Secure File Transfer System Sample Clauses

Secure File Transfer System. Due to the confidential nature of test results, ETS uses secure file transfer protocol (SFTP) and encryption for all student data files. SFTP offers an efficient mechanism for transferring large-scale data. In addition, ETS uses .ZIP archive file format technology to reduce the disk space requirements on all files. This method applies to all data file transfers. ETS supports most secure transfer protocols, including Web-service-based technologies, to exchange data with clients and file-based transfers using Tumbleweed® Communications Corp., a provider of security solutions. This enables ETS to effectively manage and protect business-critical Internet communications. These processes allow simplified data exchanges with secure and easy-to-use architecture, which provides management of files and large documents over the Internet. One standard, easy-to-use mechanism is an SFTP. As a part of implementation, ETS will establish an SFTP service which will manage SFTP transfers to a directory structure between ETS and the CDE. Gatekeepers, generally one in California and one at ETS, will determine access privileges. The ETS gatekeeper will be responsible for approving all users for access. ETS will provide all interfaces with the most stringent security considerations in mind, including interfaces for data encryption at rest and in transit for databases that store test items and student data. Encryption at rest primarily applies to any data files that reside on a server that uses the SFTP waiting to be retrieved. ETS integrates best security practices, including system-to-system authentication and authorization, in ETS’s solution design. These practices meet the Federal Information Processing Standard Publication 140-2 (FIPS PUB 140-2) issued by the National Institute of Standards and Technology (NIST). All CAASPP data will remain within the continental United States, as the CDE requires.
AutoNDA by SimpleDocs

Related to Secure File Transfer System

  • Software Transfer You may permanently transfer all of your rights under this XXXX, provided you retain no copies, you transfer all of the SOFTWARE PRODUCT (including all component parts, the media and printed materials, any upgrades, this XXXX, and, if applicable, the Certificate of Authenticity), and the recipient agrees to the terms of this XXXX. If the SOFTWARE PRODUCT is an upgrade, any transfer must include all prior versions of the SOFTWARE PRODUCT.

  • Zone File Access Agreement Registry Operator will enter into an agreement with any Internet user, which will allow such user to access an Internet host server or servers designated by Registry Operator and download zone file data. The agreement will be standardized, facilitated and administered by a Centralized Zone Data Access Provider, which may be ICANN or an ICANN designee (the “CZDA Provider”). Registry Operator (optionally through the CZDA Provider) will provide access to zone file data per Section 2.1.3 of this Specification and do so using the file format described in Section 2.1.4 of this Specification. Notwithstanding the foregoing, (a) the CZDA Provider may reject the request for access of any user that does not satisfy the credentialing requirements in Section 2.1.2 below; (b) Registry Operator may reject the request for access of any user that does not provide correct or legitimate credentials under Section 2.1.2 below or where Registry Operator reasonably believes will violate the terms of Section 2.1.5. below; and, (c) Registry Operator may revoke access of any user if Registry Operator has evidence to support that the user has violated the terms of Section 2.1.5 below.

  • License Transfer You may not transfer the software to a third party without Microsoft’s prior written consent. If permitted, there may be additional charges for transferring the software to a third party.

  • Information Transfer and Storage Supplier will use Industry Standard encryption to encrypt Accenture Data that is in transit. Supplier will also use Industry Standard encryption to restrict access to Accenture Data stored on physical media that is transported outside of Supplier facilities.

  • Developer and Connecting Transmission Owner Notice Developer and Connecting Transmission Owner shall each notify the other Party, first orally and then in writing, of the release of any Hazardous Substances, any asbestos or lead abatement activities, or any type of remediation activities related to the Large Generating Facility or the Attachment Facilities, each of which may reasonably be expected to affect the other Party. The notifying Party shall: (i) provide the notice as soon as practicable, provided such Party makes a good faith effort to provide the notice no later than twenty-four hours after such Party becomes aware of the occurrence; and (ii) promptly furnish to the other Party copies of any publicly available reports filed with any Governmental Authorities addressing such events.

  • Agreement to Purchase and Sell On the terms and subject to the conditions set forth in this Agreement, each Originator, severally and for itself, agrees to sell to the Buyer, and the Buyer agrees to purchase from such Originator, from time to time on or after the Closing Date, but before the Purchase and Sale Termination Date (as defined in Section 1.4), all of such Originator’s right, title and interest in and to:

  • Additional Acceptable Uses of Student Data Contractor is prohibited from using Student Data for any secondary use not described in this agreement except:

  • Access to Personal File Upon written request from an employee, he or she and/or his or her Union representative shall have access to his or her official personal file in the presence of an authorized representative of the Corporation. The file should be made available within twenty-four (24) hours following the day of the written request, providing such file is available locally and, in all cases, within five (5) calendar days after the request. Where an employee's file is available for review and/or examination, reports as described in paragraph 10.02(c) are to be removed prior to such review and/or examination.

  • Supervisory Control and Data Acquisition (SCADA) Capability The wind plant shall provide SCADA capability to transmit data and receive instructions from the ISO and/or the Connecting Transmission Owner for the Transmission District to which the wind generating plant will be interconnected, as applicable, to protect system reliability. The Connecting Transmission Owner for the Transmission District to which the wind generating plant will be interconnected and the wind plant Developer shall determine what SCADA information is essential for the proposed wind plant, taking into account the size of the plant and its characteristics, location, and importance in maintaining generation resource adequacy and transmission system reliability in its area.

  • Collocation Transfer of Responsibility Collocation Transfer of Responsibility is the transfer of a Collocation site from vacating CLEC (current CLEC leasing the space in the Premises) to an assuming CLEC. Collocation Transfer of Responsibility is available for Caged Physical Collocation, Cageless Physical Collocation, and Virtual Collocation. All other types of Collocation to be transferred will be handled on an Individual Case Basis (ICB). There are two (2) types of Collocation Transfer of Responsibility: 1)

Time is Money Join Law Insider Premium to draft better contracts faster.