Security Processes definition

Security Processes. The Contractor shall disclose its non-
Security Processes the Contractor's security processes as prepared as part of their tender and included as a schedule (Security Requirements) to the contract;

Examples of Security Processes in a sentence

  • For an overview of the AWS Security Processes we recommend reviewing their whitepaper.We also encourage you to review the Securing Data at Rest with Encryption whitepaper for an overview of the methods for securing your data.If you have questions regarding any aspect of the whitepapers or the security of your environment, please contact a member of your Support team.

  • Contractor Divisional Security Processes for loading/unloading is permitted outside while at customer locations.

  • Fourth IEEE International Conference on eScience, 2008.[9] Amazon Web Services: Overview of Security Processes, 2008.[10] Mln - manage large networks.

  • The relationships between private and public service organizations, including governmental, nonprofit, and hybrid types are studied.GRAD 853 Homeland Security Processes and ManagementStudents will understand strategic, political, legal, and organizational challenges associated with the defense of the U.S. homeland, efforts that are under way to meet these challenges, and possible policy options.

  • The committee was established with members from varied disciplines including the ex-officio directors of Bandaranaike Memorial Ayurvedic Research Institute, Institute of Indigenous Medicine and Director, Gampaha Wickremarachchi Ayurveda Institute were invited to join the committee.

  • Assist with identifying and review existing Enterprise Security Architecture (ESA) and developing new and continuous improving ESA Identifying and developing new Security Architecture Standards, Enterprise Architecture Security (EAS) Patterns, and Enterprise Security Processes and Procedures.

  • Security Processes for InvestorsEmployees and contractors are aware of how important security is.

  • Iron Mountain Divisional Security Processes for loading/unloading is permitted outside while at customer locations.

  • The three assessment phases were: Governance and Management; Operational Security, Processes and Design; and Security Assurance.

  • An overview of Amazon Web Services Security Processes is available at xxxx://x0.xxxxxxxxx.xxx/whitepapers/Security/AWS_Security_Whitepaper.pdf.

Related to Security Processes

  • Security Procedures means rules and regulations governing access to, and health and safety procedures while on, Government premises; and information technology security protocols;

  • Security procedure means a procedure employed for the purpose of verifying that an electronic signature, record, or performance is that of a specific person or for detecting changes or errors in the information in an electronic record. The term includes a procedure that requires the use of algorithms or other codes, identifying words or numbers, encryption, or callback or other acknowledgment procedures.

  • Security Property means all right, title and interest in, to and under any Security Document, including:

  • Computer Security Procedures means procedures for prevention of unauthorized computer access and use and administration of computer access and use as provided in writing to the Underwriter.

  • Security Provider means a person which, in accordance with the provisions of this Agreement, provides or is to provide any guarantee or other surety or security in respect of that Party’s obligations under this Agreement;

  • Information Security Program means the administrative, technical, and physical safeguards that a licensee uses to access, collect, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle nonpublic information.

  • Social Engineering Security Procedures means security procedures intended to prevent Social Engineering Fraud as set forth in the Application and/or as otherwise provided in writing to the Underwriter.

  • Security alarm system means a device or series of devices, intended to summon law enforcement personnel during, or as a result of, an alarm condition. Devices may include hard- wired systems and systems interconnected with a radio frequency method such as cellular or private radio signals that emit or transmit a remote or local audible, visual, or electronic signal; motion detectors, pressure switches, duress alarms (a silent system signal generated by the entry of a designated code into the arming station to indicate that the user is disarming under duress); panic alarms (an audible system signal to indicate an emergency situation); and hold-up alarms (a silent system signal to indicate that a robbery is in progress).

  • Procurement Process means the process commenced by the issuing of this Invitation and concluding upon the award of a contract (or other outcome as determined by Tetra Tech International Development) or upon the earlier termination of the process

  • Account Application or “Application” shall mean the application, as may be amended from time to time, by which this Agreement is established between the Depositor (or following the death of the Depositor, the Beneficiary) and the Custodian. The statements contained therein shall be incorporated into this Agreement.

  • Commercial applicator means a person who, by contract or for hire, engages in the

  • Technical safeguards means the technology and the policy and procedures for its use that 27 protect electronic PHI and control access to it.

  • Security Codes are the credentials (such as codes and passwords) that are associated with you and used by us to verify the authenticity of Communications from you. Security Codes are used to access Accounts and to use the Services. The Security Codes include any supplemental or alternative method used to verify the authenticity of Communications that may be offered or presented to you by us from time to time. • “Service(s)” and “Online Banking” are the online banking interface and the banking services described in this Agreement.

  • Client Application means an application developed by Licensee that a) utilizes the Runtime Product, b) is installed fully on an end user’s machine, with all report processing local to that machine, and c) adds significant and primary functionality to the Runtime Product.

  • Control apparatus means any device which prevents or controls the emission of any air contaminant directly or indirectly into the outdoor atmosphere.

  • Marijuana processor means a person who processes marijuana items in this state.

  • Procurement item means an item of personal property, a technology, a service, or a construction project.

  • ISM Code Documentation includes, in respect of a Ship:

  • Centralized prescription processing means the processing by a pharmacy of a request from another pharmacy to fill or refill a prescription drug order or to perform processing functions such as dispensing, drug utilization review, claims adjudication, refill authorizations, and therapeutic interventions.

  • Administrative Safeguards are administrative actions, and policies and procedures, to manage the selection, development, implementation, and maintenance of security measures to protect electronic PHI and to manage the conduct of Contractor’s workforce in relation to the protection of that information.

  • Practical application means to manufacture in the case of a composition or product, to practice in the case of a process or method, or to operate in the case of a machine or system; and, in each case, under such conditions as to establish that the invention is being utilized and that its benefits are, to the extent permitted by law or government regulations, available to the public on reasonable terms.

  • Data Processing Equipment means any equipment, computer hardware, or computer software (and the lease or licensing agreements related thereto) other than Personal Computers, owned or leased by the Failed Bank at Bank Closing, which is, was, or could have been used by the Failed Bank in connection with data processing activities.

  • Dosimetry processor means an individual or an organization that processes and evaluates individual monitoring devices in order to determine the radiation dose delivered to the monitoring devices.

  • technical and organisational security measures means those measures aimed at protecting personal data against accidental or unlawful destruction or accidental loss, alteration, unauthorised disclosure or access, in particular where the processing involves the transmission of data over a network, and against all other unlawful forms of processing.

  • Security Vulnerability means a flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in a security breach such that data is compromised, manipulated or stolen or the system damaged.

  • Lockbox Processor means Regulus Group II LLC, or its successors or assigns.