Cyber Security Laws definition

Cyber Security Laws means any Laws pertaining to the prevention and reporting of Cyber Security Incidents, including Cybersecurity Act of 2015 (P.L. 114-113), Cybersecurity Enhancement Act of 2014 (P.L. 113-2), Economic Espionage Act of 1996 (18 U.S.C. § 1030, §§ 1831-39).
Cyber Security Laws means any Laws pertaining to the prevention and reporting of Cyber Security Incidents, including Cybersecurity Act of 2015 (P.L. 114-113), Cybersecurity Enhancement Act of 2014 (P.L. 113-2), Economic Espionage Act of 1996 (18
Cyber Security Laws means all Applicable Laws concerning or otherwise relating to cyber, network and/or information security applicable to the Company’s business;

Examples of Cyber Security Laws in a sentence

  • The following replaces this clause: Each party will comply with all applicable laws and regulations, including, without limitation, the U.S. Foreign Corrupt Practices Act and the applicable anti-bribery laws and laws governing transactions with government and public entities, antitrust and competition laws, applicable xxxxxxx xxxxxxx, securities, and financial reporting laws, laws governing consumer transactions, laws regarding data privacy, and Cyber Security Laws.

  • The applicable laws, in particular the Cyber Security Laws and Regulations shall be referred to in the interpretation of this Cyber Security and Data Protection clause e.g. with regard to the definition and scope of personal information, important data, network product, network service as well as data cross-border transfer.

  • In the entire period of Contract, the vendor should adhere to, IT Act 2000, IT Act 2008 (amendment), Cyber Security Laws, Role of Cert-In, the Information Technology (Reasonable security Practice and procedures and sensitive personal data of information) Rules, 2011, Sensitive Personal Data Information Rules and Privacy of Personal Data etc.

  • Health Plans and Cyber Security Laws The DOL has a longstanding interest in cybersecurity issues specifically for retirement plans.

  • Finally, Korea requested that any sub-laws and other implementing measures related to the Cyber Security Laws which were established or revised, be notified to the WTO to allow time for comments from international stakeholders.

  • The list of countries as mentioned in figure 1 is the initiative of McConnell International that surveyed global network of information technology any Cyber Security Laws the around the world.

  • In case of Siemens to conduct a personal information protection impact assessment, the Supplier shall assist and cooperate with Siemens and make available to Siemens all necessary information to demonstrate the compliance with the obligations under the Cyber Security Laws and Regulations.

  • Finally, Korea requested that any sub-laws and other implementing measures related to the Cyber Security Laws which were established or revised, be notified to the WTO to allow time for comments from international stakeholders.The representative of the European Union referred to its comments made at previous TBT Committees and reiterated its concerns regarding the entry into force of the Cybersecurity Law on 1 June 2017.

  • Daniel Wagner, The Global Implications of China’s National and Cyber Security Laws, International Policy Digest (Aug.

  • Contractor will acquire, use, handle, collect, maintain, store, transmit, and safeguard Restricted Confidential Information in accordance with applicable Cyber Security Laws and applicable Privacy and Consumer Protection Laws.

Related to Cyber Security Laws

  • Cyber security means the condition in which road vehicles and their functions are protected from cyber threats to electrical or electronic components.

  • Privacy and Security Laws means applicable Laws that govern the Processing, privacy or security of Personal Information.

  • Privacy/Data Security Laws means all laws governing the receipt, collection, use, storage, processing, sharing, security, disclosure, or transfer of Personal Information or the security of the Business Systems or Business Data.

  • Tender Security means the security required to be submitted by the Tenderer with its Tender Offer.

  • Cyber Security Incident means any malicious or suspicious event that disrupts, or was an attempt to disrupt, the operation of those programmable electronic devices and communications networks including hardware, software and data that are essential to the Reliable Operation of the Bulk Power System.++

  • Other Security means any security acceptable to the commissioner other than security meeting the definition of Primary Security.

  • Data Security Requirements means, collectively, all of the following, to the extent relating to privacy or data security and applicable to the Company or to its conduct of the Business: (i) the Company’s own rules, policies, and procedures; (ii) all applicable laws; (iii) industry standards applicable to the industry in which the Company operates; and (iv) Contracts into which the Company has entered or by which it is otherwise bound.

  • Relevant Security means any share of Common Stock, warrant to purchase Common Stock or any other security of the Company or any other entity that includes or is convertible into, or exercisable or exchangeable for, Common Stock or any other equity security of the Company, in each case owned beneficially or otherwise by the undersigned on the date set forth on the front cover of the final prospectus used in connection with the Public Offering of the Securities (the “Effective Date”) or acquired by the undersigned during the Lock-Up Period. The Lock-Up Period will commence on the date of this Lock-Up Agreement and continue and include the date one hundred eighty (180) days after the Effective Date. In addition, the undersigned further agrees that, without the prior written consent of the Representative, during the Lock-Up Period the undersigned will not: (i) file or participate in the filing with the SEC of any registration statement or circulate or participate in the circulation of any preliminary or final prospectus or other disclosure document, in each case with respect to any proposed offering or sale of a Relevant Security, or (ii) exercise any rights the undersigned may have to require registration with the SEC of any proposed offering or sale of a Relevant Security. In furtherance of the undersigned’s obligations hereunder, the undersigned hereby authorizes the Company during the Lock-Up Period to cause any transfer agent for the Relevant Securities to decline to transfer, and to note stop transfer restrictions on the stock register and other records relating to, Relevant Securities for which the undersigned is the record owner and the transfer of which would be a violation of this Lock-Up Agreement and, in the case of Relevant Securities for which the undersigned is the beneficial but not the record owner, agrees that during the Lock-Up Period it will cause the record owner to cause the relevant transfer agent to decline to transfer, and to note stop transfer restrictions on the stock register and other records relating to, such Relevant Securities to the extent such transfer would be a violation of this Lock-Up Agreement. Notwithstanding the foregoing, the undersigned may transfer the undersigned’s Relevant Securities:

  • The HIPAA Security Rule means the Security Standards for the Protection of 23 electronic PHI at 45 CFR Part 160, Part 162, and Part 164, Subparts A and C.

  • Food Security Act means the Food Security Act of 1985, 7 U.S.C. Section 1631 et. seq., as the same now exists or may hereafter from time to time be amended, modified, recodified or supplemented, together with all rules and regulations thereunder.

  • Borrower Security Agreement means the Security Agreement, dated as of the date hereof, between Borrower and the Agent.

  • Privacy and Security Requirements means (a) all Privacy Laws; (b) all applicable Privacy Contracts, and (c) all applicable Privacy Policies.

  • Security Code means a sequence of numbers and/or letters or such other codes or procedures, whether generated by a Security Mechanism or otherwise, for use in connection with access to and/or use of the EB Services;

  • Computer Security Procedures means procedures for prevention of unauthorized computer access and use and administration of computer access and use as provided in writing to the Underwriter.

  • Quasi-Security has the meaning given to that term in Clause 21.9 (Negative pledge).

  • Canadian securities legislation means the applicable securities legislation in force in each province and territory of Canada, all regulations, rules, orders and policies made thereunder and all multilateral and national instruments adopted by the securities regulatory authorities.

  • HIPAA Security Rule as defined in 45 CFR Part 164, Subparts A and C;

  • Security Standards means the final rule implementing HIPAA’s Security Standards for the Protection of Electronic PHI, as amended.

  • European Data Protection Laws means the EU General Data Protection Regulation 2016/679 (“GDPR”) and data protection laws of the European Economic Area (“EEA”) and their member states and the FADP.

  • Applicable Securities Legislation means applicable securities laws (including rules, regulations, policies and instruments) in each of the applicable provinces and territories of Canada;

  • Security Codes are the credentials (such as codes and passwords) that are associated with you and used by us to verify the authenticity of Communications from you. Security Codes are used to access Accounts and to use the Services. The Security Codes include any supplemental or alternative method used to verify the authenticity of Communications that may be offered or presented to you by us from time to time. • “Service(s)” and “Online Banking” are the online banking interface and the banking services described in this Agreement.

  • Security Requirement means the amount in Dollars (as certified by the Agent whose certificate shall, in the absence of manifest error, be conclusive and binding on the Borrowers and the Creditors) which is, at any relevant time:

  • Security Requirements means the requirements regarding the security of Personal Data, as set out in the Data Protection Laws (including, in particular, the seventh data protection principle of the DPA and/ or the measures set out in Article 32(1) of the GDPR (taking due account of the matters described in Article 32(2) of the GDPR)) as applicable;

  • Indexed Security means a Security the terms of which provide that the principal amount thereof payable at Stated Maturity may be more or less than the principal face amount thereof at original issuance.

  • Similar Security means a reference bond or reference bonds issued by the same issuer as the Reference Security having actual or interpolated maturity comparable with the remaining term of the Notes that would be utilised, at the time of selection and in accordance with customary financial practice, in pricing new issues of corporate debt securities of comparable maturity to the remaining term of the Notes.

  • Information Privacy and Security Laws means applicable Laws and legal requirements (and binding industry standards) concerning the use, ownership, maintenance, storage, collection, transfer, processing, controlling, privacy and/or security of Personal Information.