Information Security Terms definition

Information Security Terms means the Information Security Terms of IHS Markit attached hereto and identified as Exhibit C;
Information Security Terms means the Information Security Terms of MSFA attached hereto and identified as Exhibit C;

Examples of Information Security Terms in a sentence

  • Italicized terms not defined in this policy shall have the meanings contained in City Information Security Policy No. 13.00: Glossary of Information Security Terms.

  • Key TerminologyFor PCI DSS-specific terminology, the PCI Security Standards Council’s Glossary is the authoritative source for terminology definitions.1 For other cybersecurity terminology, the National Institute of Standards and Technology (NIST) IR 7298, Glossary of Key Information Security Terms, is the alternative reference document that ACME uses to define common cybersecurity terms.

  • For definitions of unfamiliar terms, please see Appendix B of this volume or NISTIR 7298, Glossary of Key Information Security Terms.

  • As these key words have become more generally understood and guidance has become available through the NIST regarding specific key terms, such as intranet, extranet, and internet, (see, for example, NIST IR 7298 Revision 1, Glossary of Key Information Security Terms, February 2011, available at http:// csrc.nist.gov/publications/nistir/ir7298- rev1/nistir-7298-revision1.pdf), we believe the parenthetical language is no longer helpful.

  • It also submits that there is no basis in fact on the evidence to support a conclusion that Facebook’s conduct was so egregious as to justify an award of punitive damages.[337] I have already found that there are common issues regarding liability and damages.

  • EXHIBIT C IHS MARKIT INFORMATION SECURITY TERMS These IHS Markit Information Security Terms (“Information Security Terms”) constitute the information security terms with which IHS Markit shall use its reasonable efforts to comply in the course of providing the Services to Customer under the Agreement.

  • If Supplier processes, stores or hosts Confidential Information during the performance of the Contract, Supplier must comply with CAE’s Information Security Terms for Suppliers available on CAE’s webpage for suppliers: https://www.cae.com/suppliers/.

  • Definitions enable discourse and standards facilitate implementation in support of enterprise-level access management and privilege management in particular.Definitions generally in use, as in NISTIR-7298 Glossary of Key Information Security Terms and those explicitly referenced in Annex A: Authorization and Attributes Glossary, serve the purpose of effective discourse.

  • With the exception of the terms identified in subparagraphs 1.-4., the NIST Glossary of Key Information Security Terms, Revision 2, National Institute of Standards and Technology, U.S. Department of Commerce (May 2013), maintained at: http://nvlpubs.nist.gov/nistpubs/ir/2013/NIST.IR.7298r2.pdf,is hereby incorporated by reference into this rule: http://www.flrules.org/Gateway/reference.asp?No=Ref-06494.

  • While cable and satellite operators are the users of the statutory licenses, their use of the licenses means that broadcast networks and local broadcast television stations do not need to ensure they have the rights to license their content to cable and satellite operators.

Related to Information Security Terms

  • Information Security shall have the same meanings as the terms “information technology” and “information security”, respectively, in §24-37.5-102, C.R.S. Capitalized terms used herein and not otherwise defined herein or in the HIPAA Rules shall have the meanings ascribed to them in the Contract.

  • Information Security Program means the administrative, technical, and physical safeguards that a licensee uses to access, collect, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle nonpublic information.

  • Information Security Breach means the unauthorized acquisition, access, use, disclosure, transmittal, storage or transportation of Confidential Information which is not permitted by law or by the terms of this Amendment, including, but not limited to, a Security Incident.

  • Information Security Incident means (i) any actual or suspected incident involving Seller Information System that may involve Buyer’s Sensitive Information, or (ii) any actual or suspected unauthorized access to, use, or disclosure of Buyer’s Sensitive Information.

  • restricted security term means each of the terms “non-voting security”, “subordinate voting security”, and “restricted voting security”;

  • Transaction Security means the Security provided for the Secured Obligations pursuant to the Security Documents.

  • Confidential Information Memorandum means the Confidential Information Memorandum of the Borrower dated March, 2004, delivered to the Lenders in connection with this Agreement.

  • Security Information means account numbers and/or Username as applicable, passwords and other information required to identify you for the purposes of you trading with us under this Agreement.

  • Disclosure to information norm means the Policy shall be void and all premium paid thereon shall be forfeited to the Company, in the event of misrepresentation, mis-description or non-disclosure of any material fact.

  • Security Tests means conduct tests of the processes and countermeasures contained in the Security Plan.

  • Transaction Security Documents means each of the documents listed as being a Transaction Security Document in paragraph 2(e) of Part I of Schedule 2 (Conditions Precedent) of the 2009 Financing Agreement and any document required to be delivered to the Administrative Agent under paragraph 3(d) of Part II of Schedule 2 (Conditions Precedent) of the 2009 Financing Agreement together with any other document entered into by any Obligor creating or expressed to create any Security over all or any part of its assets in respect of the obligations of any of the Obligors under any of the Finance Documents (and any other Debt Documents).

  • Phone/Electronic Transaction Security Procedures means security procedures for Phone/ Electronic Transactions as provided in writing to the Underwriter.

  • Commercial Information means information regarding the purchase and sale of goods and services, including, but not limited to, information regarding marketing strategy, production data, assessments of goods and services, mineral exploration records, and compilations of data regarding commercial activity.

  • Information Provider means the person or organisation providing the Information under this licence.

  • National Security Information means information that has been determined pursuant to Executive Order 13526 or any predecessor order to require protection against unauthorized disclosure and is marked to indicate its classified status when in documentary form. Classified or national security information is specifically authorized to be protected from unauthorized disclosure in the interest of national defense or foreign policy under an Executive Order or Act of Congress.

  • Confidential commercial information means records provided to the govern- ment by a submitter that arguably contain material exempt from release under Exemption 4 of the Freedom of Information Act, 5 U.S.C. 552(b)(4), be- cause disclosure could reasonably be expected to cause substantial competi- tive harm.

  • Underwriter Information has the meaning provided in Section 3(c) hereof.

  • E-Auction Process Information Document means this document including all the appendices hereto, for the purposes of setting out the process for submission of a bid and selection of Successful Bid in accordance with the provisions of the IBC and shall include all supplements, modifications, amendments, alterations or clarifications thereto issued in accordance with the terms hereof.

  • Phone/Electronic Transaction Security Procedures means security procedures for Phone/ Electronic Transactions as provided in writing to the Underwriter.

  • Information Privacy and Security Laws means all applicable laws concerning the privacy, data protection, transfer, or security of Personal Confidential Information, including, to the extent applicable, the General Data Protection Regulation (EU), other state, and federal, data security laws, data breach notification laws, and consumer protection laws.

  • Information Circular means a completed Form 51-102F5 Information Circular; “informed person” means

  • Regulatory Information Service means a service approved by the London Stock Exchange for the distribution to the public of announcements; and

  • Privacy/Data Security Laws means all Laws governing the receipt, collection, use, storage, processing, sharing, security, disclosure, or transfer of Personal Information and any applicable Laws concerning requirements for website and mobile application privacy policies and practices, call or electronic monitoring or recording or any outbound communications (including outbound calling and text messaging, telemarketing, and e-mail marketing).

  • Data Room Information means the information and documents listed in the index of documents contained in the Data Site attached to the Company Disclosure Letter;

  • Confidential commercial or financial information means any business information (other than trade secrets) which is exempt from the mandatory disclosure requirement of the Freedom of Information Act, 5 U.S.C. 552. Exemptions from mandatory disclosure which may be applicable to business information contained in proposals include exemption (4), which covers “commercial and financial information obtained from a person and privileged or confidential,” and exemption (9), which covers “geological and geophysical information, including maps, concerning wells.”

  • ABS Underwriter Derived Information means any analytical or computational materials as described in clause (5) of footnote 271 of Commission Release No. 33-8591, issued July 19, 2005 (Securities Offering Reform) (the “Securities Offering Reform Release”).