to and under any Security Document, including:
Computer Security Procedures means procedures for prevention of unauthorized computer access and use and administration of computer access and use as provided in writing to the Underwriter.
Security Provider means you and/or any other person or entity furnishing security for any Credit Facilities and/or any party to any security document.
Information Security Program means the administrative, technical, and physical safeguards that a licensee uses to access, collect, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle nonpublic information.
Social Engineering Security Procedures means security procedures intended to prevent Social Engineering Fraud as set forth in the Application and/or as otherwise provided in writing to the Underwriter.
Security alarm system means a device or series of devices, intended to summon law enforcement personnel during, or as a result of, an alarm condition. Devices may include hard- wired systems and systems interconnected with a radio frequency method such as cellular or private radio signals that emit or transmit a remote or local audible, visual, or electronic signal; motion detectors, pressure switches, duress alarms (a silent system signal generated by the entry of a designated code into the arming station to indicate that the user is disarming under duress); panic alarms (an audible system signal to indicate an emergency situation); and hold-up alarms (a silent system signal to indicate that a robbery is in progress).
Procurement Process means the process commenced by the issuing of this Invitation and concluding upon the award of a contract (or other outcome as determined by Tetra Tech International Development) or upon the earlier termination of the process
Account Application or “Application” shall mean the application, as may be amended from time to time, by which this Agreement is established between the Depositor (or following the death of the Depositor, the Beneficiary) and the Custodian. The statements contained therein shall be incorporated into this Agreement.
Commercial applicator means any person, unless exempted in I(4) hereunder, whether or not the person is a private applicator with respect to some uses, who:
Technical safeguards means the technology and the policy and procedures for its use that 27 protect electronic PHI and control access to it.
Security Codes are the credentials (such as codes and passwords) that are associated with you and used by us to verify the authenticity of Communications from you. Security Codes are used to access Accounts and to use the Services. The Security Codes include any supplemental or alternative method used to verify the authenticity of Communications that may be offered or presented to you by us from time to time. • “Service(s)” and “Online Banking” are the online banking interface and the banking services described in this Agreement.
Client Application means an application developed by Customer that a) utilizes the Runtime Product, b) is installed fully on an end user’s machine, with all report processing local to that machine, and c) adds significant and primary functionality to the Runtime Product.
Control apparatus means any device which prevents or controls the emission of any air contaminant directly or indirectly into the outdoor atmosphere.
Marijuana processor means a person who processes marijuana items in this state.
Procurement item means a supply, a service, Custom Deliverable, construction, or technology that Contractor is required to deliver to the Eligible User under this Contract.
ISM Code Documentation includes, in respect of a Ship:
Centralized prescription processing means the processing by a pharmacy of a request from another pharmacy to fill or refill a prescription drug order or to perform processing functions such as dispensing, drug utilization review, claims adjudication, refill authorizations, and therapeutic interventions.
Administrative Safeguards are administrative actions, and policies and procedures, to manage the selection, development, implementation, and maintenance of security measures to protect electronic PHI and to manage the conduct of Contractor’s workforce in relation to the protection of that information.
Practical application means to manufacture in the case of a composition or product, to practice in the case of a process or method, or to operate in the case of a machine or system; and, in each case, under such conditions as to establish that the invention is being utilized and that its benefits are, to the extent permitted by law or government regulations, available to the public on reasonable terms.
Data Processing Equipment means any equipment, computer hardware, or computer software (and the lease or licensing agreements related thereto) other than Personal Computers, owned or leased by the Failed Bank at Bank Closing, which is, was, or could have been used by the Failed Bank in connection with data processing activities.
Dosimetry processor means an individual or an organization that processes and evaluates individual monitoring devices in order to determine the radiation dose delivered to the monitoring devices.
technical and organisational security measures means those measures aimed at protecting personal data against accidental or unlawful destruction or accidental loss, alteration, unauthorised disclosure or access, in particular where the processing involves the transmission of data over a network, and against all other unlawful forms of processing.
Security Vulnerability means a flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in a security breach such that data is compromised, manipulated or stolen or the system damaged.
Lockbox Processor means Regulus Group II LLC, or its successors or assigns.