Data Security Protocols definition

Data Security Protocols means the protocols which set out the data security standards and processes to be employed by Data Republic, as set out on the Data Republic Website, and may be amended by Data Republic from time to time.
Data Security Protocols means an electronic system with functionality and protocols designed and intended to prevent any unauthorized user, application, service, or device to access personal identifying information and other confidential data stored within that electronic system.

Examples of Data Security Protocols in a sentence

  • You agree to use software programs developed by third parties including but not limited to the generality of those mentioned above, browser software that supports Data Security Protocols compatible with protocols used by the Company.

  • You agree to use software programs developed by third parties including but not limited to the generality of those mentioned above, browser software that supports Data Security Protocols compatible with the protocols used by the Company.

  • The Client agrees to use software programs developed by third parties including but not limited to the generality of those mentioned above, browser software that supports Data Security Protocols compatible with protocols used by the Company.

  • The Client agrees and accepts to use software programs developed by third parties including but not limited to the generality of those mentioned above, browser software that supports Data Security Protocols compatible with protocols used by the Company.

  • The Client agrees to use software programs developed by third parties, browser software that supports Data Security Protocols compatible with protocols used by the Company.

  • The client agrees to use software programs developed by third parties including but not limited to the generality of those mentioned above, browser software that supports Data Security Protocols compatible with protocols used by the Company.

  • CMS will not release a sample file for a practice site until that practice site has (1) authorized the vendor on the PCF PECS web portal and (2) uploaded their executed BAA with their survey vendor to the PCF PECS team (see Section 3.4.6, Execute Business Associate Agreement With Survey Vendor in the “Primary Care First Practice Site Responsibilities” section and Section 3.3.5, Sign Business Associate Agreement and Adhere to Data Security Protocols, in the “Survey Vendor Responsibilities” section.

  • Business Associate Agreement with PracticeAll approved PCF PEC Survey vendors must become Business Associates of their client practices (see Section 3.3.5, Sign Business Associate Agreement and Adhere to Data Security Protocols).

  • Located in NYS aa) Licensed in NYS bb) Description of System Functionality cc) Data Security Protocols in Place dd) Network Requirements This RFI invites input and ideas on such services as well as rough cost estimates.

  • Proposal for inclusion of the Regulations for Management of Scientific Data and Information in the NPFC Data Sharing and Data Security Protocols.

Related to Data Security Protocols

  • Privacy/Data Security Laws means all laws governing the receipt, collection, use, storage, processing, sharing, security, disclosure, or transfer of Personal Information or the security of the Business Systems or Business Data.

  • Data Safeguards means the highest industry-standard safeguards (including administrative, physical, technical, and procedural safeguards) against the destruction, loss, misuse, unauthorized disclosure, or alteration of the JBE Data or Confidential Information, and such other related safeguards that are set forth in Applicable Laws, a Statement of Work, or pursuant to JBE policies or procedures.

  • Security Procedures means rules and regulations governing access to, and health and safety procedures while on, Government premises; and information technology security protocols;

  • Information Security Program means the administrative, technical, and physical safeguards that a licensee uses to access, collect, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle nonpublic information.

  • Computer Security Procedures means procedures for prevention of unauthorized computer access and use and administration of computer access and use as provided in writing to the Underwriter.

  • Data Security Requirements means, collectively, all of the following, to the extent relating to privacy or data security and applicable to the Company or to its conduct of the Business: (i) the Company’s own rules, policies, and procedures; (ii) all applicable laws; (iii) industry standards applicable to the industry in which the Company operates; and (iv) Contracts into which the Company has entered or by which it is otherwise bound.

  • Security procedure means a procedure employed for the purpose of verifying that an electronic signature, record, or performance is that of a specific person or for detecting changes or errors in the information in an electronic record. The term includes a procedure that requires the use of algorithms or other codes, identifying words or numbers, encryption, or callback or other acknowledgment procedures.

  • Data Security Breach means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, Personal Data transmitted, stored, or otherwise processed.

  • Database Management System (“DBMS”) is a computer process used to store, sort, manipulate and update the data required to provide Selective Routing and ALI.

  • Phone/Electronic Transaction Security Procedures means security procedures for Phone/ Electronic Transactions as provided in writing to the Underwriter.

  • Database Management System (DBMS) A system of manual procedures and computer programs used to create, store and update the data required to provide Selective Routing and/or Automatic Location Identification for 911 systems. Day: A calendar day unless otherwise specified. Dedicated Transport: UNE transmission path between one of CenturyLink’s Wire Centers or switches and another of CenturyLink’s Wire Centers or switches within the same LATA and State that are dedicated to a particular customer or carrier. Default: A Party’s violation of any material term or condition of the Agreement, or refusal or failure in any material respect to properly perform its obligations under this Agreement, including the failure to make any undisputed payment when due. A Party shall also be deemed in Default upon such Party’s insolvency or the initiation of bankruptcy or receivership proceedings by or against the Party or the failure to obtain or maintain any certification(s) or authorization(s) from the Commission which are necessary or appropriate for a Party to exchange traffic or order any service, facility or arrangement under this Agreement, or notice from the Party that it has ceased doing business in this State or receipt of publicly available information that signifies the Party is no longer doing business in this State.

  • Data set means an identifiable collection of data;

  • Phone/Electronic Transaction Security Procedures means security procedures for Phone/ Electronic Transactions as provided in writing to the Underwriter.

  • Protocol means, in respect of any category of object and associated rights to which this Convention applies, the Protocol in respect of that category of object and associated rights;

  • Technical safeguards means the technology and the policy and procedures for its use that 27 protect electronic PHI and control access to it.

  • HMG Security Policy Framework means the Cabinet Office Security Policy Framework (available from the Cabinet Office Security Policy Division) as updated from time to time.

  • Kyoto Protocol means the protocol to the UNFCCC adopted at the Third Conference of the Parties to the UNFCCC in Kyoto, Japan on 11 December 1997 as may be amended;

  • NIST Cybersecurity Framework means the U.S. Department of Commerce National Institute for Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity (Version 1.1).

  • Data Services The Customer will receive a discount equal to 25% for the following Data Services: Access: Standard VBS2 Guide local loop charges for DS-1 Access and DS-3 Access Service.

  • Security Policy Framework means the Cabinet Office Security Policy Framework (available from the Cabinet Office Security Policy Division);

  • Contractor information system means an information system belonging to, or operated by or for, the Contractor.

  • data user means a natural or legal person who has lawful access to certain personal or non-personal data and is authorised to use that data for commercial or non-commercial purposes;

  • Data Site means an electronic password protected data site maintained by the Borrower (or by the Collateral Manager on behalf of Borrower) at Xxxxxxx Corporation, Intralinks, SyndTrak Online or any other similar electronic distribution system reasonably acceptable to the Administrative Agent.

  • Customer information systems means any methods used to access, collect, store, use, transmit, protect, or dispose of customer in- formation.

  • Diagnostic clinical procedures manual means a collection of written procedures that describes each method (and other instructions and precautions) by which the licensee performs diagnostic clinical procedures; where each diagnostic clinical procedure has been approved by the authorized user and includes the radiopharmaceutical, dosage, and route of administration.

  • Data Log means a complete record of all Data Interchanged representing the Messages and their Associated Data between the parties;