Security Practices Datasheet definition

Security Practices Datasheet means Slack’s Security Practices Datasheet, as updated from time to time, and currently accessible at https://slack.com/security-practices.
Security Practices Datasheet means Red Guava’s Security Practices Datasheet, as updated from time to time, and currently available at xxxxx://xxxxxxx.xxx/security.
Security Practices Datasheet means Productive’s Security Practices Datasheet, as updated from time to time, and currently accessible at https://www.productive.io/security/.

Examples of Security Practices Datasheet in a sentence

  • Upon Customer’s request, and subject to the confidentiality obligations set forth in the Agreement, Red Guava shall make available to Customer (or Customer’s independent, third-party auditor) information regarding the Red Guava’s compliance with the obligations set forth in this DPA in the form of the third-party certifications and audits set forth in the Security Practices Datasheet.

  • Red Guava has access to the third-party certifications and audits set forth in the Security Practices Datasheet.

  • AND ORGANISATIONAL MEASURES TO ENSURE THE SECURITY OF THE DATA See the Security Practices Datasheet.

  • Red Guava shall maintain appropriate technical and organisational measures for protection of the security (including protection against unauthorised or unlawful Processing and against accidental or unlawful destruction, loss or alteration or damage, unauthorised disclosure of, or access to, Customer Data), confidentiality and integrity of Customer Data, as set forth in the Security Practices Datasheet.

  • Productive shall maintain appropriate technical and organizational measures for protection of the security (including protection against unauthorized or unlawful Processing and against accidental or unlawful destruction, loss or alteration or damage, unauthorized disclosure of, or access to, Personal Data), confidentiality and integrity of Personal Data, as set forth in the Security Practices Datasheet.

  • Upon Customer’s request, and subject to the confidentiality obligations set forth in the Customer Terms of Service, Productive shall make available to Customer (or Customer’s independent, third-party auditor) information regarding the Productive Group’s compliance with the obligations set forth in this DPA in the form of the security policies set forth in the Security Practices Datasheet.

  • Productive will maintain administrative, physical, and technical safeguards for protection of the security, confidentiality and integrity of Personal Data uploaded to the Services, as described in the Security Practices Datasheet applicable to the specific Services purchased by data exporter, and currently accessible here, or otherwise made reasonably available by data importer.

  • Massive Bionics LLC has access to the third-party certifications and audits set forth in the Security Practices Datasheet.

  • Upon Customer’s request, and subject to the confidentiality obligations set forth in the Agreement, Massive Bionics LLC shall make available to Customer (or Customer’s independent, third-party auditor) information regarding the Massive Bionics LLC ’s compliance with the obligations set forth in this DPA in the form of the third-party certifications and audits set forth in the Security Practices Datasheet.

  • Technolarity shall maintain appropriate technical and organizational measures for protection of the security (including protection against unauthorized or unlawful Processing and against accidental or unlawful destruction, loss or alteration or damage, unauthorized disclosure of, or access to, Personal Data), confidentiality and integrity of Personal Data, as set forth in the Security Practices Datasheet.


More Definitions of Security Practices Datasheet

Security Practices Datasheet means Slack’s Security Practices Datasheet, as updated from time to
Security Practices Datasheet means Massive Bionics LLC ’s Security Practices Datasheet, as updated from time to time, and currently available at xxxxx://XxxxXxxxx.xxx/security.
Security Practices Datasheet means Annotate’s Security Practices, as updated from time to time, a copy of which shall be made available on reasonable written request.
Security Practices Datasheet means Technolarity Security Practices Datasheet, as updated from time to time, and currently available at xxxxx://xxxxxxxx.xxx/legal/security.pdf
Security Practices Datasheet means Productive’s Security Practices Datasheet, as updated from time to time, and currently accessible at xxxxx://xxx.xxxxxxxxxx.xx/security/.
Security Practices Datasheet means Airtable’s Security Practices Datasheet, as updated from time to time, and currently accessible at xxxxx://xxxxxxxx.xxx/security.

Related to Security Practices Datasheet

  • Security Procedures means rules and regulations governing access to, and health and safety procedures while on, Government premises; and information technology security protocols;

  • Prudent Utility Practices means those practices, methods, techniques and standards, that are generally accepted for use in electric utility industries taking into account conditions in India, and commonly used in prudent electric utility engineering and operations to design, engineer, construct, test, operate and maintain equipment lawfully, safely, efficiently and economically as applicable to power stations of the size, service and type of the Project, and that generally conform to the manufacturers' operation and maintenance guidelines.

  • New Jersey Stormwater Best Management Practices (BMP) Manual or “BMP Manual” means the manual maintained by the Department providing, in part, design specifications, removal rates, calculation methods, and soil testing procedures approved by the Department as being capable of contributing to the achievement of the stormwater management standards specified in this chapter. The BMP Manual is periodically amended by the Department as necessary to provide design specifications on additional best management practices and new information on already included practices reflecting the best available current information regarding the particular practice and the Department’s determination as to the ability of that best management practice to contribute to compliance with the standards contained in this chapter. Alternative stormwater management measures, removal rates, or calculation methods may be utilized, subject to any limitations specified in this chapter, provided the design engineer demonstrates to the municipality, in accordance with Section IV.F. of this ordinance and N.J.A.C. 7:8-5.2(g), that the proposed measure and its design will contribute to achievement of the design and performance standards established by this chapter.

  • Good Utility Practices mean any of the practices, methods or acts engaged in or approved by a significant portion of the electric energy industry with respect to similar facilities during the relevant time period which in each case, in the exercise of reasonable judgment in light of the facts known or that should have been known at the time a decision was made, could have been expected to accomplish the desired result at reasonable cost consistent with good business practices, reliability, safety, law, regulation, environmental protection and expedition. Good Utility Practices are not intended to be limited to the optimum practices, methods or acts to the exclusion of all others, but rather to delineate the acceptable practices, methods or acts generally accepted in such industry.

  • Best Management Practices (BMPs means schedules of activities, prohibitions of practices, maintenance procedures, and other management practices to prevent or reduce the pollution of waters of the state. BMPs also include treatment requirements, operating procedures, and practices to control site runoff, spillage or leaks, sludge or waste disposal, or drainage from raw material storage.

  • Community practice protocol means a written, executed agreement entered into voluntarily between an authorized pharmacist and a physician establishing drug therapy management for one or more of the pharmacist’s and physician’s patients residing in a community setting. A community practice protocol shall comply with the requirements of subrule 8.34(2).

  • PJM Regional Practices Document means the document of that title that compiles and describes the practices in the PJM Markets and that is made available in hard copy and on the Internet. PJM Region Installed Reserve Margin:

  • Information Security Program means the administrative, technical, and physical safeguards that a licensee uses to access, collect, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle nonpublic information.

  • Security Policy Framework means the Cabinet Office Security Policy Framework (available from the Cabinet Office Security Policy Division);

  • Servicer Policies and Practices means, with respect to the Servicer’s duties under Exhibit A to the Servicing Agreement, the policies and practices of the Servicer applicable to such duties that the Servicer follows with respect to comparable assets that it services for itself and, if applicable, others.

  • Prudent Utility Practice means any of the practices, methods and acts engaged in or approved by a significant portion of the electric utility industry during the relevant time period, or any of the practices, methods, and acts which, in the exercise of reasonable judgment in light of the facts known at the time the decision was made, could have been expected to accomplish the desired result at a reasonable cost consistent with good business practices, reliability, safety, and expedition. Prudent Utility Practice is not intended to be limited to the optimum practice, method, or act to the exclusion of all others, but rather to be acceptable practices, methods, or acts, generally accepted in the region.

  • Technical safeguards means the technology and the policy and procedures for its use that 27 protect electronic PHI and control access to it.

  • standards of generally recognised accounting practice means an accounting practice complying with standards applicable to municipalities or municipal entities as determined by the Accounting Standards Board

  • Security procedure means a procedure employed for the purpose of verifying that an electronic signature, record, or performance is that of a specific person or for detecting changes or errors in the information in an electronic record. The term includes a procedure that requires the use of algorithms or other codes, identifying words or numbers, encryption, or callback or other acknowledgment procedures.

  • Policies and Procedures means the written policies and procedures of the Client in any way related to the Services, including any such policies and procedures contained in the Organic Documents and the Offering Documents.

  • Phone/Electronic Transaction Security Procedures means security procedures for Phone/ Electronic Transactions as provided in writing to the Underwriter.

  • Phone/Electronic Transaction Security Procedures means security procedures for Phone/ Electronic Transactions as provided in writing to the Underwriter.

  • ISM Code Documentation includes, in respect of a Ship:

  • Security Policy means the Authority’s Security Policy annexed to Schedule (Security Requirements and Plan) as updated from time to time.

  • Data Safeguards means the highest industry-standard safeguards (including administrative, physical, technical, and procedural safeguards) against the destruction, loss, misuse, unauthorized disclosure, or alteration of the JBE Data or Confidential Information, and such other related safeguards that are set forth in Applicable Laws, a Statement of Work, or pursuant to JBE policies or procedures.

  • Standards of Practice means the care, skill, and

  • Safety Standards means all laws, union rules and trade or industry custom or codes of any kind whatsoever, in effect from the date of this Agreement through Final Acceptance of the construction work, pertaining to worker safety and accident prevention applicable to the Project and/or the construction work (including, but not limited to, rules, regulations and standards adopted pursuant to the Occupational Safety and Health Act of 1970, as amended from time to time).

  • Operating Manual means the document that contains the procedures and forms for the operation of bungee jumping equipment and activity at a site.

  • Safety Management System has the meaning given to it in the ISM Code.

  • HMG Security Policy Framework means the Cabinet Office Security Policy Framework (available from the Cabinet Office Security Policy Division) as updated from time to time.

  • UK generally accepted accounting principles and practices means the principles and practices prevailing from time to time in the United Kingdom which are generally regarded as permissible or legitimate by the accountancy profession irrespective of the degree of use.