Transfer Format Clause Examples

The Transfer Format clause defines the specific manner or medium in which information, data, or materials must be delivered from one party to another under the agreement. Typically, this clause outlines acceptable file types, data structures, or physical formats, such as requiring digital files in PDF or CSV format, or specifying that physical goods be packaged in a certain way. Its core practical function is to ensure compatibility and usability of transferred items, preventing misunderstandings or disputes about how deliverables should be provided.
Transfer Format. Transfers may include, but are not limited to, conversion of all Data into or from an industry standard format or providing application programmable interface. Data must be encrypted at all times unless specifically outlined otherwise in the Authorized User Agreement. At a minimum, encryption must be carried out at the most current NYS Encryption Standard (NYS-S14-007), (or successor policy with key access restricted to the Authorized User only, unless with the express written permission of the Authorized User. All Data in transit must be handled in accordance with ITS Policy NYS-S14-007 (or successor) or the National Institute of Standards and Technology (NIST) Federal Institute Processing Standard (FIPS)-140-2 or Transport Layer Security (TLS) 1, or TLS2 (or successor). The Authorized User Agreement shall specify the respective responsibilities of the Authorized User and the Contractor for the encryption of Data.
Transfer Format. Transfers may include, but are not limited to, conversion of all Data into or from an industry standard format or providing application programmable interface. Data must be encrypted at all times unless specifically outlined otherwise in the Authorized User Agreement. The RFQ must specify whether encryption is to be done by the Contractor or by the Authorized User. At a minimum, encryption must be carried out in accordance with the most current NIST FIPS-140 standard, with key access restricted to the Authorized User only, unless with the express written permission of the Authorized User. For Authorized Users subject to NYS security policies/standards (see Section 1.2), encryption must be handled in accordance with NYS-S14-007 (or successor) Encryption Standard. The Authorized User Agreement shall specify the respective responsibilities of the Authorized User and the Contractor for the encryption of Data.
Transfer Format. Transfers may include, but are not limited to, conversion of all Data into or from an industry standard format or providing application programmable interface. Data must be encrypted at all times unless specifically outlined otherwise in the Authorized User Agreement. At a minimum, encryption must be carried out at the most current NYS Encryption Standard (NYS-S14-007), (or successor policy with key access restricted to the Authorized User only, unless with the express written permission of the Authorized User. All Data in transit must be handled in accordance with ITS Policy NYS-S14-007 (or successor) or the National Institute of Standards and Technology (NIST) Federal Institute Processing Standard (FIPS)-140-2 or Transport Layer Security (TLS) 1, or TLS2 (or successor). The Authorized User Agreement shall specify the respective responsibilities of the Authorized User and the Contractor for the encryption of Data. Unless prohibited by law, Contractor shall notify the Authorized User in Writing within 24 hours of any request for Data (including requestor, nature of Data requested and timeframe of response) by a person or entity other than the Authorized User, and the Contractor shall secure Written acknowledgement of such notification from the Authorized User before responding to the request for Data. Unless compelled by law, the Contractor shall not release Data without the Authorized User’s prior Written approval. If requested by an Authorized User as part the Request for Quote process, Contractor shall complete a Consensus Assessment Initiative Questionnaire (CAIQ) including on an annual basis thereafter, if requested by the Authorized User. The CAIQ is available at Cloud Security Alliance (▇▇▇▇▇://▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇/). The CAIQ may be used to assist the Authorized User in building the necessary assessment processes when engaging with Contractors. In addition to a request for a CAIQ, Contractor shall cooperate with all reasonable Authorized User requests for a Written description of Contractor’s physical/virtual security and/or internal control processes. The Authorized User shall have the right to reject any Contractor’s RFQ response or terminate an Authorized User Agreement when such a request has been denied. For example, Federal, State and local regulations and/or laws may require that Contractors operate within the Authorized User’s regulatory environment. In order to ensure that security is adequate and free of gaps in control coverage, the...
Transfer Format. Transfer may include, but are not limited to, conversion of all User Data into or from an industry standard format or providing application programmable interface.
Transfer Format. Any and all technical documentation (including but not limited to process descriptions, specifications, or analytical methods) relevant to the technology transfer shall be made available by Hanmi, at any time during the Transfer Period. The documents and data shall be transferred in searchable electronic format when available, or otherwise in written form, in English language. It is anticipated that most study reports, and regulatory communications and submissions will be transferred in PDF or DOC format. Regulatory documents that are typically updated on a regular basis will be transferred in the Word version of their most recent edition.
Transfer Format. Transfers may include, but are not limited to, conversion of all Data into or from an industry standard format or providing application programmable interface. Data must be encrypted at all times unless specifically outlined otherwise in the Authorized User Agreement. The RFQ must specify whether encryption is to be done by the Contractor or by the Authorized User. At a minimum, encryption must be carried out in accordance with the most current NIST FIPS-140 standard, with key access restricted to the Authorized User only, unless with the express written permission of the Authorized User. For Authorized Users subject to NYS security policies/standards (see Section 1.2), encryption must be handled in accordance with NYS-S14-007 (or successor) Encryption Standard. The Authorized User Agreement shall specify the respective responsibilities of the Authorized User and the Contractor for the encryption of Data. The Contractor shall give a minimum of five (5) business days advance notice to the designated Authorized User contact of any upgrades, system changes and Maintenance/support actions that may impact availability or functionality of the services described in the Authorized User Agreement. This notice can be carried out through announcement on a website, provided the Authorized User is aware of and provided access to said website. Upgrades, system changes, and Maintenance/support actions which are required by system vulnerabilities or emergency situations shall be carried out by the Contractor to protect the system. Authorized Users shall be notified by the Contractor as soon as possible after the change has taken place. Contractor shall provide documentation of upgrades, system changes and Maintenance/support actions upon request from an Authorized User. Return of Data‌ The Contractor shall return Data in a format agreed upon within the Authorized User Agreement or as agreed to with the Authorized User. This can, if specified within the Authorized User Agreement, be carried out by providing an application programmable interface or other such efficient electronic tools. The Contractor must certify that all Data has been removed from its system and removed from backups within timeframes established in the Authorized User Agreement or as agreed to with the Authorized User. Suspension of Services‌ During any period of suspension of service, the Authorized User shall have full access to all Data at no charge. This can, if specified within the Authorized User Agre...

Related to Transfer Format

  • Software Transfer You may permanently transfer all of your rights under this ▇▇▇▇, provided you retain no copies, you transfer all of the SOFTWARE PRODUCT (including all component parts, the media and printed materials, any upgrades, this ▇▇▇▇, and, if applicable, the Certificate of Authenticity), and the recipient agrees to the terms of this ▇▇▇▇. If the SOFTWARE PRODUCT is an upgrade, any transfer must include all prior versions of the SOFTWARE PRODUCT.

  • Information Transfer and Storage Supplier will use Industry Standard encryption to encrypt Accenture Data that is in transit. Supplier will also use Industry Standard encryption to restrict access to Accenture Data stored on physical media that is transported outside of Supplier facilities.

  • Directory Assistance Service Updates 8.3.3.1 BellSouth shall update end user listings changes daily. These changes include: 8.3.3.1.1 New end user connections 3.3.1.2 End user disconnections

  • Payments for Distribution Assistance and Administrative Support Services (a) Payments to the Distributor. In consideration of the payments made by the Fund to the Distributor under this Plan, the Distributor shall provide administrative support services and distribution services to the Fund. Such services include distribution assistance and administrative support services rendered in connection with Shares (1) sold in purchase transactions, (2) issued in exchange for shares of another investment company for which the Distributor serves as distributor or sub-distributor, or (3) issued pursuant to a plan of reorganization to which the Fund is a party. If the Board believes that the Distributor may not be rendering appropriate distribution assistance or administrative support services in connection with the sale of Shares, then the Distributor, at the request of the Board, shall provide the Board with a written report or other information to verify that the Distributor is providing appropriate services in this regard. For such services, the Fund will make the following payments to the Distributor:

  • Wire Transfer Instructions I will wire funds from my outside account according to the “Subscription Instructions” Page. ____ I will wire funds from my Aegis Capital Account. ____The funds for this investment are rolled over, tax deferred from __________ within the allowed 60 day window.