Cybersecurity purpose definition

Cybersecurity purpose means the purpose of protecting an infor- mation system or information that is stored on, processed by, or transiting an information system from a cybersecurity threat or se- curity vulnerability. 6 U.S.C. 1501(4)
Cybersecurity purpose means the purpose of protecting an information system or information that is stored on, processed by, or transiting an information system from a cybersecurity threat or security vulnerability. 6 U.S.C. 1501(4)
Cybersecurity purpose means the purpose of protecting an information system or infor- mation that is stored on, processed by, or transiting an information system from a cy- bersecurity threat or security vulnerability. ‘‘(9) CYBERSECURITY RISK.—The term ‘cy-

Examples of Cybersecurity purpose in a sentence

  • In place of the trimester approach of Roe, a combination of undue burden and viability would take its place.The only provision of the Pennsylvania law struck down by the plurality was the husband notification requirement.


More Definitions of Cybersecurity purpose

Cybersecurity purpose means the purpose of protecting an information system (of an AIS Participant, a customer or member of an AIS Participant, or otherwise) or information that is stored on, processed by, or transiting an information system from a cybersecurity threat or security vulnerability. “Cybersecurity Purpose” includes research that is conducted for a Cybersecurity Purpose.
Cybersecurity purpose. ’ means the purpose of pro-
Cybersecurity purpose means the purpose of protecting an infor- mation system or information that is stored on, processed by, or transiting an information system from a cybersecurity threat or se- curity vulnerability. The term does not include any action that solely involves a violation of a consumer term of service or a consumer li- censing agreement. 6 U.S.C. 1501(4)
Cybersecurity purpose means the purpose of protecting an
Cybersecurity purpose means the purpose of protecting an information system or information that is stored on, processed by, or transiting an information system from a cybersecurity threat or security vulnerability. See Cybersecurity Information Sharing Act of 2015, Pub. L. No. 114-113, Division N, Title I, § 102, 129 Stat. 2936 (2015) (current version at 6 U.S.C. § 1501(5)(a)).

Related to Cybersecurity purpose

  • Cybersecurity Event means any act or attempt, successful or, to the extent known by Provider, unsuccessful, to gain unauthorized access to, disrupt or misuse an Information System or Nonpublic Information stored on such Information System. The ongoing existence and occurrence of attempted but Unsuccessful Security Incidents shall not constitute a Cybersecurity Event under this definition. “Unsuccessful Security Incidents” are activities such as pings and other broadcast attacks on Provider’s firewall, port scans, unsuccessful log-on attempts, denials of service and any combination of the above, so long as no such incident results in unauthorized access, use or disclosure of Molina Nonpublic Information or sustained interruption of service obligations to Molina.

  • Approved Purpose means a purpose for the use of recycled tires which is found on the list of Approved Purposes for Recycled Tires maintained by OTS and published on OTS’s web site from time to time;

  • Cybersecurity means the measures taken to protect a computer, computer network, or computer system against unauthorized use or access.

  • Authorized Purpose means the specific purpose or purposes described in the Base Contract for Contractor to fulfill its obligations under the Base Contract, or any other purpose expressly authorized by HHS in writing in advance.

  • NIST Cybersecurity Framework means the U.S. Department of Commerce National Institute for Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity (Version 1.1).

  • Agreed Purpose has the meaning given to it in clause 2 of this Agreement.

  • General purpose equipment means equipment, which is not limited to research, medical, scientific or other technical activities. Examples include office equipment and furnishings, modular offices, telephone networks, information technology equipment and systems, air conditioning equipment, reproduction and printing equipment, and motor vehicles.

  • Security Vulnerability means a flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in a security breach such that data is compromised, manipulated or stolen or the system damaged.

  • Authorized Users(s) means an individual or individuals with a business need to access DSHS Confidential Information, and who has or have been authorized to do so.

  • Data Centre or "DC" means the primary centre where data, software, computer systems and associated components, such as telecommunication and storage systems, redundant or backup power supplies, redundant data communications, environment controls and security devices are housed and operated from;

  • Authorized User means one named employee, contractor or agent of Customer (each identified by a unique email address) for whom Customer has purchased a subscription to the Subscription Services and who is authorized by Customer to access and use the Services under the rights granted to Customer pursuant to this Agreement.

  • Technological Change means the introduction or addition of equipment, machines or instruments or the modification thereof resulting in modification of the Employee’s tasks or skills required to fulfill the requirements of the position.

  • Security Management Plan means the Supplier's security management plan prepared pursuant to paragraph 3 of schedule 2 an outline of which is set out in paragraph 2.7 of the Order Form as updated from time to time;

  • Permitted Purpose means any activity or process to be undertaken or supervised by a Staff member of one Party during the term of this Agreement, for which purpose authorised disclosure of the other Party’s Confidential Information or Intellectual Property is a prerequisite in order to enable such activity or process to be accomplished;

  • LOCKHEED MARTIN Procurement Representative means a person authorized by LOCKHEED MARTIN's cognizant procurement organization to administer and/or execute this Contract.

  • technical and organisational security measures means those measures aimed at protecting personal data against accidental or unlawful destruction or accidental loss, alteration, unauthorised disclosure or access, in particular where the processing involves the transmission of data over a network, and against all other unlawful forms of processing.

  • Data Center(s) means the site or sites at which the Software will be hosted to provide the Authorized Services to Customers. Such site or sites shall at all times be owned or controlled by the Provider.

  • Educational purpose means classroom activities, research in academic subjects, career or professional development activities, Green Dot approved personal research activities, or other purposes as defined by the School from time to time.

  • Data Center means the location where the production instance of the Cloud Service is hosted for the Customer in its region, as published at: xxxx://xxx.xxx.xxx/corporate-en/about/our- company/policies/data-privacy-and-security/location-of-data-center.html or notified to Customer or otherwise agreed in an Order Form.

  • Approved Purposes means the use of Data by the Provider for the purposes of providing services authorized by APS in Agreements entered into between APS and the Provider (“Authorized Services”) during the term of the SDUPA., and for no other purpose.

  • Authorized Users means employees or contractors of the Licensee who regularly work at Your Workplace who use the Software.

  • Primary Purpose means the collection, use, or disclosure of information collected by the Company or supplied by the Customer in order to: (1) provide, bill, or collect for, regulated electric service; (2) provide for system, grid, or operational needs; (3) provide services as required by state or federal law or as specifically authorized by an order of the Commission; (4) plan, implement, or evaluate programs, products or services related to energy assistance, demand response, energy management, energy efficiency, or renewable energy by the Company or under contract with the Company, under contract with the Commission, or as part of a Commission-authorized program conducted by an entity under the supervision of the Commission, or pursuant to state or federal statutes governing energy assistance; and (5) disclosure of customer name and address to a provider of appliance repair services in compliance with MCL 460.10a(9)(a), or to otherwise comply with the Code of Conduct.

  • Access Seeker means an Operator who:

  • CLIENT OF BHEL or “CUSTOMER” shall mean the project authorities with whom BHEL has entered into a contract for provision of services.

  • Business Purpose means the use of personal information for the business’s or a service provider’s operational purposes, or other notified purposes, provided that the use of personal information shall be reasonably necessary and proportionate to achieve the operational purpose for which the personal information was collected or processed or for another operational purpose that is compatible with the context in which the personal information was collected. Business purposes are:

  • technical and organizational security measures means those measures aimed at protecting personal data against accidental or unlawful destruction or accidental loss, alteration, unauthorized disclosure or access, in particular where the processing involves the transmission of data over a network, and against all other unlawful forms of processing.