Data Security Exhibit definition

Data Security Exhibit means the Data Security Exhibit.
Data Security Exhibit means the data security overview available at: xxxxx://xxx.xxxxxxx.xxx/wp-content/uploads/2020/07/Data-S ecurity-Exhibit.pdf, as amended by Xxxxxxx from time to time.
Data Security Exhibit means the data security overview set out here: xxxxx://xxx.xxxxxxx.xxx/wp- content/uploads/2020/07/Data-Security-Exhibit.pdf, as amended by Tessian from time to time. "Device" means any desktop, laptop computer, or mobile device used by an Authorized Mailbox for the internal business purposes of Customer or any of its Group Companies.

Examples of Data Security Exhibit in a sentence

  • Customer data are managed according to the Agreement (including this Data Security Exhibit).

  • Conga has adopted and will maintain industry-standard administrative, physical, and technical safeguards designed to protect the security, privacy and integrity of Customer Data, as further described in the Data Security Exhibit found at xxxx://xxxxx.xxxxxx.xxx/#data-security-exhibit.

  • Red Rover will abide by its policy, as set forth in Exhibit A (Data Security) Exhibit B (Privacy Policy) with respect to the security and privacy of its Customer’s data within the Red Rover Product(s).

  • Vendor shall make available to ServiceNow all information necessary to demonstrate compliance with its obligations under the Agreement and this Data Security Exhibit and allow for and contribute to audits, including remote inspections, conducted by ServiceNow or another auditor mandated by ServiceNow.

  • Toward these goals, CVS Health expects that each vendor/supplier will negotiate with us in good faith to reasonably accommodate CVS Health’s contractual requirements in our vendor/supplier agreements, such as our Data Privacy Addendum, Data Security Exhibit, Business Associate Agreement, and any other agreements we may require from time-to-time.

  • Description of the technical and organisational security measures implemented by the data importer in accordance with Clauses 4(d) and 5(c) (or document/legislation attached): Data Importer’s security measures shall, at a minimum, include those measures set forth in Attachment 1 of this DPA (Data Security Exhibit).

  • Vendor shall have in place appropriate technical and organizational security measures to safeguard ServiceNow Data, including Personal Data, for protection of the security, confidentiality and integrity of such data, as further described in the Data Security Exhibit attached hereto as Attachment 1 and incorporated herein by this reference.

  • Rose PeckhamLocation/Address:Peppimenarti Service CentreFile Ref:N/ADisclosure of Interest: Date: 3 July 2014Author:Peppimenarti Regional Services Manager, Rose PeckhamAttachments:Nil SUMMARY A Report will be tabled at the meeting VOTING REQUIREMENT Simple majorityRECOMMENDATION That Council receives and notes the Peppimenarti Regional Services Manager’s Report.Moved:Clr.Seconded:Clr.

  • Capitalized terms not otherwise defined in this Data Security Exhibit will have the meaning given to them in other parts of the DPA.

  • The following Exhibits are attached and are incorporated into this Agreement by reference: Exhibits (specify): No Data Security Exhibit ; Exhibit A: Statement of Work - Educational Services for EGCC No Exhibits.


More Definitions of Data Security Exhibit

Data Security Exhibit means the data security overview as set out in Exhibit 5, as amended by Tessian from time to time.
Data Security Exhibit means the data security terms contained in the Agreement, which may be attached thereto as Exhibit A.

Related to Data Security Exhibit

  • Privacy/Data Security Laws means all Laws governing the receipt, collection, use, storage, processing, sharing, security, disclosure, or transfer of Personal Information and any applicable Laws concerning requirements for website and mobile application privacy policies and practices, call or electronic monitoring or recording or any outbound communications (including outbound calling and text messaging, telemarketing, and e-mail marketing).

  • Data Security Breach means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, Personal Data transmitted, stored, or otherwise processed.

  • Data Security Requirements means the following, in each case to the extent relating to any sensitive or confidential information, or any matters relating to data privacy, protection, or security or the access, collection, use, processing, storage, sharing, distribution, transfer, disclosure, destruction, or disposal of any personally identifiable information: (i) all applicable Laws and any related security breach notification requirements, (ii) the Conveyed Companies’ own respective rules, policies, and procedures, and (iii) Contracts to which the Conveyed Companies are bound.

  • Data set means an identifiable collection of data;

  • Request regarding a list of collateral means a record authenticated by a debtor requesting that the recipient approve or correct a list of what the debtor believes to be the collateral securing an obligation and reasonably identifying the transaction or relationship that is the subject of the request.

  • Data Sharing Agreement A formal agreement that documents what data is being shared and how the data can be used between the Parties. ‘‘Data Sharing Code of Practice” the code of practice issued by the Information Commissioner in respect to the sharing of personal data.

  • Data Site means an electronic password protected data site maintained by the Borrower (or by the Collateral Manager on behalf of Borrower) at Xxxxxxx Corporation, Intralinks, SyndTrak Online or any other similar electronic distribution system reasonably acceptable to the Administrative Agent.

  • Security Schedule means Schedule 2 hereto.

  • ISP-Bound Traffic means Telecommunications traffic, in accordance with the FCC’s Order on Remand and Report and Order, In the Matter of Implementation of the Local Compensation Provisions in the Telecommunications Act of 1996, Intercarrier Compensation for ISP-Bound Traffic, FCC 01-131, CC Docket Nos. 96-98, 99-68 (rel. April, 27, 2001) (“FCC ISP Compensation Order”), “ISP-Bound Traffic” shall mean Telecommunications traffic exchanged between CLEC and AT&T-21STATE in which the originating End User of one Party and the ISP served by the other Party are:

  • ACMA means the Australian Communications and Media Authority.

  • Data Security Incident means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, Agreement Personal Data transmitted, stored or otherwise Processed;

  • Data Log means a complete record of all Data Interchanged representing the Messages and their Associated Data between the parties;

  • Caribbean Basin country construction material means a construction material that—

  • Data Services The Customer will receive a discount equal to 25% for the following Data Services: Access: Standard VBS2 Guide local loop charges for DS-1 Access and DS-3 Access Service.

  • Limited Data Set shall have the same meaning as the term “limited data set” as set forth in as defined in 45 C.F.R. §164.514(e)(2).

  • Information Privacy and Security Laws means all applicable laws concerning the privacy, data protection, transfer, or security of Personal Confidential Information, including, to the extent applicable, the General Data Protection Regulation (EU), other state, and federal, data security laws, data breach notification laws, and consumer protection laws.

  • Privacy and Security Laws means applicable Laws that govern the Processing, privacy or security of Personal Information.

  • NIST Cybersecurity Framework means the U.S. Department of Commerce National Institute for Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity (Version 1.1).

  • Security freeze means a notice placed in a credit report, at the

  • Minimum data set means the data required by the Australian Government from Community Care service outlets, in the form prescribed by the Australian Government, which data is shared with the Queensland Government;

  • Data Sheet means an integral part of the Instructions to Consultants (ITC) Section 2 that is used to reflect specific country and assignment conditions to supplement, but not to over-write, the provisions of the ITC.

  • Form of Note means the “Form of Note” attached hereto as Exhibit A.

  • L/C Application means an application and agreement for the issuance or amendment of a Letter of Credit in the form from time to time in use by the L/C Issuer.

  • Data Use Agreement means the agreement incorporated into the Contract to facilitate creation, receipt, maintenance, use, disclosure or access to Confidential Information.

  • Annexure F means, if applicable to the Product or the subject matter of this Agreement and read conjunctively with the Contractor’s obligations in terms of the Consumer Protection Act, the express warranties provided by the Contractor in relation to the Product.

  • cross-border processing means either: