Security Review definition

Security Review means an on-site assessment to determine if a bus transit system has security management controls in place and functioning in accordance with the security requirements provided in this rule chapter.
Security Review means an on-site assessment to determine if a bus transit system has security management controls in place and functioning that meet security requirements provided in this Rule Chapter.
Security Review shall have the meaning set forth in Section 15.3(b).

Examples of Security Review in a sentence

  • Security Review Rights City and its agents, auditors (internal and external), regulators, and other representatives as City may designate, may inspect, examine, and review the facilities, books, systems, records, data, practices, and procedures of Contractor (and any personnel) that are used in rendering services to City to verify the integrity of City Confidential Information and to monitor compliance with the confidentiality and security requirements for City Confidential Information.


More Definitions of Security Review

Security Review means examination of The System or information related to the security of The System requiring the assistance of or coordination with HortonWorks that can identify and/or diagnose, or are intended to identify and/or diagnose, Security Issues.
Security Review refers to ISD Security’s assessment and evaluation of Principal’s Security Program and its engagement with Retailer.
Security Review refers to ISD Security’s assessment and evaluation of Contractor’s Security Program and its engagement with Walmart.
Security Review. Research and tests done on CCSF equipment, policies and procedures for the purpose of finding vulnerabilities and irregularities. Sensitive Data: includes but not limited to: the data containing students’ information and staffs’ salaries, skills, strength and weaknesses technical information, equipment configuration, premises and all related information policies and practices at CCSF pertaining to staff trade secrets findings and sharing in the class by any or all students information considered valuable to CCSF and generally not known to public any other information that is not listed above but which, if abused or misused, could reasonably be expected to adversely affect CCSF in its normal operations Non-related Parties: Excludes CCSF and the students enrolled in CNIT 125 Spring 2010 session. End of Enrollment: includes the events; completing the course, successfully or unsuccessfully, dropping the class, expelled or removed from class for any reason Terms: The following points express the terms and conditions of this agreement: All research, paperwork and findings, whether or not prepared or developed by me, shall be kept in strictest confidence. No sensitive data to be used or abused by any student for personal purpose or to benefit some else besides CCSF. At the end of enrollment promptly deliver all original and copies thereof of all documents, records, software programs, media and other material containing any CCSF’s trade secrets. This also includes all equipment, files, software programs and other personal property belonging to CCSF. Keep the sensitive data and any information, learned during the course, strictly confidential, during and after the enrollment period. Summarily, during the process of this course the student will be exposed to CCSF sensitive data which are not to be made aware to non-related parties, without due and explicit authorization of CCSF. CCSF reserves all the rights to all information gathered and distributed in the class. CCSF is entitled to an injunction to restrain from breach or threatened breach, in the event of a breach or threatened to breach this agreement. CCSF, at its discretion, may pursue any remedy at law or in equity for any breach or threatened breach. The terms and conditions are construed and enforced in accordance with the laws of the State of California. Each term of this agreement is in affect independently, regardless of invalidity or unenforceability of any other clause. Alteration to this agreement are...

Related to Security Review

  • Project Management Report means each report prepared in accordance with Section 4.02 of this Agreement;

  • Project Report means a summary statement of the likely environmental effects of a proposed development referred to in section 58;

  • Final Report means the report described as a final report in 14 RCW 42.17.080(2).

  • Periodic Review means a review conducted by Ofwat for the purpose of determining one or more Price Controls in accordance with Part III of Condition B, but so that references in Part IV of Condition B to a Periodic Review shall exclude any review carried out under paragraph 11 of that Condition and shall include the determination by the Competition and Markets Authority of the relevant questions or, as the case may be, the disputed determination referred to it under paragraph 16 of Condition B;

  • Home inspection report means a written report that is

  • Inspection Report means the report delivered by the Master Servicer or the Special Servicer, as the case may be, substantially in the form of Exhibit L hereto.

  • Evaluation Report means a report on the evaluation of tenders prepared under CSO 12

  • Discharge Monitoring Report or "DMR" means the EPA uniform national form, including any subsequent additions, revisions, or modifications, for the reporting of self-monitoring results by permittees.

  • Verification Report As defined in Section 4.19.

  • Clinical review criteria means the written screening procedures, decision abstracts, clinical protocols, and practice guidelines used by a health carrier to determine the necessity and appropriateness of health care services.

  • Risk assessment means a programme to determine any risk associated with any hazard at a construction site, in order to identify the steps needed to be taken to remove, reduce or control such hazard;

  • Flood Insurance Study (FIS means an examination, evaluation, and determination of flood hazards, corresponding water surface elevations (if appropriate), flood hazard risk zones, and other flood data in a community issued by the FEMA. The Flood Insurance Study report includes Flood Insurance Rate Maps (FIRMs) and Flood Boundary and Floodway Maps (FBFMs), if published.

  • GLJ Report means the independent engineering reserves evaluation of certain oil, NGL and natural gas interests of the Company prepared by GLJ dated February 8, 2016 and effective December 31, 2015;

  • Drug utilization review means an evaluation of a prescription drug order and patient records for

  • Compliance Review means an inspection of the home, grounds, and files to determine compliance with these regulations.

  • Data Protection Impact Assessment means an assessment by the Controller of the impact of the envisaged processing on the protection of Personal Data.

  • Acoustic Assessment Report means the report, prepared in accordance with Publication NPC-233 and Appendix A of the Basic Comprehensive User Guide,by HGC Engineering and dated August 22, 2008 submitted in support of the application, that documents all sources of noise emissions and Noise Control Measures present at the Facility and includes all up-dated Acoustic Assessment Reports as required by the Documentation Requirements conditions of this Certificate to demonstrate continued compliance with the Performance Limits following the implementation of any Modification.