Methods of Secure Transmission of Data Sample Clauses

Methods of Secure Transmission of Data. The Parties agree to use of one of the following methods of secure transmission of the Confidential Data: Application Encryption. If ENTITY is transmitting DHHS data containing Confidential Data between applications ENTITY shall ensure the applications are evaluated by a vendor knowledgeable in cyber security and that said application’s encryption capabilities ensure secure transmission via the internet prior to transmission. Computer Disks and Portable Storage Devices. ENTITY shall use encrypted computer disks or encrypted portable storage devices, such as an encrypted thumb drive, as a method of transmitting DHHS data. Encrypted Email. ENTITY shall only employ email to transmit Confidential Data if email is encrypted, being sent to, and being received by email addresses of persons authorized to receive such information.
Methods of Secure Transmission of Data. The Parties agree to use of one of the following methods of secure transmission of the Confidential Data:
Methods of Secure Transmission of Data 

Related to Methods of Secure Transmission of Data

  • Transmission of Data Customer understands that the technical processing and transmission of Customer’s Electronic Communications is fundamentally necessary to use of the Cloud Service. Customer is responsible for securing DSL, cable or another high speed Internet connection and up-to-date “browser” software in order to utilize the Cloud Service. Customer expressly consents to Oracle’s interception and storage of Electronic Communications and/or Customer Data as needed to provide the Services hereunder, and Customer acknowledges and understands that Customer’s Electronic Communications will involve transmission over the Internet, and over various networks, only part of which may be owned and/or operated by Oracle. Customer further acknowledges and understands that Electronic Communications may be accessed by unauthorized parties when communicated across the Internet, network communications facilities, telephone or other electronic means. Without limiting Oracle’s applicable obligations under the Security or Confidentiality Sections of this Agreement, Oracle is not responsible for any Electronic Communications and/or Customer Data which are delayed, lost, altered, intercepted or stored during the transmission of any data whatsoever across networks not owned and/or operated by Oracle, including, but not limited to, the Internet and Customer’s local network.

  • Loop Transmission Types 3.1 Subject to the conditions set forth in Section 1 of this Attachment, Verizon shall allow CBB to access Loops unbundled from local switching and local transport, in accordance with this Section 3 and the rates and charges provided in the Pricing Attachment. Verizon shall allow CBB access to Loops in accordance with, but only to extent required by, Applicable Law. The available Loop types are as set forth below:

  • Information Submission by Connecting Transmission Owner The initial information submission by Connecting Transmission Owner shall occur no later than one hundred eighty (180) Calendar Days prior to Trial Operation and shall include New York State Transmission System information necessary to allow the Developer to select equipment and meet any system protection and stability requirements, unless otherwise mutually agreed to by the Developer and Connecting Transmission Owner. On a monthly basis Connecting Transmission Owner shall provide Developer and NYISO a status report on the construction and installation of Connecting Transmission Owner’s Attachment Facilities and System Upgrade Facilities and System Deliverability Upgrades, including, but not limited to, the following information: (1) progress to date; (2) a description of the activities since the last report; (3) a description of the action items for the next period; and (4) the delivery status of equipment ordered.

  • Transmission encryption All data transmissions of County PHI or PI outside the secure internal network must be encrypted using a FIPS 140-2 certified algorithm which is 128-bit or higher, such as AES. Encryption can be end to end at the network level, or the data files containing PHI can be encrypted. This requirement pertains to any type of PHI or PI in motion such as website access, file transfer, and E-Mail.

  • Transmission of business Where a business is transmitted from one employer to another, as set out in clause 4.4 - Redundancy, the period of continuous service that the employee had with the transmittor or any prior transmittor is deemed to be service with the transmittee and taken into account when calculating notice of termination. However, an employee shall not be entitled to notice of termination or payment in lieu of notice for any period of continuous service in respect of which notice has already been given or paid for.