Important Data definition

Important Data means non-public data or confidential information that is not state secret but would impact or endanger national interest or public interest of China or impact or endanger society as a whole in China if such non-public data or confidential information is leaked, lost, destroyed, or stolen, modified, access or otherwise illegally processed. The scope and definition of Important Data is subject to the Applicable Data Protection Laws.
Important Data means any data that is closely related to national security, economic development and public interest.
Important Data means (a) any data or information in any media that is closely related to national security, economic development, and social and public interests or (b) any data or information that constitutes important data or important information under any applicable law, Data Protection Obligation, or Contract under which any Group Company has a legal obligation, or any Party or Group Company’s or Group Company’s third party partner privacy policies.

Examples of Important Data in a sentence

  • Important: Data on the FSA-1007, Section I (Inspection Certificate - Farmers Stock Peanuts) must be identical to data on the SC-95 which is transmitted in the MP1 file (FSA-1007) to PMP-DC.

  • Last year's enrollment grid is included for your reference Important Data Entry Notice for questions 31 thru 43In order for your data to be saved, the numbers in each section must add up correctly.

  • The Reorganizing Debtors and Heber Debtors believe that their businesses and assets have significant value that would not be realized in a complete liquidation.

  • Blood Levels of Mercury Are Related to Diagnosis of Autism: A Reanalysis of an Important Data SetJournal of Child Neurology, Vol.

  • Hernández & James Gorman, On W.H.O. Trip, China Refused to Hand Over Important Data, N.Y. TIMES (last updated Jun.

  • This reporting requirement is in addition to the requirement to notify the individuals or organizations harmed by the incident within three working days (Article 11).Procurement requirements: Important Data processors shall give priority to the purchase of secure and trusted network products and services (Article 31).

  • Officials have put forward draft “Measures for Security Assessment of Cross-border Transfer of Personal Information and Important Data" and draft “Guidelines for Data Cross-Border Transfer Security Assessment." These regulations are based on the Communist Party’s vision--that data is a strategic resource that must be protected in the interest of national security and social stability (Hong: 2018).

  • Government agencies and CII operators (“CIIO”) would be subject to joint security review by CAC and the applicable departments under the State Council for the procurement of cloud computing services (Article 34).PI of more than one million individuals: Data processors that process PI of one million or more individuals would be treated as Important Data processors (Article 26), and therefore subject to stricter scrutiny and compliance requirements.

  • Data processors are required to report security incidents that involve Important Data or PI of more than 100,000 individuals within eight hours to the municipal cybersecurity administration and applicable regulatory authorities, and file investigation assessment reports with the same authorities within five working days after the incident has been handled.

  • Systems on which Important Data is processed shall, in principle, meet the security protection requirements of MLPS Level 3 or above and CII.


More Definitions of Important Data

Important Data means the data closely related to China's national security, economic development and public interests, and China's relevant national standards and guidelines for identification of important data shall apply mutatis mutandis to the specific scope of important data. Important Data does not form part of Customer Data; and (iii) "China Personal Information" means Personal Data and Customer Personal Data (as defined in the Data Processing Addendum) which is gathered and produced during Customer's operations within China.
Important Data means the kind of data, if divulged, may directly affect national security, economic security, social stability, public health and security, such as undisclosed government information, large-scale population, genetic health, geographic, mineral resources. Important data usually doesn’t include information related to the production and operation of enterprises, internal management information or personal information.
Important Data means data closely related to national security, economic development and societal and public interests. The specific scope of the important data shall be determined with reference to relevant national standards and guidelines on important data identification.
Important Data means data closely related to national security, economic development and

Related to Important Data

  • Important Notice When you sign your name to this Assignment Form without filling in the name of your "Assignee" or "Attorney", this Note becomes fully negotiable, similar to a check endorsed in blank. Therefore, to safeguard a signed Class A-1 Note, it is recommended that you fill in the name of the new owner in the "Assignee" blank. Alternatively, instead of using this Assignment Form, you may sign a separate "power of attorney" form and then mail the unsigned Class A-1 Note and the signed "power of attorney" in separate envelopes. For added protection, use certified or registered mail for a Class A-1 Note. CLASS A-2 NOTE UNLESS THIS CERTIFICATE IS PRESENTED BY AN AUTHORIZED REPRESENTATIVE OF THE DEPOSITORY TRUST COMPANY, A NEW YORK CORPORATION ("DTC"), TO THE TRUSTEE OR ITS AGENT FOR REGISTRATION OF TRANSFER, EXCHANGE OR PAYMENT, AND ANY CERTIFICATE ISSUED IS REGISTERED IN THE NAME OF CEDE & CO. OR SUCH OTHER NAME AS IS REQUESTED BY AN AUTHORIZED REPRESENTATIVE OF DTC (AND ANY PAYMENT IS MADE TO CEDE & CO. OR TO SUCH OTHER ENTITY AS IS REQUIRED BY AN AUTHORIZED REPRESENTATIVE OF DTC), ANY TRANSFER, PLEDGE OR OTHER USE HEREOF FOR VALUE OR OTHERWISE BY OR TO ANY PERSON IS WRONGFUL INASMUCH AS THE REGISTERED OWNER HEREOF, CEDE & CO., HAS AN INTEREST HEREIN. IKON RECEIVABLES, LLC

  • Important Note When completing your bid, do not attach any forms which may contain terms and conditions that conflict with those listed in the County’s bid documents(s). Inclusion of additional terms and conditions such as those which may be on your company’s standard forms shall result in your bid being declared non-responsive as these changes will be considered a counteroffer to the County’s bid. Delivery shall be not later than ten (10) calendar days After Receipt of Order (ARO) per Special Terms and Conditions. Inquiries regarding this Invitation for Bids may be directed to Xxxxx Xxxxxxxxx Xxxxxxxxx, Purchasing Agent, at Xxxxx.Xxxxxxxxx@xxxx.xxx BID RESPONSE FORM - CONTINUED THE FOLLOWING SECTION MUST BE COMPLETED BY ALL BIDDERS: Company Name: NOTE: COMPANY NAME MUST MATCH LEGAL NAME ASSIGNED TO TIN NUMBER. CURRENT W9 MUST BE SUBMITTED WITH BID. TIN#: D-U-N-S® # (Street No. or P.O. Box Number) (Street Name) (City) (County) (State) (Zip Code) Contact Person: Phone Number: Fax Number: Email Address: EMERGENCY CONTACT Emergency Contact Person: Telephone Number: Cell Phone Number: Residence Telephone Number: Email:

  • IMPORTANT means the feature is a high priority for the applicant(s). ‘Not Important’ means it is not of high priority to the applicant(s). ‘Don’t Want’ should be selected where the applicant(s) expressly do not want the feature.

  • Electronic and Information Resources Accessibility Standards means the accessibility standards for electronic and information resources contained in 1 Texas Administrative Code Chapter 213.

  • Biometric information means any information, regardless of how it is captured, converted, stored, or shared, based on an individual’s biometric identifier used to identify an individual. Biometric information does not include information derived from items or procedures excluded under the definition of biometric identifiers.

  • Vulnerability means a weakness of an asset or mitigation that can be exploited by one or more threats.

  • FILOT Act means Title 12, Chapter 44, of the Code, and all future acts successor or supplemental thereto or amendatory thereof.

  • USA PATRIOT Act means the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001.

  • Occupational Health and Safety Act means the Occupational Health and Safety Act, 1993 (Act No 85 of 1993);

  • Human trafficking means a scheme or plan to which all of the following apply:

  • Security Vulnerability means a flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in a security breach such that data is compromised, manipulated or stolen or the system damaged.

  • General Data Protection Regulation GDPR" means regulation (EU) 2016/679 of the European parliament and of the council as amended from time to time.

  • Electronic Protected Health Information means Protected Health Information that is maintained in or transmitted by electronic media.

  • Consumer Information Any personally identifiable information in any form (written electronic or otherwise) relating to a Mortgagor, including, but not limited to: a Mortgagor’s name, address, telephone number, Mortgage Loan number, Mortgage Loan payment history, delinquency status, insurance carrier or payment information, tax amount or payment information; the fact that the Mortgagor has a relationship with the Seller or Servicer or the originator of the related Mortgage Loan; and any other non-public personally identifiable information.

  • Disaster Management Act means the Disaster Management Act, 2002 (Act No.57 of 2002)

  • AML/KYC Procedures means the customer due diligence procedures of a Reporting Finnish Financial Institution pursuant to the anti-money laundering or similar requirements of Finland to which such Reporting Finnish Financial Institution is subject.

  • Sex trafficking means the recruitment, harboring, transportation, provision, or obtaining of a person for the purpose of a commercial sex act.

  • Technological safeguards means the technology and the policy and procedures for use of the technology to protect and control access to personal information.

  • Geographic information system or “GIS” means a system designed to capture, store, manipulate, analyze, manage, and present spatial or geographical data.

  • Contractor Commercially Sensitive Information means the information listed in the Contractor Commercial Sensitive Information Annex to the Contract being information notified by the Contractor to the Authority which is acknowledged by the Authority as being commercially sensitive information.

  • Drug Free Workplace Act Party will assure a drug-free workplace in accordance with 45 CFR Part 76. Lobbying: No federal funds under this agreement may be used to influence or attempt to influence an officer or employee of any agency, a member of Congress, an officer or employee of Congress, or an employee of a member of Congress in connection with the awarding of any federal contract, continuation, renewal, amendments other than federal appropriated funds.

  • Health information exchange or “HIE” shall mean the Common HIE Resources and infrastructure made available to Participants by CRISP for Permitted Purposes, as defined in Section 3.02 of the Terms and Conditions, subject to the terms of the Agreement. Common HIE Resources shall not include the technological infrastructure provided by the Direct Technology Provider for the Direct Service.

  • Technical safeguards means the technology and the policy and procedures for its use that 27 protect electronic PHI and control access to it.

  • Privacy Act means the Privacy Act 1988 (Cth).

  • Department of Information Technology means the New Mexico Department of Information Technology which is responsible for operating the data center and all communications related items.

  • Extreme Vetting means data mining, threat modeling, predictive risk analysis, or other similar services." Extreme Vetting does not include: