Security Processes definition

Security Processes the Contractor's security processes as prepared as part of their tender and included as a schedule (Security Requirements) to the contract;
Security Processes. The Contractor shall disclose its non-

Examples of Security Processes in a sentence

  • For an overview of the AWS Security Processes we recommend reviewing their whitepaper.We also encourage you to review the Securing Data at Rest with Encryption whitepaper for an overview of the methods for securing your data.If you have questions regarding any aspect of the whitepapers or the security of your environment, please contact a member of your Support team.

  • U.S. Office of Management and Budget, Suitability and Security Processes Review Report to the President, February 2014, p.

  • Making Strategy: An Introduction to National Security Processes and Problems.

  • Member Shaw motioned and Member Gabler seconded to recess for a closed session on Physical Security Processes.

  • EPS Physical Security Processes: Director Monsaas-Daly presented information about current district security and possible next steps to enhance a layered approach.

  • CLOSED SESSIONEPS Physical Security Processes: Closed session pursuant to Minnesota Statutes section 13D.05, subdivision 3(d), for the board to receive security briefings and reports; to discuss issues related to security systems; to discuss emergency response procedures; and to discuss recommendations regarding public services, infrastructure and facilities.

  • Contractor Divisional Security Processes for loading/unloading is permitted outside while at customer locations.

  • JPL IT Security Processes IT Network Architecture and System CategorizationAs of December 3, 2018, JPL’s IT network was comprised of 26,714 computer systems that includes 3,511 servers.14 Similar to NASA, JPL’s IT assets generally fall into two broad categories: institutional and mission.

  • The HARTMANN information security principles are laid down in the effective Information Security Policy and the associated Information Security Processes.

  • Snow, Making Strategy: An In- troduction to National Security Processes and Problems (Maxwell AFB, AL: Air University Press, 1988).

Related to Security Processes

  • Security Procedures means rules and regulations governing access to, and health and safety procedures while on, Government premises; and information technology security protocols;

  • Security procedure means a procedure employed for the purpose of verifying that an electronic signature, record, or performance is that of a specific person or for detecting changes or errors in the information in an electronic record. The term includes a procedure that requires the use of algorithms or other codes, identifying words or numbers, encryption, or callback or other acknowledgment procedures.

  • Security Property means all right, title and interest in, to and under any Security Document, including:

  • Computer Security Procedures means procedures for prevention of unauthorized computer access and use and administration of computer access and use as provided in writing to the Underwriter.

  • Security Provider means you and/or any other person or entity furnishing security for any Credit Facilities and/or any party to any security document.

  • Information Security Program means the administrative, technical, and physical safeguards that a licensee uses to access, collect, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle nonpublic information.

  • Security alarm system means a device or series of devices, intended to summon law enforcement personnel during, or as a result of, an alarm condition. Devices may include hard- wired systems and systems interconnected with a radio frequency method such as cellular or private radio signals that emit or transmit a remote or local audible, visual, or electronic signal; motion detectors, pressure switches, duress alarms (a silent system signal generated by the entry of a designated code into the arming station to indicate that the user is disarming under duress); panic alarms (an audible system signal to indicate an emergency situation); and hold-up alarms (a silent system signal to indicate that a robbery is in progress).

  • Procurement Process means the process commenced by the issuing of this Invitation and concluding upon the award of a contract (or other outcome as determined by Tetra Tech International Development) or upon the earlier termination of the process

  • Account Application or “Application” shall mean the application, as may be amended from time to time, by which this Agreement is established between the Depositor (or following the death of the Depositor, the Beneficiary) and the Custodian. The statements contained therein shall be incorporated into this Agreement.

  • Commercial applicator means any person, unless exempted in I(4) hereunder, whether or not the person is a private applicator with respect to some uses, who:

  • Technical safeguards means the technology and the policy and procedures for its use that 27 protect electronic PHI and control access to it.

  • Processes means, with respect to a loan, any of a series of acts or functions,

  • Security Codes are the credentials (such as codes and passwords) that are associated with you and used by us to verify the authenticity of Communications from you. Security Codes are used to access Accounts and to use the Services. The Security Codes include any supplemental or alternative method used to verify the authenticity of Communications that may be offered or presented to you by us from time to time. • “Service(s)” and “Online Banking” are the online banking interface and the banking services described in this Agreement.

  • Client Application means an application developed by Licensee that a) utilizes the Runtime Product, b) is installed fully on an end user’s machine, with all report processing local to that machine, and c) adds significant and primary functionality to the Runtime Product.

  • Control apparatus means any device which prevents or controls the emission of any air contaminant directly or indirectly into the outdoor atmosphere.

  • Marijuana processor means a person who processes marijuana items in this state.

  • Procurement item means an item of personal property, a technology, a service, or a construction project.

  • ISM Code Documentation includes, in respect of a Ship:

  • Centralized prescription processing means the processing by a pharmacy of a request from another pharmacy to fill or refill a prescription drug order or to perform processing functions such as dispensing, drug utilization review, claims adjudication, refill authorizations, and therapeutic interventions.

  • Administrative Safeguards are administrative actions, and policies and procedures, to manage the selection, development, implementation, and maintenance of security measures to protect electronic PHI and to manage the conduct of Contractor’s workforce in relation to the protection of that information.

  • Practical application means to manufacture in the case of a composition or product, to practice in the case of a process or method, or to operate in the case of a machine or system; and, in each case, under such conditions as to establish that the invention is being utilized and that its benefits are, to the extent permitted by law or government regulations, available to the public on reasonable terms.

  • Data Processing Equipment means any equipment, computer hardware, or computer software (and the lease or licensing agreements related thereto) other than Personal Computers, owned or leased by the Failed Bank at Bank Closing, which is, was, or could have been used by the Failed Bank in connection with data processing activities.

  • Dosimetry processor means an individual or an organization that processes and evaluates individual monitoring devices in order to determine the radiation dose delivered to the monitoring devices.

  • technical and organisational security measures means those measures aimed at protecting personal data against accidental or unlawful destruction or accidental loss, alteration, unauthorised disclosure or access, in particular where the processing involves the transmission of data over a network, and against all other unlawful forms of processing.

  • Security Vulnerability means a flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in a security breach such that data is compromised, manipulated or stolen or the system damaged.

  • Lockbox Processor means Regulus Group II LLC, or its successors or assigns.