Transmitting information securely Sample Clauses

Transmitting information securely. When sharing information both the sender and the receiver should deal with the information according to its protective marking. See Appendix 2 for handling requirements in line with information classification. Any e-mail or attachment containing personal data must be sent via a secure encrypted e- mail system. Where the partner does not have access to a secure encrypted e-mail system, the information must be encrypted via some other means, such as Windows password encryption, and the password sent via other means, such as telephone.
AutoNDA by SimpleDocs
Transmitting information securely. When sharing information both the sender and the receiver should deal with the information according to its protective marking. See Appendix 2 for handling requirements in line with protective marking. Secure e-mail Lincolnshire Police documents must display the Protective marking at the top and bottom of the relevant text or attachments. Insecure e-mail should not be used for any personalised information. The below secure e-mail addresses may be used for information protectively marked up to and including RESTRICTED:

Related to Transmitting information securely

  • Personal Information security breach Supplier/Service Provider’s Obligations

  • Furnishing Information (i) Neither the Investor nor any Holder shall use any free writing prospectus (as defined in Rule 405) in connection with the sale of Registrable Securities without the prior written consent of the Company.

  • Supporting Information Each Franchise Fee payment shall be accompanied by a brief report prepared by a representative of Franchisee showing the basis for the computation.

  • Billing Information 6.1 NLT and the RL shall provide each other with information within their possession that is necessary to allow them to provide accurate and timely billing to each other and to any other relevant third parties.

  • Exception Where Databases Contain Sufficient Information A Reporting Financial Institution is not required to perform the paper record search described in subparagraph D.2. of this section if the Reporting Financial Institution’s electronically searchable information includes the following:

  • Vendor Information Vendor understands that as part of Hinsdale Central School District’s obligations under New York Education Law Section 2-d, Vendor is responsible for providing Hinsdale Central School District with Vendor information (see Vendor Information for Data Privacy and Security) to include:

  • Identifying Information Issuer and Broker acknowledge that a portion of the identifying information set forth on Exhibit A is being requested by NCPS in connection with the USA Patriot Act, Pub.L.107-56 (the “Act”). To help the government fight the funding of terrorism and money laundering activities, Federal law requires all financial institutions to obtain, verify, and record information that identifies each person who opens an account. For a non-individual person such as a business entity, a charity, a Trust, or other legal entity, we ask for documentation to verify its formation and existence as a legal entity. We may also ask to see financial statements, licenses, identification and authorization documents from individuals claiming authority to represent the entity or other relevant documentation.

  • Contractor Information The Contractor will provide up to date information for each of the following in the form and manner specified by OGS:

  • Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

Time is Money Join Law Insider Premium to draft better contracts faster.