Secure Protocols Sample Clauses

Secure Protocols. The Parties shall use secure protocols for the transmission of data from the Bank and its Affiliates, on the one hand, to the Company and its Affiliates, on the other hand, and vice versa.
AutoNDA by SimpleDocs
Secure Protocols. The Parties shall use secure protocols for the transmission of all Nonpublic Personal Information and other Confidential Information, including the transmission of Protected Cardholder Data between and among each other.
Secure Protocols. The Parties shall use secure protocols for the transmission of data from Bank and its Affiliates, on the one hand, to Pier 1 and its Affiliates, on the other hand, and vice versa. This will include the use of data encryption or another form of agreed-upon secure data transmission method during transmission of all Cardholder Data and Pier 1 Shopper Data by both Bank and Pier 1.

Related to Secure Protocols

  • Protocols Each party hereby agrees that the inclusion of additional protocols may be required to make this Agreement specific. All such protocols shall be negotiated, determined and agreed upon by both parties hereto.

  • Interoperability To the extent required by applicable law, Cisco shall provide You with the interface information needed to achieve interoperability between the Software and another independently created program. Cisco will provide this interface information at Your written request after you pay Cisco’s licensing fees (if any). You will keep this information in strict confidence and strictly follow any applicable terms and conditions upon which Cisco makes such information available.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Protocol The attached Protocol shall be an integral part of this Agreement.

  • Network Interconnection Architecture Each Party will plan, design, construct and maintain the facilities within their respective systems as are necessary and proper for the provision of traffic covered by this Agreement. These facilities include but are not limited to, a sufficient number of trunks to the point of interconnection with the tandem company, and sufficient interoffice and interexchange facilities and trunks between its own central offices to adequately handle traffic between all central offices within the service areas at P.01 grade of service or better. The provisioning and engineering of such services and facilities will comply with generally accepted industry methods and practices, and will observe the rules and regulations of the lawfully established tariffs applicable to the services provided.

  • Network Interface Device (NID) 2.7.1 The NID is defined as any means of interconnection of end-user customer premises wiring to BellSouth’s distribution plant, such as a cross-connect device used for that purpose. The NID is a single-line termination device or that portion of a multiple-line termination device required to terminate a single line or circuit at the premises. The NID features two independent xxxxxxxx or divisions that separate the service provider’s network from the end user’s customer-premises wiring. Each chamber or division contains the appropriate connection points or posts to which the service provider and the end user each make their connections. The NID provides a protective ground connection and is capable of terminating cables such as twisted pair cable.

  • Disturbance Analysis Data Exchange The Parties will cooperate with one another and the NYISO in the analysis of disturbances to either the Large Generating Facility or the New York State Transmission System by gathering and providing access to any information relating to any disturbance, including information from disturbance recording equipment, protective relay targets, breaker operations and sequence of events records, and any disturbance information required by Good Utility Practice.

  • Distribution Protocol (1) At a time wholly within the discretion of Class Counsel, but on notice to the Settling Defendants, Class Counsel will bring motions seeking orders from the Courts approving the Distribution Protocol. The motions can be brought before the Effective Date, but the orders approving the Distribution Protocol shall be conditional on the Effective Date occurring.

  • Review Protocol A narrative description of how the Claims Review was conducted and what was evaluated.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

Time is Money Join Law Insider Premium to draft better contracts faster.