Data Security Program definition

Data Security Program means Exhibit B (Data Security Program) of this MSA.
Data Security Program has the meaning given in Section 10.1(c)(ii). “Data Subcontractor” means any Subcontractor that comes into direct contact with Ascension Health Data. “Data Supplier Vendor” means any Supplier Vendor that comes into direct contact with Ascension Health Data. “Debit AR” means positive balance open AR. “Deficient Service” has the meaning given in Section 4.4(a). “De-identified” has the meaning given in Section in Section 13.2(f). “Denials” means non-contractual adjustments or write off of charges taken in accordance with eligible participant policies and/or payer denials. “Dependent Services” means those Services that are specified as “Dependent Services” in Exhibit 2-A. “Derivative Work” means a work based on one or more preexisting works, including a condensation, transformation, translation, modification, expansion, or adaptation, that, if prepared without authorization of the owner of the copyright of such preexisting work, would constitute a copyright infringement under applicable Law, but excluding the preexisting work. “Detailed Transition Plan” has the meaning given in Section 4.2(b). “Developed Materials” means both Commissioned Developed Materials and General Developed Materials. “Development Tools” means all software programs and programming (and all modifications, replacements, Upgrades, enhancements, documentation, materials and media related thereto) that are used in the development, testing, deployment and maintenance of Applications to the extent a Party has financial or operational responsibility for such programs or programming under a Supplement. Development Tools shall include all such products in use or required to be used as of the Commencement Date, including those set forth in the applicable Supplement, those as to which the license, maintenance or support costs are included in the applicable Base Case, and those as to which Supplier received reasonable notice and/or access prior to the Commencement Date. Development Tools also shall include all such products selected and/or developed by or for Ascension Health or the other Eligible Recipients on or after the Commencement Date to the extent a Party has financial or operational responsibility for such programs or programming under a Supplement. “Directives” has the meaning given in Exhibit 11, Section 2.2. “Discretionary Transition Employee” has the meaning given in Exhibit 13, Section 1.1. “Disengagement Plan” has the meaning given in Section 20.7(b)(1). “Disengagement Services” means ...
Data Security Program has the meaning set forth in Section 4.12.10(c).

Examples of Data Security Program in a sentence

  • I will follow NIOSH Sensitive Data Security Program guidelines regarding the safeguarding of electronic data and records.

  • The Vendor Data Security Program shall include the following elements.

  • For, plausibly, something’s having a property in B is necessarily grounded in that thing’s having some properties in A, but not vice versa.

  • To the extent that any covered organization serving as a vendor to another covered organization receives a request under this Section directly from an individual pertaining to personal information maintained in its vendor capacity, such vendor shall either refer the request to the covered 27 | Privacy for America Data Securityorganization or implement the request at the direction of the covered organization.N. Data Security Program.

  • Refer to the dental benefits described in the PEBP Self-funded PPO Dental Plan Master Plan Document available at www.pebp.state.nv.us.

  • Licensee shall not permit removal of any subject data from the licensed site (i.e., limited access space protected under the provisions of this License) without first notifying and obtaining writtenapproval from the IES Data Security Program.

  • Report on the possible adoption of a comprehensive Data Security Program similar to the one required by the new Massachusetts regulations (Requested by Vice President Peeples – 9/24/08) (GM Memo No. 09-145).

  • Termination hereof is automatic upon delivery of all of the deposited Source Code and Commentary to Licensee in accordance with the provisions hereof.

  • Company will secure and protect the Services from misuse and unauthorized access and implement security, data management, and incident response protocols in accordance with industry best practices and comply with the terms of Exhibit B (Data Security Program).

  • These requirements are consistent with the Enhanced Data Security Program that Genworth and Oceanwide have undertaken in connection with the clearance of the transaction by the Committee on Foreign Investment in the United States (CFIUS).

Related to Data Security Program

  • Information Security Program means the administrative, technical, and physical safeguards that a licensee uses to access, collect, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle nonpublic information.

  • Data Security Breach means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, Personal Data transmitted, stored, or otherwise processed.

  • Privacy/Data Security Laws means all laws governing the receipt, collection, use, storage, processing, sharing, security, disclosure, or transfer of Personal Information or the security of the Business Systems or Business Data.

  • Data set means an identifiable collection of data;

  • Security Procedures means rules and regulations governing access to, and health and safety procedures while on, Government premises; and information technology security protocols;

  • HMG Security Policy Framework means the Cabinet Office Security Policy Framework (available from the Cabinet Office Security Policy Division) as updated from time to time.

  • Data Security Requirements means, collectively, all of the following, to the extent relating to privacy or data security and applicable to the Company or to its conduct of the Business: (i) the Company’s own rules, policies, and procedures; (ii) all applicable laws; (iii) industry standards applicable to the industry in which the Company operates; and (iv) Contracts into which the Company has entered or by which it is otherwise bound.

  • Security procedure means a procedure employed for the purpose of verifying that an electronic signature, record, or performance is that of a specific person or for detecting changes or errors in the information in an electronic record. The term includes a procedure that requires the use of algorithms or other codes, identifying words or numbers, encryption, or callback or other acknowledgment procedures.

  • Computer Security Procedures means procedures for prevention of unauthorized computer access and use and administration of computer access and use as provided in writing to the Underwriter.

  • Data Safeguards means the highest industry-standard safeguards (including administrative, physical, technical, and procedural safeguards) against the destruction, loss, misuse, unauthorized disclosure, or alteration of the JBE Data or Confidential Information, and such other related safeguards that are set forth in Applicable Laws, a Statement of Work, or pursuant to JBE policies or procedures.

  • Security Policy Framework means the Cabinet Office Security Policy Framework (available from the Cabinet Office Security Policy Division);

  • Data Services The Customer will receive a discount equal to 25% for the following Data Services: Access: Standard VBS2 Guide local loop charges for DS-1 Access and DS-3 Access Service.

  • Security Management Plan means the Supplier's security management plan prepared pursuant to paragraph 3 of schedule 2 an outline of which is set out in paragraph 2.7 of the Order Form as updated from time to time;

  • Data Security Incident means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, Agreement Personal Data transmitted, stored or otherwise Processed;

  • Phone/Electronic Transaction Security Procedures means security procedures for Phone/ Electronic Transactions as provided in writing to the Underwriter.

  • Data Service means a telecommunications service other than a voice service.

  • NIST Cybersecurity Framework means the U.S. Department of Commerce National Institute for Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity (Version 1.1).

  • Account Information Service Provider means a payment service provider pursuing business activities as referred to in point (8) of Annex I;

  • E-Verify Program above means the employment verification program administered by the United States Department of Homeland Security, the Social Security Administration, or any successor program.

  • Security Plan means the Contractor’s security plan prepared pursuant to paragraph 3 of Schedule (Security Requirements & Plan)

  • Data Site means an electronic password protected data site maintained by the Borrower (or by the Collateral Manager on behalf of Borrower) at Xxxxxxx Corporation, Intralinks, SyndTrak Online or any other similar electronic distribution system reasonably acceptable to the Administrative Agent.

  • Data Log means a complete record of all Data Interchanged representing the Messages and their Associated Data between the parties;

  • Phone/Electronic Transaction Security Procedures means security procedures for Phone/ Electronic Transactions as provided in writing to the Underwriter.

  • international application means an application filed under this Treaty;

  • Master Account Approval List means the list of Attendee reservations and Dates which the Judicial Council has authorized the Contractor to xxxx associated sleeping room charges and tax against the Judicial Council’s Master Account.

  • Security freeze means a notice placed in a consumer's credit report, at the request of the consumer, that prohibits the credit rating agency from releasing the consumer's credit report or any information from it relating to an extension of credit or the opening of a new account, without the express authorization of the consumer;