Source Code License Subject to the terms and conditions of this ▇▇▇▇, if You separately acquire a Source Code License, You are licensed to use the Source Code. A separate independent Source Code License is also required for each affiliate or subsidiary using the SOFTWARE. i. You expressly do not have, and are not granted the right to use the Source Code to create any derivative works. ii. You expressly do not have, and are not granted the right to modify the SOFTWARE or its Source Code in any way unless the appropriate Source Code modification license has been purchased. iii. Under no circumstances may the Source Code or any portion thereof be distributed, disclosed or otherwise made available to any third party outside of Your organization. iv. GC shall retain all rights, title and interest in and to the licensed Source Code, and all GC updates, modifications or enhancements thereof. Nothing herein shall be deemed to transfer any ownership or title rights in and to the licensed Source Code from GC to You. v. THE SOURCE CODE IS PROVIDED TO YOU AS IS. GC DOES NOT AND SHALL NOT PROVIDE YOU WITH ANY TECHNICAL SUPPORT, OR ANY AUTOMATIC UPDATES OR UPGRADES FOR YOUR SOURCE CODE LICENSE.
Source Code 5.1 Nothing in this ▇▇▇▇ shall give to the User or any other person any right to access or use the Source Code or constitute any licence of the Source Code.
Workstation/Laptop encryption All workstations and laptops that process and/or store County PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Security Office.
Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.
Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.