Secured Email Transmission Sample Clauses

Secured Email Transmission. Contractor and its Staff are required securely to send Confidential Information via encrypted email, in accordance with all applicable State and Federal laws and County policies and guidelines as it pertains to the electronic transmission of Protected Health Information.
AutoNDA by SimpleDocs
Secured Email Transmission. NAC and the Business Partner will transfer information securely between each other to ensure the protection of information in transit.  This will require encryption to be applied which is at least a comparable standard to FIPS140-2 or 128/256 bit AES encryption  Where both parties have been accredited to the National Cyber Security Centre Secure Email Blueprint (SEB) approved sharing may be undertaken using SEB  NAC may provide a secure email system which will require the business partner to register before taking receipt of data.

Related to Secured Email Transmission

  • Data Transmission The procedures for transmitting load obligation data to PJM for DS Supplier’s DS Load shall be as set forth by PJM.

  • Data Transmission Control Except as necessary for the provision of the Cloud Services in accordance with the Agreement, Personal Data must not be read, copied, modified or removed without authorization during transfer. Where data carriers are physically transported, adequate measures are implemented at SAP to provide the agreed-upon service levels (for example, encryption and lead-lined containers). Measures: • Personal Data in transfer over SAP internal networks is protected according to SAP Security Policy. • When data is transferred between SAP and its customers, the protection measures for the transferred Personal Data are mutually agreed upon and made part of the relevant agreement. This applies to both physical and network based data transfer. In any case, the Customer assumes responsibility for any data transfer once it is outside of SAP-controlled systems (e.g. data being transmitted outside the firewall of the SAP Data Center).

  • Transmission Control In-transit: We make HTTPS encryption (also referred to as SSL or TLS) available on every one of its login interfaces and for free on every customer site hosted on the HubSpot products. Our HTTPS implementation uses industry standard algorithms and certificates. At-rest: We store user passwords following policies that follow industry standard practices for security. We have implemented technologies to ensure that stored data is encrypted at rest.

  • Transmission The Custodian and the Fund shall comply with SWIFT’s authentication procedures. The Custodian will act on FT Instructions received via SWIFT provided the instruction is authenticated by the SWIFT system. § Written Instructions. Instructions may be transmitted in an original writing that bears the manual signature of an Authorized Person(s).

  • Facsimile Transmission A FT Instruction transmitted to the Custodian by facsimile transmission must be transmitted by the Fund to a telephone number specified from time to time by the Custodian for such purposes. The Custodian will then follow one of the procedures below:

  • Transmission encryption All data transmissions of County PHI or PI outside the secure internal network must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as AES. Encryption can be end to end at the network level, or the data files containing PHI can be encrypted. This requirement pertains to any type of PHI or PI in motion such as website access, file transfer, and E-Mail.

  • Merchant Transmission Facilities “Controllable A.C. Merchant Transmission Facilities” shall mean transmission facilities that (1) employ technology which Transmission Provider reviews and verifies will permit control of the amount and/or direction of power flow on such facilities to such extent as to effectively enable the controllable facilities to be operated as if they were direct current transmission facilities, and

  • Transmissions 10.1. Personal Data transmitted by the Data Processor in connection with the Service through the Internet shall be reasonably encrypted. The Parties acknowledge, however, that the security of transmissions over the Internet cannot be guaranteed. The Data Processor will not be responsible for Data Controller’s access to the Internet, for any interception or interruption of any communications through the Internet, or for changes to or losses of Personal Data through the Internet.

  • Transmission Service Point-To-Point Transmission Service provided under Part II of the Tariff on a firm and non-firm basis.

  • Electronic Transmission For purposes of these Bylaws, “electronic transmission” means any form of communication, not directly involving the physical transmission of paper, that creates a record that may be retained, retrieved, and reviewed by a recipient thereof, and that may be directly reproduced in paper form by such a recipient through an automated process.

Time is Money Join Law Insider Premium to draft better contracts faster.