Data Transport Sample Clauses

Data Transport. When transporting DSHS Confidential Information electronically, including via email, the Data will be protected by:
AutoNDA by SimpleDocs
Data Transport. When transporting Great Rivers Confidential Information electronically, including via email, the Data will be protected by:
Data Transport. When transporting Confidential Information electronically, including via email, the data will be protected by:
Data Transport. When transporting HCA Confidential Information electronically, including via email, the data will be protected by:
Data Transport. The Contractor shall use reputable means to transport Data. Deliveries must be made either via hand delivery by an employee of the Contractor or by restricted delivery via courier (e.g., FedEx, United Parcel Service, United States Postal Service) with shipment tracking and receipt confirmation. This applies to transport between the Contractor’s offices, to and from subcontractors, and to the Authorized User.
Data Transport. Internal Islington Council transfer Personally identifiable data following a referral will be stored in a secure area on the council network. Where necessary, data may be securely emailed within the council (@xxxxxxxxx.xxx.xx accounts). Data must only be emailed to a named individual and never to a group account. Sharing between the council and external agencies Data containing personally identifiable information or sensitive personal data MUST be sent through secure email. The following forms of secure email may be used:  Criminal Justice Secure email (CJSM) CJSM is a government accredited secure route for sending emails to Criminal Justice organisations, including Crown and Magistrates’ Courts, Crown Prosecution Service, Police, and the National Offender Management Service.  Government Secure Intranet (GSi) addresses; GSi is a UK Government wide area network, whose main purpose is to enable connected organisations to communicate electronically and securely low protective marking levels.  All other email domain addresses (Not Xxxxxxxxx.xxx.xx, CJSM, or GSi); Secure encrypted email MUST be used. Islington council’s secure email is Proofpoint, and this must be used when transferred personally identifiable or sensitive personal data. Where possible electronic mails containing Personal and Sensitive Personal Data should not be sent outside of the networks mentioned above. However if this is not possible, electronic mails should only be sent to addresses which are directly linked to the recipient, under no circumstances should any electronic mail containing Personal data or Sensitive Personal Data be sent to group email addresses, or addresses that have not been verified by the recipient. In addition, emails will only be sent to recipients who have emails associated with an organisation containing address strings such as xxx.xx and xxx.xx and not to personal or social email addresses. Under no circumstances should Personal or Sensitive Personal Data be included in the Subject, or the Body of any electronic mail that is sent outside of the networks mentioned above. Any Personal Data or Sensitive Personal Data should be contained in a separate document, which is password protected, and attached to the electronic mail. Sharing data via Removable Media Personally identifiable data must not be stored on or transported by removable media. Sharing Data on Paper It is recommended that all Personal Data and Sensitive Personal Data is transferred electronically. If t...
Data Transport. 8.1 To the extent that Databricks processes any Customer Data subject to EU Data Protection Law (“EEA Data”) on behalf of Customer, the parties agree that Databricks makes available the transfer mechanisms listed below for any transfers of EEA Data from the EEA to Databricks located in a country which does not ensure an adequate level of protection (within the meaning of Applicable Data Protection Laws) and to the extent such transfers are subject to such EU Data Protection Law:
AutoNDA by SimpleDocs
Data Transport. When transporting DSHS Confidential Information electronically the Data will be encrypted. This includes any transmission of the Data over the Internet in any manner including, but not limited to, email outside of their own network.

Related to Data Transport

  • Signaling Link Transport 9.2.1 Signaling Link Transport is a set of two or four dedicated 56 kbps transmission paths between Global Connection-designated Signaling Points of Interconnection that provide appropriate physical diversity.

  • Dark Fiber Transport Dark Fiber Transport is defined as Dedicated Transport that consists of unactivated optical interoffice transmission facilities without attached signal regeneration, multiplexing, aggregation or other electronics. Except as set forth in Section 6.9.1 below, BellSouth shall not be required to provide access to Dark Fiber Transport Entrance Facilities pursuant to this Agreement.

  • Transport 6.1.1 BellSouth shall provide nondiscriminatory access, in accordance with FCC Rules 51.311, 51.319, and Section 251(c)(3) of the Act to interoffice transmission facilities described in this Section 6 on an unbundled basis to EZ Phone for the provision of a qualifying service, as set forth herein.

  • DELIVERY, STORAGE, AND HANDLING The Contractor shall be responsible to inspect all components on delivery to ensure that no damage occurred during shipping or handling for furnish and installation projects. For equipment only purchases, the ordering entity shall be responsible to inspect all components on delivery. Materials must be stored in original undamaged packaging in such a manner to ensure proper ventilation and drainage, and to protect against damage, weather, vandalism, and theft until ready for installation.

  • Purchase Order Flip via Ariba Network (AN) The online process allows suppliers to submit invoices via the AN for catalog and non- catalog goods and services. Contractors have the ability to create an invoice directly from their Inbox in their AN account by simply “flipping” the purchase order into an invoice. This option does not require any special software or technical capabilities. For the purposes of this section, the Contractor warrants and represents that it is authorized and empowered to and hereby grants the State and the third-party provider of MFMP the right and license to use, reproduce, transmit, distribute, and publicly display within the system the information outlined above. In addition, the Contractor warrants and represents that it is authorized and empowered to and hereby grants the State and the third-party provider the right and license to reproduce and display within the system the Contractor’s trademarks, system marks, logos, trade dress, or other branding designation that identifies the products made available by the Contractor under the Contract.

  • Data Storage Where required by applicable law, Student Data shall be stored within the United States. Upon request of the LEA, Provider will provide a list of the locations where Student Data is stored.

  • STATEWIDE CONTRACT MANAGEMENT SYSTEM If the maximum amount payable to Contractor under this Contract is $100,000 or greater, either on the Effective Date or at any time thereafter, this section shall apply. Contractor agrees to be governed by and comply with the provisions of §§00-000-000, 00-000-000, 00-000-000, and 00- 000-000, C.R.S. regarding the monitoring of vendor performance and the reporting of contract information in the State’s contract management system (“Contract Management System” or “CMS”). Contractor’s performance shall be subject to evaluation and review in accordance with the terms and conditions of this Contract, Colorado statutes governing CMS, and State Fiscal Rules and State Controller policies.

  • TRANSPORT SERVICES Upon the conclusion of such multilateral negotiations, the Parties shall conduct a review for the purpose of discussing appropriate amendments to this Agreement so as to incorporate the results of such multilateral negotiations.

  • Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • Data Transmission Control Except as necessary for the provision of the Cloud Services in accordance with the Agreement, Personal Data must not be read, copied, modified or removed without authorization during transfer. Where data carriers are physically transported, adequate measures are implemented at SAP to provide the agreed-upon service levels (for example, encryption and lead-lined containers). Measures: • Personal Data in transfer over SAP internal networks is protected according to SAP Security Policy. • When data is transferred between SAP and its customers, the protection measures for the transferred Personal Data are mutually agreed upon and made part of the relevant agreement. This applies to both physical and network based data transfer. In any case, the Customer assumes responsibility for any data transfer once it is outside of SAP-controlled systems (e.g. data being transmitted outside the firewall of the SAP Data Center).

Time is Money Join Law Insider Premium to draft better contracts faster.