Victorian Protective Data Security Standards definition

Victorian Protective Data Security Standards means any standards issued by the Information Commissioner under Part 4 of the PDP Act. Interpretation

Examples of Victorian Protective Data Security Standards in a sentence

  • Peng D, Ge G, Gong Y, Zhan Y, He S, Guan B, Li Y, Xu Z, Hao H, He Z, Xiong G, Zhang C, Shi Y, Zhou Y, Ci W, Li X and Zhou L: Vitamin C increases 5-hydroxymethylcytosine level and inhibits the growth of bladder cancer.

  • The repository data will help organisations to complete the sample template.Active applications with a lifecycle of retire and transition status are to be reported where technology risk rating is EOL and the total risk exposure rating is high to extreme based on the total Victorian Protective Data Security Standards (VPDSS) BILS risk exposure16, that is the aggregate of confidentiality, availability and integrity exposure risk.

  • This also increased the risk of malicious or unauthorised access to information due to the increased number of systems and access points for hostile actors to manipulate.81 The Office stated that under the Victorian Protective Data Security Framework and the Victorian Protective Data Security Standards, Victoria Police must safeguard its information assets and systems.

  • He volunteers with the Foundation for Global Community via the Internet from San José, CA.applied in public relations and advertising today.) ~~~~~~~~~~~~~~~ BUYER BEWARE — theadmonition becomes more and more urgent as the stakes rise for consumers.

  • The CSDSS describe the standards, objectives, protocols and best practice implementation guidance required to protect information received, held and used by CSA.In July 2016 the Commissioner issued the Victorian Protective Data Security Standards (VPDSS).

  • It is designed to:• help you assess the organisation’s information security capability;• summarise the organisation’s progress towards implementation of the Victorian Protective Data Security Standards (VPDSS or Standards); and• provide assurance to OVIC that the organisation is making progress to improving information security.

  • It is for this cogent reason, the learned trial judge vide order dated 09.05.2012 allowed the substitution and permitted the appellant herein to be substituted as legal representative of deceased plaintiff-Urmila Devi.

  • An exempt authorised nominee refers to an authorised nominee defined under the SICDA which is exempted from compliance with the provisions of subsection 25A(1) of SICDA.

  • Knowledge and familiarity with relevant legislation including but not limited to the Privacy Act (Cth) and Australian Privacy Principles, Privacy and Data Protection Act (VIC), information Privacy Principles and Victorian Protective Data Security Standards, Public Records Act 1973 with experience in balancing the use of data and technology with protecting the privacy of organisational information.

  • The Data Provider and Data User will protect the Shared Data that has been collected, held, managed, used, disclosed or transferred by them in a way that is consistent with the Victorian Protective Data Security Standards and as set out in Item 3 of the Data Sharing Schedule.

Related to Victorian Protective Data Security Standards

  • New Jersey Stormwater Best Management Practices (BMP) Manual or “BMP Manual” means the manual maintained by the Department providing, in part, design specifications, removal rates, calculation methods, and soil testing procedures approved by the Department as being capable of contributing to the achievement of the stormwater management standards specified in this chapter. The BMP Manual is periodically amended by the Department as necessary to provide design specifications on additional best management practices and new information on already included practices reflecting the best available current information regarding the particular practice and the Department’s determination as to the ability of that best management practice to contribute to compliance with the standards contained in this chapter. Alternative stormwater management measures, removal rates, or calculation methods may be utilized, subject to any limitations specified in this chapter, provided the design engineer demonstrates to the municipality, in accordance with Section IV.F. of this ordinance and N.J.A.C. 7:8-5.2(g), that the proposed measure and its design will contribute to achievement of the design and performance standards established by this chapter.

  • Privacy/Data Security Laws means all Laws governing the receipt, collection, use, storage, processing, sharing, security, disclosure, or transfer of Personal Information and any applicable Laws concerning requirements for website and mobile application privacy policies and practices, call or electronic monitoring or recording or any outbound communications (including outbound calling and text messaging, telemarketing, and e-mail marketing).

  • Rape Crisis Center means an office, institution, or center offering assistance to victims of sexual offenses through crisis intervention, medical and legal information, and follow-up counseling.

  • National Ambient Air Quality Standards or “NAAQS” means national ambient air quality standards that are promulgated pursuant to Section 109 of the Act, 42 U.S.C. § 7409.

  • Data Safeguards means the highest industry-standard safeguards (including administrative, physical, technical, and procedural safeguards) against the destruction, loss, misuse, unauthorized disclosure, or alteration of the JBE Data or Confidential Information, and such other related safeguards that are set forth in Applicable Laws, a Statement of Work, or pursuant to JBE policies or procedures.

  • Accessibility Standards means accessibility standards and specifications for Texas agency and institution of higher education websites and EIR set forth in 1 TAC Chapter 206 and/or Chapter 213.

  • Web Site Accessibility Standards/Specifications means standards contained in Title 1 Texas Administrative Code Chapter 206.

  • HITECH means the Health Information Technology for Economic and Clinical Health Act.

  • Data Security Requirements means the following, in each case to the extent relating to any sensitive or confidential information, or any matters relating to data privacy, protection, or security or the access, collection, use, processing, storage, sharing, distribution, transfer, disclosure, destruction, or disposal of any personally identifiable information: (i) all applicable Laws and any related security breach notification requirements, (ii) the Conveyed Companies’ own respective rules, policies, and procedures, and (iii) Contracts to which the Conveyed Companies are bound.

  • Indigenous Peoples Safeguards means the principles and requirements set forth in Chapter V, Appendix 3, and Appendix 4 (as applicable) of the SPS;

  • Data Protection Laws and Regulations means all laws and regulations, including laws and regulations of the European Union, the European Economic Area and their member states, Switzerland and the United Kingdom, applicable to the Processing of Personal Data under the Agreement.

  • Biometric information means any information, regardless of how it is captured, converted, stored, or shared, based on an individual’s biometric identifier used to identify an individual. Biometric information does not include information derived from items or procedures excluded under the definition of biometric identifiers.

  • Academy means the academy named at the beginning of this Disciplinary Policy and Procedure and includes all sites upon which the academy undertaking is, from time to time, being carried out.

  • ERCOT Protocols means the document adopted by ERCOT, including any attachments or exhibits referenced in that document, as amended from time to time, that contains the scheduling, operating, planning, reliability, and Settlement (including Customer registration) policies, rules, guidelines, procedures, standards, and criteria of ERCOT. For the purposes of determining responsibilities and rights at a given time, the ERCOT Protocols, as amended in accordance with the change procedure(s) described in the ERCOT Protocols, in effect at the time of the performance or non-performance of an action, shall govern with respect to that action.

  • Floodplain Management Regulations means this ordinance and other zoning ordinances, subdivision regulations, building codes, health regulations, special purpose ordinances, and other applications of police power. This term describes federal, state or local regulations, in any combination thereof, which provide standards for preventing and reducing flood loss and damage.

  • Data Services The Customer will receive a discount equal to 25% for the following Data Services: Access: Standard VBS2 Guide local loop charges for DS-1 Access and DS-3 Access Service.

  • Best management practice (BMP means a structural device or nonstructural practice designed to temporarily store or treat stormwater runoff in order to mitigate flooding, reduce pollution, and provide other amenities.

  • Technical safeguards means the technology and the policy and procedures for its use that 27 protect electronic PHI and control access to it.

  • Customer information systems means any methods used to access, collect, store, use, transmit, protect, or dispose of customer in- formation.

  • Community practice protocol means a written, executed agreement entered into voluntarily between an authorized pharmacist and a physician establishing drug therapy management for one or more of the pharmacist’s and physician’s patients residing in a community setting. A community practice protocol shall comply with the requirements of subrule 8.34(2).

  • Public Finance Management Act ’ means the Public Finance Management Act, 1999 (Act No. 1 of 1999);

  • Network Rules means the rules, regulations, releases, interpretations and other requirements (whether contractual or otherwise) imposed or adopted by any Card Networks and related authorities, including without limitation, those of the PCI Security Standards Council, LLC and the National Automated Clearing House Association (including, with respect to EBT, the Quest Operating Rules and with respect to PIN debit cards, the rules, regulations, policies and procedures of the applicable debit network).

  • Privacy Standards means the standards of the privacy of individually identifiable health information, as pursuant to HIPAA.

  • Information Technology Resources means agency budgetary resources, personnel, equipment, facilities, or services that are primarily used in the management, operation, acquisition, disposition, and transformation, or other activity related to the lifecycle of information technology; acquisitions or interagency agreements that include information technology and the services or equipment provided by such acquisitions or interagency agreements; but does not include grants to third parties which establish or support information technology not operated directly by the Federal Government. (0MB M-15-14)

  • Information Technologies means all information processing and communications-related hardware, Software, supplies, and consumable items that the Supplier is required to supply and install under the Contract.

  • Data Protection means the implementation of appropriate administrative, technical or physical means to guard against unauthorized intentional or accidental disclosure, modification, or destruction of data.