Data Security Policies definition

Data Security Policies means any current or future posted or internal agreement, standard or policy of a Person relating to the integrity, operation, redundancy, disaster recovery, security testing, monitoring and remediation of Systems used in such Person’s or its Affiliates’ business (and the data therein).
Data Security Policies. [Insert link(s) to [the Recipients/ NAME OF RECIPIENT 1’s]’ data protection/data security/information security policies] Derived Dataset(s) any Licensed Dataset (wholly or in part) Manipulated to such a degree that it: a. cannot be identified as originating or deriving directly from the Licensed Dataset or and cannot be reverse-engineered such that it can be so identified; and b. is not capable of use substantially as a substitute for the Dataset. Effective Date [Date from which access has been or is to be granted] EU GDPR Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and repealing Directive 95/46/EC (General Data Protection Regulation) OJ L 119/1, 4.5.2016.
Data Security Policies means each external written notice or policy of the Company relating to data security.

Examples of Data Security Policies in a sentence

  • The Company has measures in place to protect the security of your data in accordance with our Data Security Policies.

  • I agree to choose a difficult-to-guess password, not to share this password with any other person and not to write this password down as described in SFDPH Data Security Policies.

  • In the prior three (3) years, the Privacy and Data Security Policies have at all times been maintained and made available to individuals in accordance with reasonable industry practices and as required by Privacy Laws, are accurate and complete and are not misleading or deceptive (including by omission).

  • The practices of the Company or its Subsidiaries with respect to the Processing of Personal Data conform in all material respects to the Privacy and Data Security Policies that govern such Personal Data.

  • UT Arlington researchers should review the UT Arlington Data Security Policies and Guidelines for appropriate measures to protect against a breach of confidentiality (e.g., not storing identifiable data on laptops and flash drives, encryption, hashing of data, password protection, authentication of computer systems, utilization of secure servers, internet security software that protect against viruses, spyware, etc.).

  • Such conformance specifically includes the Information and Data Security Policies, Standards, and Guidelines issued by the Commonwealth through the Virginia Information Technologies Agency (VITA) as delineated at the following, or any then-current, URL: http://www.vita.virginia.gov/default.aspx?id=537 or any other information technology or Sensitive Data security requirements established by VITA and pertinent to the Systems, Products and Services.

  • Methods required to protect data and private information will vary greatly depending on the possible harms related to breach of confidentiality, the technologies employed in the collection and use of data, Institutional Data Security Policies, and applicable Federal and State confidentiality regulations.

  • Client acknowledges and agrees that any such cybersecurity or privacy laws, rules and/orregulations that may be specific to Client’s business or industry are not necessarily addressed by Third-party Provider’s general purpose Data Security Policies.

  • Neither the execution, delivery, or performance of this Agreement, nor the consummation of any of the transactions contemplated under this Agreement will violate any of the Privacy Agreements, Privacy and Data Security Policies or any applicable Privacy Laws.

  • In order to protect the security and integrity of Clinical Facility’s electronic data, I agree to approved Data Security Policies and Standards.

Related to Data Security Policies

  • Security Policy means the Authority’s Security Policy annexed to Schedule (Security Requirements and Plan) as updated from time to time.

  • Security Policy Framework means the Cabinet Office Security Policy Framework (available from the Cabinet Office Security Policy Division);

  • HMG Security Policy Framework means the Cabinet Office Security Policy Framework (available from the Cabinet Office Security Policy Division) as updated from time to time.

  • Privacy/Data Security Laws means all laws governing the receipt, collection, use, storage, processing, sharing, security, disclosure, or transfer of Personal Information or the security of the Business Systems or Business Data.

  • SAP Policies means the operational guidelines and policies applied by SAP to provide and support the Cloud Service as incorporated in an Order Form.

  • Safeguard Policy Statement or “SPS” means ADB's Safeguard Policy Statement (2009);

  • City Policies means any or all (as the context requires) of those procedures, standards and/or standard specifications, requirements, policies and the like listed in Schedule H or notified to the Supplier from time to time, as the same may be updated, modified, expanded, revised, supplemented and/or replaced from time to time by the City (as notified to the Supplier);

  • Data Security Requirements means, collectively, all of the following, to the extent relating to privacy or data security and applicable to the Company or to its conduct of the Business: (i) the Company’s own rules, policies, and procedures; (ii) all applicable laws; (iii) industry standards applicable to the industry in which the Company operates; and (iv) Contracts into which the Company has entered or by which it is otherwise bound.

  • Privacy Policies means all published, posted and written internal policies, procedures, agreements and notices with respect to the Company’s collection, use, storage, disclosure, or cross-border transfer of Personal Data.

  • Information Security Program means the administrative, technical, and physical safeguards that a licensee uses to access, collect, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle nonpublic information.

  • Security Management Plan means the Supplier's security management plan prepared pursuant to paragraph 3 of schedule 2 an outline of which is set out in paragraph 2.7 of the Order Form as updated from time to time;

  • Data Safeguards means the highest industry-standard safeguards (including administrative, physical, technical, and procedural safeguards) against the destruction, loss, misuse, unauthorized disclosure, or alteration of the JBE Data or Confidential Information, and such other related safeguards that are set forth in Applicable Laws, a Statement of Work, or pursuant to JBE policies or procedures.

  • Group Policy /”policy” means the breakdown policy as set out in this document;

  • Privacy Policy means the terms which set out how we will deal with confidential and personal information received from you via the Website;

  • Health insurance policy means a policy that provides specified benefits for hospital and/or general treatment and meets all requirements under section 63-10 of the Private Health Insurance Act 2007.

  • Data Security Breach means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, Personal Data transmitted, stored, or otherwise processed.

  • Security Procedures means rules and regulations governing access to, and health and safety procedures while on, Government premises; and information technology security protocols;

  • Required Insurance Policy With respect to any Mortgage Loan, any insurance policy that is required to be maintained from time to time under this Agreement.

  • Company Insurance Policies has the meaning set forth in Section 3.14.

  • FCA Handbook means the FCA Handbook of Rules and Guidance as amended from time to time.

  • R&W Insurance Policy means the representations and warranties insurance policy issued to Buyer in connection with the transactions contemplated hereby.

  • Errors and Omissions Insurance Policy means an errors and omissions insurance policy maintained by the Master Servicer, the Special Servicer, the Trustee, the Custodian or the Certificate Administrator, as the case may be, in accordance with Section 8.2, Section 9.2 and Section 7.17, respectively.

  • Policy Statement means a written description of the current approach of an agency, entitled a policy statement by the agency head or its designee, to implementation of a statute or other provision of law, of a court decision, or of an agency order, including where appropriate the agency's current practice, procedure, or method of action based upon that approach.

  • Phone/Electronic Transaction Security Procedures means security procedures for Phone/ Electronic Transactions as provided in writing to the Underwriter.

  • Provider of financial assurance means an entity that provides financial assurance to an Owner or Operator of an underground storage tank through one of the mechanisms listed in these Regulations, including a guarantor, insurer, risk retention group, surety, issuer of a letter of credit, issuer of a state required mechanism, or a state.

  • Company Privacy Policies means all current and, to the extent applicable, prior public or internal policies, procedures and representations of the Company or its Subsidiaries to the extent relating to data security or the Processing of Personally Identifiable Information, including the Data Protection Program.