Common use of CONFIDENTIALITY/SAFEGUARDING OF INFORMATION Clause in Contracts

CONFIDENTIALITY/SAFEGUARDING OF INFORMATION. The use or disclosure by any party of any information concerning a client obtained in providing service under this Agreement shall be subject to Chapter 42.56 RCW and Chapter 70.02 RCW, as well as any other applicable Federal and State statutes and regulations. Any unauthorized access or use of confidential information must be reported to the DOH Chief Information Security Officer at xxxxxxxx@xxx.xx.xxx. The notification must be made in the most expedient time possible (usually within one business day) and without unreasonable delay, consistent with the legitimate needs of law enforcement, or any measures necessary to determine the scope of the breach and restore the reasonable integrity of the data system.

Appears in 2 contracts

Samples: files.nwesd.org, files.nwesd.org

AutoNDA by SimpleDocs

CONFIDENTIALITY/SAFEGUARDING OF INFORMATION. The use or disclosure by any party of any information concerning a client obtained in providing service under this Agreement shall be subject to Chapter 42.56 RCW and Chapter 70.02 RCW, as well as any other applicable Federal and State statutes and regulations. Any unauthorized access or use of confidential information must be reported to the DOH Chief Information IT Security Officer at xxxxxxxx@xxx.xx.xxx. The notification must be made in the most expedient time possible (usually within one business day) and without unreasonable delay, consistent with the legitimate needs of law enforcement, or any measures necessary to determine the scope of the breach and restore the reasonable integrity of the data system.

Appears in 1 contract

Samples: www.walottery.com

CONFIDENTIALITY/SAFEGUARDING OF INFORMATION. The use or disclosure by any party of any information concerning a client obtained in providing service under this Agreement shall be subject to Chapter 42.56 RCW and Chapter 70.02 RCW, as well as any other applicable Federal federal and State state statutes and regulations. Any unauthorized access or use of confidential information must be reported to the DOH Chief Information IT Security Officer at xxxxxxxx@xxx.xx.xxx(000) 000-0000. The notification must be made in the most expedient time possible (usually within one business day24 hours of discovery) and without unreasonable delay, consistent with the legitimate needs of law enforcement, or any measures necessary to determine the scope of the breach and restore the reasonable integrity of the data system.

Appears in 1 contract

Samples: Agreement

CONFIDENTIALITY/SAFEGUARDING OF INFORMATION. The use or disclosure by any party of any information concerning a client obtained in providing service under this Agreement shall be subject to Chapter 42.56 RCW and Chapter 70.02 RCW, as well as any other applicable Federal and State statutes and regulations. Any unauthorized access or use of confidential information must be reported to the DOH Chief Information IT Security Officer at xxxxxxxx@xxx.xx.xxx. The notification must be made in the most expedient time possible (usually within one business dayday of discovery) and without unreasonable delay, consistent with the legitimate needs of law enforcement, or any measures necessary to determine the scope of the breach and restore the reasonable integrity of the data system.

Appears in 1 contract

Samples: www.snohomishcountywa.gov

AutoNDA by SimpleDocs

CONFIDENTIALITY/SAFEGUARDING OF INFORMATION. The use or disclosure by any party of any information concerning a client obtained in providing service under this Agreement agreement shall be subject to Chapter 42.56 RCW and Chapter 70.02 RCW, as well as any other applicable Federal federal and State state statutes and regulations. Any unauthorized access or use of confidential information must be reported to the DOH Chief Information IT Security Officer at xxxxxxxx@xxx.xx.xxx(000) 000-0000. The notification must be made in the most expedient time possible (usually within one business day24 hours of discovery) and without unreasonable delay, consistent with the legitimate needs of law enforcement, or any measures necessary to determine the scope of the breach and restore the reasonable integrity of the data system.

Appears in 1 contract

Samples: Professional Services Agreement

Time is Money Join Law Insider Premium to draft better contracts faster.