Privacy and Security Program definition

Privacy and Security Program has the meaning set forth in Section 9.1.

Examples of Privacy and Security Program in a sentence

  • Contractor will develop and maintain a written Privacy and Security Program that includes administrative, technical and physical safeguards appropriate to the size and complexity of the Contractor’s operations and the nature and scope of its activities.

  • We estimated the current transfer length of the cable by recording I-V curved with 1 cm intervals from the current leads.

  • The Data Protection Officer will serve as the main point of contact for the School’s Data Privacy and Security Program.

  • No less than annually, Provider shall conduct a comprehensive audit of its Privacy and Security Program and provide such audit findings to the City.

  • If the parent or adult student refuses to consent to the re-evaluation, the district may, but is not required to, pursue the re-evaluation by using the dispute resolution procedures provided in the procedural safeguards, including mediation or due process procedures.

  • DHS Privacy and Security Program Structure DHS Chief Compliance Officer DEPARTMENTAL INFORMATION SECURITY OFFICER (DISO) YOU employees, contract staff, affiliates, volunteers, trainees, students others DHS PRIVACY OFFICER FACILITY INFORMATION SECURITY COORDINATOR (FISC) FACILITY PRIVACY COORDINATOR As a member of DHS’ workforce, you may be in contact with patient information and other confidential or sensitive information, records and data in your everyday duties and responsibilities.

  • The Privacy and Security Compliance Officer, Tenet Facility Information Security Officer and Tenet Facility Compliance Committee are responsible for distribution and oversight of Information Privacy and Security Program Standards at the facility level.

  • SCSD will utilize the National Institute of Standards and Technology’s Cybersecurity Framework v1.1 (NIST CSF or Framework) as the standard for its Data Privacy and Security Program.

  • Complete an arrest report as instructed in Section 14.1.2.A if the subject arrested as a result of a bench warrant is turned over to the post or unit holding the warrant.

  • For the term of this Agreement, the Administrator shall, and shall cause its Affiliates, to maintain and adhere to the Privacy and Security Program.

Related to Privacy and Security Program

  • Privacy and Security Laws means applicable Laws that govern the Processing, privacy or security of Personal Information.

  • Privacy and Security Requirements means (a) all Privacy Laws; (b) all applicable Privacy Contracts, and (c) all applicable Privacy Policies.

  • Information Privacy and Security Laws means applicable Laws and legal requirements (and binding industry standards) concerning the use, ownership, maintenance, storage, collection, transfer, processing, controlling, privacy and/or security of Personal Information.

  • Privacy/Data Security Laws means all laws governing the receipt, collection, use, storage, processing, sharing, security, disclosure, or transfer of Personal Information or the security of the Business Systems or Business Data.

  • Information Security Program means the administrative, technical, and physical safeguards that a licensee uses to access, collect, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle nonpublic information.

  • Privacy Shield means the European Union (EU) -U.S. and Switzerland – U.S. Privacy Shield frameworks.

  • Contractor information system means an information system belonging to, or operated by or for, the Contractor.

  • Data Security Requirements means, collectively, all of the following, to the extent relating to privacy or data security and applicable to the Company or to its conduct of the Business: (i) the Company’s own rules, policies, and procedures; (ii) all applicable laws; (iii) industry standards applicable to the industry in which the Company operates; and (iv) Contracts into which the Company has entered or by which it is otherwise bound.

  • Customer information systems means any methods used to access, collect, store, use, transmit, protect, or dispose of customer in- formation.

  • Covered contractor information system means an information system that is owned or operated by a contractor that processes, stores, or transmits Federal contract information.

  • Privacy Standards means the standards of the privacy of individually identifiable health information, as pursuant to HIPAA.

  • Data Safeguards means the highest industry-standard safeguards (including administrative, physical, technical, and procedural safeguards) against the destruction, loss, misuse, unauthorized disclosure, or alteration of the JBE Data or Confidential Information, and such other related safeguards that are set forth in Applicable Laws, a Statement of Work, or pursuant to JBE policies or procedures.

  • data user means a natural or legal person who has lawful access to certain personal or non-personal data and is authorised to use that data for commercial or non-commercial purposes;

  • Database Management System (“DBMS”) is a computer process used to store, sort, manipulate and update the data required to provide Selective Routing and ALI.

  • Database Management System (DBMS) A system of manual procedures and computer programs used to create, store and update the data required to provide Selective Routing and/or Automatic Location Identification for 911 systems. Day: A calendar day unless otherwise specified. Dedicated Transport: UNE transmission path between one of CenturyLink’s Wire Centers or switches and another of CenturyLink’s Wire Centers or switches within the same LATA and State that are dedicated to a particular customer or carrier. Default: A Party’s violation of any material term or condition of the Agreement, or refusal or failure in any material respect to properly perform its obligations under this Agreement, including the failure to make any undisputed payment when due. A Party shall also be deemed in Default upon such Party’s insolvency or the initiation of bankruptcy or receivership proceedings by or against the Party or the failure to obtain or maintain any certification(s) or authorization(s) from the Commission which are necessary or appropriate for a Party to exchange traffic or order any service, facility or arrangement under this Agreement, or notice from the Party that it has ceased doing business in this State or receipt of publicly available information that signifies the Party is no longer doing business in this State.

  • HMG Security Policy Framework means the Cabinet Office Security Policy Framework (available from the Cabinet Office Security Policy Division) as updated from time to time.

  • Account Information Service Provider means a payment service provider pursuing business activities as referred to in point (8) of Annex I;

  • Customer User means an employee of Customer, a Customer Affiliate or Business Partner.

  • Security Policy Framework means the Cabinet Office Security Policy Framework (available from the Cabinet Office Security Policy Division);

  • Privacy Requirements means all applicable Privacy Laws and all of the Acquired Companies’ policies, notices, and contractual obligations relating to the receipt, collection, compilation, use, storage, processing, sharing, safeguarding, security (technical, physical and administrative), disposal, destruction, disclosure, or transfer (including cross-border) of Personal Information.

  • account information service means an online service to provide consolidated information on one or more payment accounts held by the payment service user with either another payment service provider or with more than one payment service provider;

  • Customer Account Information means personally identifiable information including Personal Data and Consumption Data. Customer Account Information also includes information received by the Company from the customer for purposes of participating in regulated utility programs, including, but not limited to bill pay assistance, shutoff protection, renewable energy, demand-side management, load management, or energy efficiency.

  • Central Contractor Registration (CCR) database means the primary Government repository for Contractor information required for the conduct of business with the Government.

  • Security Standards means the final rule implementing HIPAA’s Security Standards for the Protection of Electronic PHI, as amended.

  • Relevant Information means the information in the report on assessment of the Trustee’s compliance with the servicing criteria set forth in Item 1122(d) of Reg AB (the “Servicing Assessment”), the registered public accounting firm’s attestation provided in accordance with Rules 13a-18 and 15d-18 under the Exchange Act and Section 1122(b) of Reg AB ( the “Attestation Report”) applicable to the Trustee and the Monthly Statements (excluding information provided, or based on information provided, by the Servicer or any servicer) and those items in Exhibit S attached to the Pooling and Servicing Agreement which indicate the 4.03 statement or the Trustee as the responsible party during the Relevant Year. Based on my knowledge, the Relevant Information, taken as a whole, does not contain any untrue statement of a material fact or omit to state a material fact necessary to make the statements made, in light of the circumstances under which such statements were made, not misleading with respect to the period covered by this annual report; and

  • Security Procedures means rules and regulations governing access to, and health and safety procedures while on, Government premises; and information technology security protocols;