Data transmission security Sample Clauses

Data transmission security. 1. Personal data transferred through teletransmission are secured against loss of confidentiality and integrity using cryptographic data protection measures (data encryption in transit).
AutoNDA by SimpleDocs
Data transmission security. The Data will be transmitted via telephone, email or Internet to a remote server located in Japan and maintained by Ricoh and/or its subcontractors. Ricoh uses reasonably available technology and reasonable security procedures to maintain the security of @ Remote and the Data; however, You acknowledge that no provider can absolutely prevent interception of data or guaranty security of information maintained on computers and on the Internet. You are responsible for the security of your network and operating environments.
Data transmission security. Data transmission security is the process of sending data from one computer system to another in a secure manner so that only the intended recipient of the data receives the data and the data sent is identical to the data received. When ePHI (Electronic Protected Health Information) is transmitted over an electronic communications network i.e. “the internet”, transmissions of ePHI to and from Teladoc Health will utilize Secure File Transport Protocol (SFTP). Employer is expressly prohibited from indirectly or directly, knowingly violating or attempting to violate the security of Teladoc Health’s web sites, including, without limitation, accessing data not intended for such user or logging into a server or account which user is not authorized to access, attempting to probe, scan or test the vulnerability of the system or network or to breach security or authentication measures, scanning or testing the performance of the system or network, attempting to interfere with service to any user, host or network, including, without limitation, via means of submitting a virus or “trojan horse” to the Web site, overloading, “flooding”, “mail bombing” or “crashing”, or sending unsolicited electronic mail, including promotions and/or advertising of products or services. Violations of system or network security may result in civil or criminal liability. Teladoc Health will investigate occurrences that may involve such violations and may involve, and cooperate with, law enforcement authorities in prosecuting users who are involved in such violations.
Data transmission security. Subscriber agrees to use web browser software that supports the Secure Socket Layer (SSL) protocol for secure data transfers. Subscriber acknowledges that ATA is not responsible for notifying it of any upgrades, fixes or enhancements to any such software or for any compromise of data transmitted across the Internet. Subscriber acknowledges that it is possible that data transmitted over the Internet may be accessed by unauthorized third parties when communicated between Subscriber and ATA.
Data transmission security. A. Data transmission security is the process of sending data from one computer system to another in a secure manner so that only the intended recipient of the data receives the data and the data sent is identical to the data received. When ePHI (Electronic Personal Health Information) is transmitted over an electronic communications network i.e. “the internet”, transmissions of ePHI to and from EpicMD, Inc. will utilize HIPAA-compliant encrypted file storage, or Secure File Transport Protocol (SFTP). EpicMD requires all vendors or partners who are in receipt of ePHI to execute a Sub-Business Associate Agreement to conform to all applicable HIPAA regulations.
Data transmission security. A. Data transmission security is the process of sending data from one computer system to another in a secure manner so that only the intended recipient of the data receives the data and the data sent is identical to the data received. When ePHI (Electronic Personal Health Information) is transmitted over an electronic communications network i.e. "the internet", transmissions of ePHI to and from Teladoc, Inc. will utilize Secure File Transport Protocol (SFTP).
Data transmission security 
AutoNDA by SimpleDocs

Related to Data transmission security

  • Data Transmission The procedures for transmitting load obligation data to PJM for DS Supplier’s DS Load shall be as set forth by PJM.

  • Data Transmission Control Except as necessary for the provision of the Cloud Services in accordance with the Agreement, Personal Data must not be read, copied, modified or removed without authorization during transfer. Where data carriers are physically transported, adequate measures are implemented at SAP to provide the agreed-upon service levels (for example, encryption and lead-lined containers). Measures: • Personal Data in transfer over SAP internal networks is protected according to SAP Security Policy. • When data is transferred between SAP and its customers, the protection measures for the transferred Personal Data are mutually agreed upon and made part of the relevant agreement. This applies to both physical and network based data transfer. In any case, the Customer assumes responsibility for any data transfer once it is outside of SAP-controlled systems (e.g. data being transmitted outside the firewall of the SAP Data Center).

  • Connecting Transmission Owner Obligations Connecting Transmission Owner shall maintain its transmission facilities and Attachment Facilities in a safe and reliable manner and in accordance with this Agreement.

  • Transmission Service Point-To-Point Transmission Service provided under Part II of the Tariff on a firm and non-firm basis.

  • Transmission encryption All data transmissions of County PHI or PI outside the secure internal network must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as AES. Encryption can be end to end at the network level, or the data files containing PHI can be encrypted. This requirement pertains to any type of PHI or PI in motion such as website access, file transfer, and E-Mail.

  • No Transmission Delivery Service The execution of this Agreement does not constitute a request for, nor agreement to provide, any Transmission Service under the NYISO OATT, and does not convey any right to deliver electricity to any specific customer or Point of Delivery. If Developer wishes to obtain Transmission Service on the New York State Transmission System, then Developer must request such Transmission Service in accordance with the provisions of the NYISO OATT.

  • Firm Point-To-Point Transmission Service “Non-Firm Point-To-Point Transmission Service” shall mean Point-To-Point Transmission Service under the Tariff that is reserved and scheduled on an as-available basis and is subject to Curtailment or Interruption as set forth in Tariff, Part II, section 14.7. Non-Firm Point-To-Point Transmission Service is available on a stand-alone basis for periods ranging from one hour to one month. Non-Firm Sale:

  • Transmission Owner Obligations Transmission Owner shall maintain its transmission facilities and Attachment Facilities in a safe and reliable manner and in accordance with this Agreement.

  • Merchant Transmission Facilities “Controllable A.C. Merchant Transmission Facilities” shall mean transmission facilities that (1) employ technology which Transmission Provider reviews and verifies will permit control of the amount and/or direction of power flow on such facilities to such extent as to effectively enable the controllable facilities to be operated as if they were direct current transmission facilities, and

  • NYISO and Connecting Transmission Owner Obligations Connecting Transmission Owner and NYISO shall cause the New York State Transmission System and the Connecting Transmission Owner’s Attachment Facilities to be operated, maintained and controlled in a safe and reliable manner in accordance with this Agreement and the NYISO Tariffs. Connecting Transmission Owner and NYISO may provide operating instructions to Developer consistent with this Agreement, NYISO procedures and Connecting Transmission Owner’s operating protocols and procedures as they may change from time to time. Connecting Transmission Owner and NYISO will consider changes to their respective operating protocols and procedures proposed by Developer.

Time is Money Join Law Insider Premium to draft better contracts faster.