Security Overview Sample Clauses
The Security Overview clause outlines the general approach and measures taken to protect data, systems, or information within the scope of an agreement. It typically describes the types of security protocols in place, such as encryption, access controls, and monitoring, and may reference compliance with industry standards or regulations. This clause serves to assure parties that adequate safeguards are implemented, thereby reducing the risk of data breaches and clarifying security responsibilities.
Security Overview. The Demandware security strategy is designed to protect your data at multiple levels, including data security, data integrity, and data privacy. To ensure the privacy, security, and availability of your data and transactions, Demandware employs the following technologies in delivering its service. [**]
1.1 Data Center Security
Security Overview. All IZ Gateway Portfolio Project components are secured at the HIPAA level, leveraging APHL’s security and ensuring confidentiality, integrity and availability. • All connections into the IZ Gateway use an IZ Gateway digital certificate, ensuring that only authenticated (authorized and verified) systems are allowed to connect. • Outgoing connections only occur with known URLs to ensure data transmission to appropriate recipients. • All IZ information is encrypted while in motion. • IZ Gateway does not use, disclose or decrypt IZ information in Connect/Share/Access. • For Multi-Jurisdictional Data Exchange only, which is still under development, the IZ Gateway will access and decrypt IZ information, such as when routing a query to additional Participating IIS Jurisdictions that are 16 identified by the sender within the message and have executed the MOU.
Security Overview. We make every effort to ensure that your information is protected. We use current industry standard encryption and employ SSL encryption to insure that information passed between our site and your browser is secure. All servers involved in gathering, storing, and providing the data to you are operated in a secure data center that has restricted access to authorized personnel only. Our data center is monitored 24 hours per day and only certified employees are permitted on premises. A record is kept of all personnel who have entered the secure data center. Access to servers requires multiple levels of authentication. Sensitive data including your access credentials and account numbers are always stored in encrypted format at all times. Our employees are made aware of our security policies, procedures and practices and confirm, on a yearly basis, that they have carefully reviewed and abide by it.
Security Overview. All IZ Gateway use cases/components are secured at the HIPAA level, leveraging The Association of Public Health Laboratories (APHL)’s security and ensuring confidentiality, integrity and availability • All connections into the IZ Gateway use an IZ Gateway digital certificate, ensuring that only authenticated (authorized and verified) systems are allowed to connect. • Outgoing connections only occur with known URLs to ensure data transmission to appropriate recipients. • All IZ information is encrypted while in motion. • IZ Gateway does not use, disclose or decrypt IZ information in Connect/IIS-IIS Exchange/Access. Highly Sensitive/Any User (No encryption) • For Multi-Jurisdictional Data Exchange only, which is still under development, the IZ Gateway will access and decrypt IZ information, such as when routing a query to additional participating IIS jurisdictions that are identified by the sender within the message and have executed the MOU. Highly Sensitive/Any User (No encryption) Per DUA with IIS Jurisdiction, APHL will notify jurisdiction promptly of a data breach.
Security Overview. Offeror must describe its notification process in the event of a security incident, including relating to timing, incident levels. Offeror should take into consideration that Purchasing Entities may have different notification requirements based on applicable laws and the categorization type of the data being processed or stored.
Security Overview. Using the Online Banking login on the ▇▇▇.▇▇▇▇▇▇▇.▇▇▇ pages is safe, since your account number/username and password are transmitted via secure session that is established between your browser and our systems. Your information is encrypted using 128-bit encryption algorithm and sent to our systems for authentication into Online Banking. Please note ACU never transmits your information without it first being encrypted. You acknowledge the Internet is inherently insecure and all data transfers, including electronic mail, occur openly on the Internet and potentially can be monitored and read by others. Requests for personal information should only be sent to us through the Message Board in your Online Banking account. We cannot and do not warrant data transfers utilizing the open Internet.
