Computer Security Procedures definition

Computer Security Procedures means procedures for prevention of unauthorized computer access and use and administration of computer access and use as provided in writing to the Underwriter.
Computer Security Procedures means procedures for prevention of unauthorized computer access and administration of computer access as provided in writing to the Underwriter.
Computer Security Procedures means procedures for prevention of unauthorized

Examples of Computer Security Procedures in a sentence

  • Any loss resulting from the intentional failure to adhere to one or more Computer Security Procedures; and c.

  • Loss resulting from the intentional failure to adhere to one or more Computer Security Procedures.

  • COMPUTER SECURITY Loss (including loss of Property) resulting directly from: (1) Computer Fraud; or (2) the modification or deletion of any data or programs, due to the introduction or activation of any Malicious Code, provided that the Insured has adopted in writing and generally maintains and follows during the Bond Period all Computer Security Procedures.

  • Any loss resulting from the Insured’s intentional failure to adhere to one or more Computer Security Procedures.

  • COMPUTER SECURITY Loss (including loss of Property) resulting directly from Computer Fraud; provided, that the Insured has adopted in writing and generally maintains and follows during the Bond Period all Computer Security Procedures.

  • Loss (including loss of Property) resulting directly from Computer Fraud; provided, that the Insured has adopted in writing and generally maintains and follows during the Bond Period all Computer Security Procedures.

  • COMPUTER SECURITY Loss (including loss of Property) resulting directly from Computer Fraud; provided that the Insured has adopted in writing and generally maintains and follows during the Bond Period all Computer Security Procedures.

  • Any loss resulting from the intentional failure to adhere to one or more Computer Security Procedures; and d.


More Definitions of Computer Security Procedures

Computer Security Procedures means procedures for prevention of unauthorized computer access and use and administration of computer access.

Related to Computer Security Procedures

  • Security Procedures means rules and regulations governing access to, and health and safety procedures while on, Government premises; and information technology security protocols;

  • Security procedure means a procedure employed for the purpose of verifying that an electronic signature, record, or performance is that of a specific person or for detecting changes or errors in the information in an electronic record. The term includes a procedure that requires the use of algorithms or other codes, identifying words or numbers, encryption, or callback or other acknowledgment procedures.

  • Phone/Electronic Transaction Security Procedures means security procedures for Phone/ Electronic Transactions as provided in writing to the Underwriter.

  • Phone/Electronic Transaction Security Procedures means security procedures for Phone/ Electronic Transactions as provided in writing to the Underwriter.

  • Social Engineering Security Procedures means security procedures intended to prevent Social Engineering Fraud as set forth in the Application and/or as otherwise provided in writing to the Underwriter.

  • Administrative Safeguards are administrative actions, and policies and procedures, to manage the selection, development, implementation, and maintenance of security measures to protect electronic PHI and to manage the conduct of Contractor’s workforce in relation to the protection of that information.

  • Sale Procedures Unless otherwise specified in the Supplement, shall mean that, with respect to any sale of one or more Underlying Securities or Related Assets, the Market Agent, on behalf of the Trust, shall sell such Underlying Securities or Related Assets to the highest bidders among not less than two solicited bidders for such Underlying Securities or Related Assets (one of which bidders may include Merrill Lynch & Co. or any Affiliate thereof; provided, however, that xxxxxxr Xxxxill Lynch & Co. nor any of its Affiliates will be under any obligxxxxx xo xxx, and which bidders need not be limited to recognized broker dealers). In the sole judgment of the Market Agent, bids may be evaluated on the basis of bids for a single Underlying Security or Related Asset, a portion of the Underlying Securities or Related Assets, or all of the Underlying Securities or Related Assets being sold or any other basis selected in good faith by the Market Agent.

  • Information Security Program means the administrative, technical, and physical safeguards that a licensee uses to access, collect, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle nonpublic information.

  • Data Safeguards means the highest industry-standard safeguards (including administrative, physical, technical, and procedural safeguards) against the destruction, loss, misuse, unauthorized disclosure, or alteration of the JBE Data or Confidential Information, and such other related safeguards that are set forth in Applicable Laws, a Statement of Work, or pursuant to JBE policies or procedures.

  • Staff Vetting Procedures means the Authority’s procedures for the vetting of personnel and as advised to the Contractor by the Authority.

  • Administrative Procedures means the Administrative Procedures of Minnesota Management & Budget developed in accord with M.S. 43A.04, subdivision 4.

  • Enforcement Procedures means the procedures for the enforcement of Mortgages from time to time in accordance with the relevant Seller’s Policy;

  • Depositary Procedures means, with respect to any conversion, transfer, exchange or transaction involving a Global Note or any beneficial interest therein, the rules and procedures of the Depositary applicable to such conversion, transfer, exchange or transaction.

  • Security Property means all right, title and interest in, to and under any Security Document, including:

  • Securities Depositories means DTC; and, in accordance with then current guidelines of the Securities and Exchange Commission, such other addresses and/or such other securities depositories as the District may designate in a Written Request of the District delivered to the Paying Agent.

  • Bidding Procedures means the procedures governing the Auction and sale of all or substantially all of the Debtors’ assets, as approved by the Bankruptcy Court and as may be amended from time to time in accordance with their terms.

  • AML/KYC Procedures means the customer due diligence procedures of a Reporting Finnish Financial Institution pursuant to the anti-money laundering or similar requirements of Finland to which such Reporting Finnish Financial Institution is subject.

  • Computer database or “database” means a collection of recorded information in a form capable of, and for the purpose of, being stored in, processed, and operated on by a computer. The term does not include computer software.

  • Internal Procedures means in respect of the making of any one or more entries to, changes in or deletions of any one or more entries in the register at any time (including without limitation, original issuance or registration of transfer of ownership) the minimum number of the Warrant Agent’s internal procedures customary at such time for the entry, change or deletion made to be complete under the operating procedures followed at the time by the Warrant Agent, it being understood that neither preparation and issuance shall constitute part of such procedures for any purpose of this definition;

  • Trust Account Rules means the rules relating to the establishment and operation of a trust account established and operated by the Distributor in accordance with clause 10.26;

  • Indigenous Peoples Safeguards means the principles and requirements set forth in Chapter V, Appendix 3, and Appendix 4 (as applicable) of the SPS;

  • Data Security Requirements means the following, in each case to the extent relating to any sensitive or confidential information, or any matters relating to data privacy, protection, or security or the access, collection, use, processing, storage, sharing, distribution, transfer, disclosure, destruction, or disposal of any personally identifiable information: (i) all applicable Laws and any related security breach notification requirements, (ii) the Conveyed Companies’ own respective rules, policies, and procedures, and (iii) Contracts to which the Conveyed Companies are bound.

  • Donor profile record means all records about donors or potential donors to a public institution of higher education except the names and reported addresses of the actual donors and the date, amount, and conditions of the actual donation.

  • Technical safeguards means the technology and the policy and procedures for its use that 27 protect electronic PHI and control access to it.

  • computer data means any representation of facts, information or concepts in a form suitable for processing in a computer system, including a program suitable to cause a computer system to perform a function;