Data Security and Cybersecurity Program definition

Data Security and Cybersecurity Program means Genworth’s data security and cybersecurity program that includes, among other things data protection and cybersecurity policies, as amended by Genworth from time to time.
Data Security and Cybersecurity Program means Xxxxxxxx’s data security and cybersecurity program that includes, among other things data protection and cybersecurity policies, as amended by Genworth from time to time.

Examples of Data Security and Cybersecurity Program in a sentence

  • Each Provider shall, consistent and in accordance with the Data Security and Cybersecurity Program, provide each Recipient such information regarding the status of the Services being provided as may be reasonably requested by the Recipient from time to time.

  • Each party shall implement and maintain technical and physical controls in accordance with the Data Security and Cybersecurity Program to protect the security and integrity of and prevent the theft, loss, damage and unauthorized access, use and disclosure of the other party’s Confidential Information and Personal Information.

  • Each Provider and Recipient shall at all times comply with the Data Security and Cybersecurity Program with respect to the performance, access and/or use of the Services.

  • Each Provider and Recipient shall at all times comply with the Data Security and Cybersecurity Program when providing and receiving the Services to (i) prevent access to the Services by unauthorized Persons and (ii) not damage, disrupt or interrupt the Services.

  • Each Provider and Recipient shall at all times comply with the Data Security and Cybersecurity Program providing and receiving the Services to (i) prevent access to the Services by unauthorized Persons and (ii) not damage, disrupt or interrupt the Services.

Related to Data Security and Cybersecurity Program

  • Privacy/Data Security Laws means all laws governing the receipt, collection, use, storage, processing, sharing, security, disclosure, or transfer of Personal Information or the security of the Business Systems or Business Data.

  • Information Security Program means the administrative, technical, and physical safeguards that a licensee uses to access, collect, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle nonpublic information.

  • Data Safeguards means the highest industry-standard safeguards (including administrative, physical, technical, and procedural safeguards) against the destruction, loss, misuse, unauthorized disclosure, or alteration of the JBE Data or Confidential Information, and such other related safeguards that are set forth in Applicable Laws, a Statement of Work, or pursuant to JBE policies or procedures.

  • Data Security Requirements means, collectively, all of the following to the extent relating to Data Treatment or otherwise relating to privacy, security or security breach notification requirements and applicable to Seller, any IT Systems or any Personal Information: (i) Seller’s own rules, policies, and procedures; (ii) all Laws applicable to Seller; (iii) industry standards applicable to the industry in which Seller operates; and (iv) Contracts to which Seller is a party or otherwise subject.

  • Data Security Breach means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, Personal Data transmitted, stored, or otherwise processed.

  • Computer Security Procedures means procedures for prevention of unauthorized computer access and use and administration of computer access and use as provided in writing to the Underwriter.

  • Data Services The Customer will receive a discount equal to 25% for the following Data Services: Access: Standard VBS2 Guide local loop charges for DS-1 Access and DS-3 Access Service.

  • Data set means an identifiable collection of data;

  • Security Procedures means rules and regulations governing access to, and health and safety procedures while on, Government premises; and information technology security protocols;

  • Security procedure means a procedure employed for the purpose of verifying that an electronic signature, record, or performance is that of a specific person or for detecting changes or errors in the information in an electronic record. The term includes a procedure that requires the use of algorithms or other codes, identifying words or numbers, encryption, or callback or other acknowledgment procedures.

  • Security System means the building access control system developed by Manager and known as the O.P.E.N.centrix - Open Platform for Essential Networks, which includes, without limitation, the Application Software, the firmware containing the Application Software, the O.P.E.N.cortex platform software and all hardware related thereto;

  • Cybersecurity means the measures taken to protect a computer, computer network, or computer system against unauthorized use or access.

  • Security Plan means the Contractor’s security plan prepared pursuant to paragraph 3 of Schedule (Security Requirements & Plan)

  • Data Log means a complete record of all Data Interchanged representing the Messages and their Associated Data between the parties;

  • Privacy and Security Laws means any and all international, local, country-specific, or U.S. State or Federal laws, regulations, directives, standards, guidelines, policies, or procedures, as amended, applicable to Supplier pertaining to the security, confidentiality, or privacy of Buyer Data.

  • Data Service means a telecommunications service other than a voice service.

  • Security Services means, a systemic approach to managing an organisation’s security needs as per specifications, terms and conditions stipulated under the contract, the organisation in this case refers to Medical Colleges/ Hospitals