Data Security Policies definition

Data Security Policies means any current or future posted or internal agreement, standard or policy of a Person relating to the integrity, operation, redundancy, disaster recovery, security testing, monitoring and remediation of Systems used in such Person’s or its Affiliates’ business (and the data therein).
Data Security Policies. [Insert link(s) to [the Recipients/ NAME OF RECIPIENT 1’s]’ data protection/data security/information security policies] Derived Dataset(s) any Licensed Dataset (wholly or in part) Manipulated to such a degree that it: a. cannot be identified as originating or deriving directly from the Licensed Dataset or and cannot be reverse-engineered such that it can be so identified; and b. is not capable of use substantially as a substitute for the Dataset. Effective Date [Date from which access has been or is to be granted] EU GDPR Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and repealing Directive 95/46/EC (General Data Protection Regulation) OJ L 119/1, 4.5.2016.
Data Security Policies means each external written notice or policy of the Company relating to data security.

Examples of Data Security Policies in a sentence

  • The Company has measures in place to protect the security of your data in accordance with our Data Security Policies.

  • I agree to choose a difficult-to-guess password, not to share this password with any other person and not to write this password down as described in SFDPH Data Security Policies.

  • UT Arlington researchers should review the UT Arlington Data Security Policies and Guidelines for appropriate measures to protect against a breach of confidentiality (e.g., not storing identifiable data on laptops and flash drives, encryption, hashing of data, password protection, authentication of computer systems, utilization of secure servers, internet security software that protect against viruses, spyware, etc.).

  • In the prior three (3) years, the Privacy and Data Security Policies have at all times been maintained and made available to individuals in accordance with reasonable industry practices and as required by Privacy Laws, are accurate and complete and are not misleading or deceptive (including by omission).

  • The practices of the Company or its Subsidiaries with respect to the Processing of Personal Data conform in all material respects to the Privacy and Data Security Policies that govern such Personal Data.

  • Methods required to protect data and private information will vary greatly depending on the possible harms related to breach of confidentiality, the technologies employed in the collection and use of data, Institutional Data Security Policies, and applicable Federal and State confidentiality regulations.

  • Such conformance specifically includes the Information and Data Security Policies, Standards, and Guidelines issued by the Commonwealth through the Virginia Information Technologies Agency (VITA) as delineated at the following, or any then-current, URL: http://www.vita.virginia.gov/default.aspx?id=537 or any other information technology or Sensitive Data security requirements established by VITA and pertinent to the Systems, Products and Services.

  • The Recipient agrees to comply with the University’s reasonable directions regarding the security of the Licensed Datasets it holds in addition to the Recipient’s own Data Security Policies.

  • Where the Recipient Institute does not maintain a registration under the NHS Data Security Protection Toolkit, the Recipient Institute warrants that the Data Security Policies outlined in the Systems Level Security Policy (available upon request) provide an equivalent level of protection of any Personal Data accessed by the Recipient Institute.

  • Any supplemental, or different, data controls required by Client, other than as described in the Data Security Policies, must be documented and mutually agreed to in an Order Form or change order form proposal (including any potential cost/expense allocations), including without limitation requirements that may be applicable under the Gramm Leach Bliley Act and its associated regulations, or the New York Department of Financial Services’ Cybersecurity Regulations.

Related to Data Security Policies

  • Security Policy means the Authority’s Security Policy annexed to Schedule (Security Requirements and Plan) as updated from time to time.

  • Security Policy Framework means the Cabinet Office Security Policy Framework (available from the Cabinet Office Security Policy Division);

  • HMG Security Policy Framework means the Cabinet Office Security Policy Framework (available from the Cabinet Office Security Policy Division) as updated from time to time.

  • Privacy/Data Security Laws means all Laws governing the receipt, collection, use, storage, processing, sharing, security, disclosure, or transfer of Personal Information and any applicable Laws concerning requirements for website and mobile application privacy policies and practices, call or electronic monitoring or recording or any outbound communications (including outbound calling and text messaging, telemarketing, and e-mail marketing).

  • SAP Policies means the operational guidelines and policies applied by SAP to provide and support the Cloud Service as incorporated in an Order Form.

  • Safeguard Policy Statement or “SPS” means ADB's Safeguard Policy Statement (2009);

  • City Policies means any or all (as the context requires) of those procedures, standards and/or standard specifications, requirements, policies and the like listed in Schedule H or notified to the Supplier from time to time, as the same may be updated, modified, expanded, revised, supplemented and/or replaced from time to time by the City (as notified to the Supplier);

  • Data Security Requirements means the following, in each case to the extent relating to any sensitive or confidential information, or any matters relating to data privacy, protection, or security or the access, collection, use, processing, storage, sharing, distribution, transfer, disclosure, destruction, or disposal of any personally identifiable information: (i) all applicable Laws and any related security breach notification requirements, (ii) the Conveyed Companies’ own respective rules, policies, and procedures, and (iii) Contracts to which the Conveyed Companies are bound.

  • Privacy Policies has the meaning specified in Section 4.14(e).

  • Procurement Policy means ADB’s Procurement Policy - Goods, Works, Nonconsulting and Consulting Services (2017, as amended from time to time);

  • Information Security Program means the administrative, technical, and physical safeguards that a licensee uses to access, collect, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle nonpublic information.

  • Security Management Plan means the Supplier's security management plan prepared pursuant to paragraph 3 of schedule 2 an outline of which is set out in paragraph 2.7 of the Order Form as updated from time to time;

  • Data Safeguards means the highest industry-standard safeguards (including administrative, physical, technical, and procedural safeguards) against the destruction, loss, misuse, unauthorized disclosure, or alteration of the JBE Data or Confidential Information, and such other related safeguards that are set forth in Applicable Laws, a Statement of Work, or pursuant to JBE policies or procedures.

  • Group Policy /”policy” means the breakdown policy as set out in this document;

  • Privacy Policy means the terms which set out how we will deal with confidential and personal information received from you via the Website;

  • Health insurance policy means a policy that provides specified benefits for hospital and/or general treatment and meets all requirements under section 63-10 of the Private Health Insurance Act 2007.

  • Data Security Breach means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, Personal Data transmitted, stored, or otherwise processed.

  • Security Procedures means rules and regulations governing access to, and health and safety procedures while on, Government premises; and information technology security protocols;

  • Required Insurance Policy With respect to any Mortgage Loan, any insurance policy that is required to be maintained from time to time under this Agreement.

  • Company Insurance Policies has the meaning set forth in Section 4.15.

  • FCA Handbook means the FCA Handbook of Rules and Guidance as amended from time to time.

  • R&W Insurance Policy means the representations and warranties insurance policy issued to Buyer in connection with the transactions contemplated hereby.

  • Errors and Omissions Insurance Policy means an errors and omissions insurance policy maintained by the Master Servicer, the Special Servicer, the Trustee, the Custodian or the Certificate Administrator, as the case may be, in accordance with Section 8.2, Section 9.2 and Section 7.17, respectively.

  • Policy Statement means a written description of the current approach of an agency, entitled a policy statement by the agency head or its designee, to implementation of a statute or other provision of law, of a court decision, or of an agency order, including where appropriate the agency's current practice, procedure, or method of action based upon that approach.

  • Phone/Electronic Transaction Security Procedures means security procedures for Phone/ Electronic Transactions as provided in writing to the Underwriter.

  • Provider of financial assurance means an entity that provides financial assurance to an Owner or Operator of an underground storage tank through one of the mechanisms listed in these Regulations, including a guarantor, insurer, risk retention group, surety, issuer of a letter of credit, issuer of a state required mechanism, or a state.