Privacy and Cybersecurity Requirements definition

Privacy and Cybersecurity Requirements has the meaning specified in Section 4.22(a).

Examples of Privacy and Cybersecurity Requirements in a sentence

  • There are not, and have not been in the past three (3) years, any Actions by any Person, or any investigations by any Governmental Authority, pending to which the Company or any of the Company’s Subsidiaries is a named party or, to the knowledge of the Company, threatened in writing against the Company or its Subsidiaries alleging a violation of any Privacy and Cybersecurity Requirements.

  • There are not, and have not been, any Legal Proceedings by any Person, or any investigations by any Governmental Authority, pending or, to the knowledge of the Company, threatened against the Company or its Subsidiaries alleging a violation of any Privacy and Cybersecurity Requirements.

  • During the past three (3) years, neither the Company nor its Subsidiary has received any written notice from any Person (including any Governmental Authority) relating to an alleged violation of Privacy and Cybersecurity Requirements.

  • There are not, and have not been in the past three (3) years been, any Actions by any Person or Governmental Authority pending to which the Company or any of the Company’s Subsidiaries is a named party or, to the knowledge of the Company, threatened in writing against the Company or its Subsidiaries, alleging a violation of any Privacy and Cybersecurity Requirements or relating to any material incident in which Personal Data was stolen or improperly Processed.

  • The Company and its subsidiaries have made all notices and disclosures required by Privacy and Cybersecurity Requirements, and no such notices or disclosures have been inaccurate, misleading, deceptive, or in violation of any applicable Privacy and Cybersecurity Requirement, except where the failure to do so would not reasonably be expected to have a Material Adverse Effect.

  • There are not, and have not been in the past three (3) years, any Actions by any Person, or any investigations by any Governmental Authority, pending to which the Company or its Subsidiary is a named party or, to the knowledge of the Company, threatened in writing against the Company or its Subsidiary alleging a violation of any Privacy and Cybersecurity Requirements.

  • The Company and its Subsidiaries have obtained written agreements from all Third Party Service Providers that satisfy the requirements of the Privacy and Cybersecurity Requirements and to the Knowledge of the Company, no such Third Party Service Provider is in material breach of any such agreement.

  • There are not, and have not been, any Actions by any Person, or any investigations by any Governmental Authority, pending or, to the knowledge of the Company, threatened against the Company or its Subsidiaries alleging a violation of any Privacy and Cybersecurity Requirements.

  • There are not, and have not been in the three (3) years prior to the date hereof, any Actions by any Person pending to which the Company or the Brazilian Subsidiary or, solely to the extent primarily involving, or materially and adversely affecting, the XXX Xxxxxxxx, Xxxxxxx or any of its other Subsidiaries is a named party or, to the Knowledge of Embraer, threatened in writing against the UAM Business alleging a violation of any Privacy and Cybersecurity Requirements.

  • There are not, and have not been in the past three (3) years been, any Actions by any Person, or any investigations by any Governmental Authority, pending to which the Company or any of the Company’s Subsidiaries is a named party or, to the knowledge of the Company, threatened in writing against the Company or its Subsidiaries alleging a violation of any Privacy and Cybersecurity Requirements.

Related to Privacy and Cybersecurity Requirements

  • Privacy and Security Requirements means (a) all Privacy Laws; (b) all applicable Privacy Contracts, and (c) all applicable Privacy Policies.

  • Privacy Requirements means all applicable Privacy Laws and all of the Acquired Companies’ policies, notices, and contractual obligations relating to the receipt, collection, compilation, use, storage, processing, sharing, safeguarding, security (technical, physical and administrative), disposal, destruction, disclosure, or transfer (including cross-border) of Personal Information.

  • Data Security Requirements means, collectively, all of the following to the extent relating to Data Treatment or otherwise relating to privacy, security or security breach notification requirements and applicable to Seller, any IT Systems or any Personal Information: (i) Seller’s own rules, policies, and procedures; (ii) all Laws applicable to Seller; (iii) industry standards applicable to the industry in which Seller operates; and (iv) Contracts to which Seller is a party or otherwise subject.

  • Security Requirements means the requirements regarding the security of Personal Data, as set out in the Data Protection Laws (including, in particular, the seventh data protection principle of the DPA and/ or the measures set out in Article 32(1) of the GDPR (taking due account of the matters described in Article 32(2) of the GDPR)) as applicable;

  • Safety Requirements means Prudent Electrical Practices, CPUC General Order No. 167, Contractor Safety Program Requirements, and all applicable requirements of Law, PG&E, the Utility Distribution Company, the Transmission Provider, Governmental Approvals, the CAISO, CARB, NERC and WECC.

  • Security Requirement means the amount in Dollars (as certified by the Agent whose certificate shall, in the absence of manifest error, be conclusive and binding on the Borrowers and the Creditors) which is, at any relevant time:

  • Privacy Shield means the European Union (EU) -U.S. and Switzerland – U.S. Privacy Shield frameworks.

  • Privacy Standards means the standards of the privacy of individually identifiable health information, as pursuant to HIPAA.

  • Privacy and Security Laws means any and all international, local, country-specific, or U.S. State or Federal laws, regulations, directives, standards, guidelines, policies, or procedures, as amended, applicable to Supplier pertaining to the security, confidentiality, or privacy of Buyer Data.

  • Data Protection Requirements means all applicable (i) Data Protection Laws; (ii) Seller Privacy Policies; (iii) terms of any Contracts relating to the collection, use, storage, disclosure, or cross-border transfer of Personal Data; and (iv) the Payment Card Industry Data Security Standards.

  • Privacy/Data Security Laws means all laws governing the receipt, collection, use, storage, processing, sharing, security, disclosure, or transfer of Personal Information or the security of the Business Systems or Business Data.

  • Environmental and Safety Requirements means all federal, state, local and foreign statutes, regulations, ordinances, codes and other provisions having the force and effect of law, all judicial and administrative orders and determinations, all contractual obligations and all common law concerning public health and safety, worker health and safety, and pollution or protection of the environment, including all those relating to the presence, use, production, generation, handling, transportation, treatment, storage, disposal, distribution, labeling, testing, processing, discharge, release, threatened release, control or cleanup of, or exposure to, any hazardous materials, substances or wastes, chemical substances or mixtures, pesticides, pollutants, contaminants, toxic chemicals, petroleum products or byproducts, asbestos, polychlorinated biphenyls, noise or radiation, as previously, now or hereafter in effect.

  • Accessibility Standards means accessibility standards and specifications for Texas agency and institution of higher education websites and EIR set forth in 1 TAC Chapter 206 and/or Chapter 213.

  • Environmental, Health, and Safety Requirements means all federal, state, local and foreign statutes, regulations, and ordinances concerning public health and safety, worker health and safety, and pollution or protection of the environment, including without limitation all those relating to the presence, use, production, generation, handling, transportation, treatment, storage, disposal, distribution, labeling, testing, processing, discharge, release, threatened release, control, or cleanup of any hazardous materials, substances or wastes, as such requirements are enacted and in effect on or prior to the Closing Date.

  • Security Standards means the final rule implementing HIPAA’s Security Standards for the Protection of Electronic PHI, as amended.

  • Information Privacy and Security Laws means all applicable laws concerning the privacy, data protection, transfer, or security of Personal Confidential Information, including, to the extent applicable, the General Data Protection Regulation (EU), other state, and federal, data security laws, data breach notification laws, and consumer protection laws.

  • Web Site Accessibility Standards/Specifications means standards contained in Title 1 Texas Administrative Code Chapter 206.

  • Privacy Act means the Privacy Act 1988 (Cth).

  • Data Safeguards means the highest industry-standard safeguards (including administrative, physical, technical, and procedural safeguards) against the destruction, loss, misuse, unauthorized disclosure, or alteration of the JBE Data or Confidential Information, and such other related safeguards that are set forth in Applicable Laws, a Statement of Work, or pursuant to JBE policies or procedures.

  • Safety Standards means all laws, union rules and trade or industry custom or codes of any kind whatsoever, in effect from the date of this Agreement through Final Acceptance of the construction work, pertaining to worker safety and accident prevention applicable to the Project and/or the construction work (including, but not limited to, rules, regulations and standards adopted pursuant to the Occupational Safety and Health Act of 1970, as amended from time to time).

  • Customer information systems means any methods used to access, collect, store, use, transmit, protect, or dispose of customer in- formation.

  • Cybersecurity means the measures taken to protect a computer, computer network, or computer system against unauthorized use or access.

  • Resource Adequacy Requirements has the meaning set forth in Section 3.3.