ANTI-VIRUS AND SECURITY INCIDENCE REPORTING Sample Clauses

ANTI-VIRUS AND SECURITY INCIDENCE REPORTING. Texas Administrative Code (Chapter 202 B 202.26) requires state agencies to report significant security incidences through the State Department of Information Resources (DIR). County supplies and maintains Anti-Virus and Anti-Malware Protection and meets state requirements for incidence reporting. As a courtesy Extension requests that County IT alert Extension IT of any significant IT related security event occurring in the County Extension Office. These alerts should be sent to the AgriLife Information Security Officer, Xxxxx “Xxxxx” Xxxxxx. Phone 000-000-0000; email: xxxxxxxxxxxx@xx.xxxx.xxx
AutoNDA by SimpleDocs
ANTI-VIRUS AND SECURITY INCIDENCE REPORTING. Texas Administrative Code (Chapter 202 B 202.26) requires agencies to report significant security incidences through the State Department of Information Resources (DIR). Comal County supplies and maintains Anti-Virus and Anti-Malware Protection and meets state requirements for incidence reporting.
ANTI-VIRUS AND SECURITY INCIDENCE REPORTING. Pursuant to the state of Texas TAC code Chapter 202 B 202.26 state agencies are required to report significant security incidences through the Department of Information Resources (DIR). Fort Bend County Information Technology supplies and maintains Anti‐ Virus Protection and aids in meeting the state requirements for incidence reporting. We, AgriLife Information Technology request that Fort Bend county IT alert us of any significant IT related security event occurring in the Extension Offices. These alerts should be sent to our Information Security Officer, Xxxxx “Xxxxx” Xxxxxx, phone # 000.000.0000, email: xxxxxxxxxxxx@xx.xxxx.xxx.

Related to ANTI-VIRUS AND SECURITY INCIDENCE REPORTING

  • Breaches and Security Incidents During the term of the Agreement, CONTRACTOR 27 agrees to implement reasonable systems for the discovery of any Breach of unsecured DHCS PI and PII 28 or security incident. CONTRACTOR agrees to give notification of any beach of unsecured DHCS PI 29 and PII or security incident in accordance with subparagraph F, of the Business Associate Contract, 30 Exhibit B to the Agreement.

  • Security Incident Reporting A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.

  • Reporting Security Incidents The Business Associate will report to the County any Incident of which the Business Associate becomes aware that is:

  • PERSONAL INFORMATION PRIVACY AND SECURITY CONTRACT 11 Any reference to statutory, regulatory, or contractual language herein shall be to such language as in 12 effect or as amended.

  • Background and Security Investigations 8.1 For the safety and welfare of the children to be served under this Contract, CONTRACTOR shall, as permitted by law, ensure that its staff, employees, independent contractors, volunteers or subcontractors who may come in contact with children in the course of their work, undergo and pass a background investigation to the satisfaction of COUNTY as a condition of beginning and continuing to work under this contract. Such background investigation may include, but shall not be limited to criminal conviction information obtained through fingerprints submitted to the California Department of Justice. The fees associated with the background investigation shall be at the expense of the CONTRACTOR, regardless if the member of CONTRACTOR’s staff passes or fails the backgrounds investigation.

  • Security Incidents 11.1 Includes identification, managing and agreed reporting procedures for actual or suspected security breaches.

  • Reporting Incidents The Interconnection Parties shall report to each other in writing as soon as practical all accidents or occurrences resulting in injuries to any person, including death, and any property damage arising out of the Interconnection Service Agreement.

  • Access and Security Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.

  • Security Incident “Security Incident” means the attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with system operations in an information system.

  • Password and Security If you are issued or create any password or other credentials to access the Service or the portion of the Site through which the Service is offered, you agree not to give or make available your password or credentials to any unauthorized individuals, and you agree to be responsible for all actions taken by anyone to whom you have provided such credentials. If you believe that your credentials have been lost or stolen or that someone may attempt to use them to access the Site or Service without your consent, you must inform us at once at the telephone number provided in Section 6 of the General Terms above. See also Section 16 of the General Terms above regarding how the timeliness of your notice impacts your liability for unauthorized transfers.

Time is Money Join Law Insider Premium to draft better contracts faster.