Data Transport Sample Clauses

Data Transport. When transporting DSHS Confidential Information electronically, including via email, the Data will be protected by:
AutoNDA by SimpleDocs
Data Transport. When transporting Great Rivers Confidential Information electronically, including via email, the Data will be protected by:
Data Transport. When transporting Confidential Information electronically, including via email, the data will be protected by:
Data Transport. When transporting HCA Confidential Information electronically, including via email, the data will be protected by:
Data Transport. Internal Islington Council transfer Personally identifiable data following a referral will be stored in a secure area on the council network. Where necessary, data may be securely emailed within the council (@xxxxxxxxx.xxx.xx accounts). Data must only be emailed to a named individual and never to a group account. Sharing between the council and external agencies Data containing personally identifiable information or sensitive personal data MUST be sent through secure email. The following forms of secure email may be used:  Criminal Justice Secure email (CJSM) CJSM is a government accredited secure route for sending emails to Criminal Justice organisations, including Crown and Magistrates’ Courts, Crown Prosecution Service, Police, and the National Offender Management Service.  Government Secure Intranet (GSi) addresses; GSi is a UK Government wide area network, whose main purpose is to enable connected organisations to communicate electronically and securely low protective marking levels.  All other email domain addresses (Not Xxxxxxxxx.xxx.xx, CJSM, or GSi); Secure encrypted email MUST be used. Islington council’s secure email is Proofpoint, and this must be used when transferred personally identifiable or sensitive personal data. Where possible electronic mails containing Personal and Sensitive Personal Data should not be sent outside of the networks mentioned above. However if this is not possible, electronic mails should only be sent to addresses which are directly linked to the recipient, under no circumstances should any electronic mail containing Personal data or Sensitive Personal Data be sent to group email addresses, or addresses that have not been verified by the recipient. In addition, emails will only be sent to recipients who have emails associated with an organisation containing address strings such as xxx.xx and xxx.xx and not to personal or social email addresses. Under no circumstances should Personal or Sensitive Personal Data be included in the Subject, or the Body of any electronic mail that is sent outside of the networks mentioned above. Any Personal Data or Sensitive Personal Data should be contained in a separate document, which is password protected, and attached to the electronic mail. Sharing data via Removable Media Personally identifiable data must not be stored on or transported by removable media. Sharing Data on Paper It is recommended that all Personal Data and Sensitive Personal Data is transferred electronically. If t...
Data Transport. The Contractor shall use reputable means to transport Data. Deliveries must be made either via hand delivery by an employee of the Contractor or by restricted delivery via courier (e.g., FedEx, United Parcel Service, United States Postal Service) with shipment tracking and receipt confirmation. This applies to transport between the Contractor’s offices, to and from subcontractors, and to the Authorized User.
Data Transport. 8.1 To the extent that Databricks processes any Customer Data subject to EU Data Protection Law (“EEA Data”) on behalf of Customer, the parties agree that Databricks makes available the transfer mechanisms listed below for any transfers of EEA Data from the EEA to Databricks located in a country which does not ensure an adequate level of protection (within the meaning of Applicable Data Protection Laws) and to the extent such transfers are subject to such EU Data Protection Law:
AutoNDA by SimpleDocs
Data Transport. When transporting DSHS Confidential Information electronically the Data will be encrypted. This includes any transmission of the Data over the Internet in any manner including, but not limited to, email outside of their own network.

Related to Data Transport

  • Signaling Link Transport 9.2.1 Signaling Link Transport is a set of two or four dedicated 56 kbps transmission paths between Global Connection-designated Signaling Points of Interconnection that provide appropriate physical diversity.

  • AIR TRANSPORT 1. Profits derived by an enterprise of a Contracting State from the operation of aircraft in international traffic shall be taxable only in that State.

  • Dark Fiber Transport Dark Fiber Transport is defined as Dedicated Transport that consists of unactivated optical interoffice transmission facilities without attached signal regeneration, multiplexing, aggregation or other electronics. Except as set forth in Section 6.9.1 below, BellSouth shall not be required to provide access to Dark Fiber Transport Entrance Facilities pursuant to this Agreement.

  • DELIVERY TERMS AND TRANSPORTATION CHARGES Deliverables shall be shipped F.O.B. point of delivery unless otherwise specified in the Supplemental Terms and Conditions. Unless otherwise stated in the Offer, the Contractor’s price shall be deemed to include all delivery and transportation charges. The City shall have the right to designate what method of transportation shall be used to ship the deliverables. The place of delivery shall be that set forth the purchase order.

  • Transport 6.1.1 BellSouth shall provide nondiscriminatory access, in accordance with FCC Rules 51.311, 51.319, and Section 251(c)(3) of the Act to interoffice transmission facilities described in this Section 6 on an unbundled basis to EZ Phone for the provision of a qualifying service, as set forth herein.

  • DELIVERY, STORAGE, AND HANDLING The Contractor shall be responsible to inspect all components on delivery to ensure that no damage occurred during shipping or handling for furnish and installation projects. For equipment only purchases, the ordering entity shall be responsible to inspect all components on delivery. Materials must be stored in original undamaged packaging in such a manner to ensure proper ventilation and drainage, and to protect against damage, weather, vandalism, and theft until ready for installation.

  • Purchase Order Flip via Ariba Network (AN) The online process allows suppliers to submit invoices via the AN for catalog and non- catalog goods and services. Contractors have the ability to create an invoice directly from their Inbox in their AN account by simply “flipping” the purchase order into an invoice. This option does not require any special software or technical capabilities. For the purposes of this section, the Contractor warrants and represents that it is authorized and empowered to and hereby grants the State and the third-party provider of MFMP the right and license to use, reproduce, transmit, distribute, and publicly display within the system the information outlined above. In addition, the Contractor warrants and represents that it is authorized and empowered to and hereby grants the State and the third-party provider the right and license to reproduce and display within the system the Contractor’s trademarks, system marks, logos, trade dress, or other branding designation that identifies the products made available by the Contractor under the Contract.

  • Data Storage Where required by applicable law, Student Data shall be stored within the United States. Upon request of the LEA, Provider will provide a list of the locations where Student Data is stored.

  • Air Transport Services 1. For the purposes of this Article:

  • Access to Network Interface Device (NID 2.4.3.1. Due to the wide variety of NIDs utilized by BellSouth (based on subscriber size and environmental considerations), Mpower may access the on-premises wiring by any of the following means: BellSouth shall allow Mpower to connect its loops directly to BellSouth’s multi-line residential NID enclosures that have additional space and are not used by BellSouth or any other telecommunications carriers to provide service to the premise. Mpower agrees to install compatible protectors and test jacks and to maintain the protection system and equipment and to indemnify BellSouth pursuant to Section 8 of the General Terms and Conditions of this Agreement.

Time is Money Join Law Insider Premium to draft better contracts faster.