Secure Protocols Sample Clauses

The Secure Protocols clause establishes requirements for the use of secure communication and data transfer methods between parties. It typically mandates that all electronic transmissions, such as emails or file transfers, utilize encryption or other industry-standard security measures to protect sensitive information from unauthorized access. By enforcing these standards, the clause helps prevent data breaches and ensures that confidential or personal data remains protected throughout the duration of the agreement.
Secure Protocols. The Parties shall use secure protocols for the transmission of data from the Bank and its Affiliates, on the one hand, to the Company and its Affiliates, on the other hand, and vice versa.
Secure Protocols. The Parties shall use secure protocols for the transmission of all Nonpublic Personal Information and other Confidential Information, including the transmission of Protected Cardholder Data between and among each other.
Secure Protocols. The Parties shall use secure protocols for the transmission of data from Bank and its Affiliates, on the one hand, to Pier 1 and its Affiliates, on the other hand, and vice versa. This will include the use of data encryption or another form of agreed-upon secure data transmission method during transmission of all Cardholder Data and Pier 1 Shopper Data by both Bank and Pier 1.

Related to Secure Protocols

  • Protocols Each party hereby agrees that the inclusion of additional protocols may be required to make this Agreement specific. All such protocols shall be negotiated, determined and agreed upon by both parties hereto.

  • Interoperability To the extent required by applicable law, Cisco shall provide You with the interface information needed to achieve interoperability between the Software and another independently created program. Cisco will provide this interface information at Your written request after you pay Cisco’s licensing fees (if any). You will keep this information in strict confidence and strictly follow any applicable terms and conditions upon which Cisco makes such information available.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Protocol The attached Protocol shall be an integral part of this Agreement.

  • Network Interconnection Architecture Each Party will plan, design, construct and maintain the facilities within their respective systems as are necessary and proper for the provision of traffic covered by this Agreement. These facilities include but are not limited to, a sufficient number of trunks to the point of interconnection with the tandem company, and sufficient interoffice and interexchange facilities and trunks between its own central offices to adequately handle traffic between all central offices within the service areas at a P.01 grade of service or better. The provisioning and engineering of such services and facilities will comply with generally accepted industry methods and practices, and will observe the rules and regulations of the lawfully established tariffs applicable to the services provided.