Data Integrity and Safeguarding Information Sample Clauses

Data Integrity and Safeguarding Information. The Sub-Recipient shall ensure an appropriate level of data security for the information the Sub-Recipient is collecting or using in the performance of this contract. An appropriate level of security includes approving and tracking all Sub- Recipient employees that request system or information access and ensuring that user access has been removed from all terminated employees. The Sub-Recipient, among other requirements, must anticipate and prepare for the loss of information processing capabilities. All data and software shall be routinely backed up to ensure recovery from losses or outages of the computer system. The security over the backed-up data is to be as stringent as the protection required of the primary systems. The Sub-Recipient shall ensure all Subcontractors maintain written procedures for computer system backup and recovery. The Sub-Recipient shall complete and sign the Certification Regarding Data Integrity Compliance for Agreements, Grants, Loans, and Cooperative Agreements prior to the execution of this contract.
AutoNDA by SimpleDocs
Data Integrity and Safeguarding Information. The Contractor shall ensure an appropriate level of data security for the information the Contractor is collecting or using in the performance of this contract. An appropriate level of security includes approving and tracking all Contractor employees that request system or information access and ensuring that user access has been removed from all terminated employees. The Contractor, among other requirements, must anticipate and prepare for the loss of information processing capabilities. All data and software shall be routinely backed up to ensure recovery from losses or outages of the computer system. The security over the backed-up data is to be as stringent as the protection required of the primary systems. The Contractor shall ensure all Subcontractors maintain written procedures for computer system backup and recovery. The Contractor shall complete and sign the Certification Regarding Data Integrity Compliance for Agreements, Grants, Loans, and Cooperative Agreements prior to the execution of this contract.
Data Integrity and Safeguarding Information. The vendor shall ensure an appropriate level of data security for the information the vendor is collecting or using in the performance of this agreement. An appropriate level of security includes approving and tracking all vendor employees that request system or information access and ensuring that user access has been removed from all terminated employees. The vendor, among other requirements, must anticipate and prepare for the loss of information processing capabilities. All data and software must be routinely backed up to insure recovery from losses or outages of the computer system. The security over the backed-up data is to be as stringent as the protection required of the primary systems. The vendor shall insure all vendors maintain written procedures for computer system back-up and recovery. The vendor shall sign the Certification Regarding Data Integrity Compliance for Agreements, Grants, Loans and Cooperative Agreements prior to the execution of this agreement.
Data Integrity and Safeguarding Information. The sub-recipient shall ensure an appropriate level of data security for the information the sub-recipient is collecting or using in the performance of this contract. An appropriate level of security includes approving and tracking all employees that request system or information access and ensuring that user access has been removed from all terminated employees. The sub-recipient, among other requirements, must anticipate and prepare for the loss of information processing capabilities. All data and software must be routinely backed up to ensure recovery from losses or outages of the computer system. The security over the backed-up data is to be as stringent as the protection required of the primary systems. The sub-recipient shall ensure all of their subcontractors maintain written procedures for computer system back up and recovery. The sub-recipient shall complete and sign Attachment XI prior to the execution of this contract.
Data Integrity and Safeguarding Information. The Provider shall ensure an appropriate level of data security for the information the Provider is collecting or using in the performance of any contract or agreement incorporating this Master Contract by reference. An appropriate level of security includes approving and tracking all Provider employees that request system or information access and ensuring that user access has been removed from all terminated employees. The Provider, among other requirements, must anticipate and prepare for the loss of information processing capabilities. All data and software shall be routinely backed up to ensure recovery from losses or outages of the computer system. The security over the backed-up data is to be as stringent as the protection required of the primary systems. The Provider shall ensure all Subproviders maintain written procedures for computer system backup and recovery. The Provider shall complete and sign ATTACHMENT III prior to the execution of the Master Contract.
Data Integrity and Safeguarding Information. The Provider shall ensure an appropriate level of data security for the information the Provider is collecting or using in the performance of this Agreement. An appropriate level of security includes approving and tracking all Provider employees that request system or information access and ensuring that user access has been removed from all terminated employees. The Provider, among other requirements, must anticipate and prepare for the loss of information processing capabilities. All data and software shall be routinely backed up to ensure recovery from losses or outages of the computer system. The security over the backed-up data is to be as stringent as the protection required of the primary systems. The Provider shall ensure all subcontractors maintain written procedures for computer system backup and recovery. The Provider shall complete and sign the Certification Regarding Data Integrity Compliance for Agreements, Grants, Loans, and Cooperative Agreements and return it with the Agreement to Agency contact. Electronic client records and files must be stored in an encrypted format at all times. Storage devices include, but not limited to, computer servers, mobile devices such as laptops, notebooks, and phones, removable media such as CD’s, jump drives, DVD’s and tape. Access shall be limited to staff members requiring the information in order to provide a service to the client. The Provider shall not send any client information via email unless the information is sent in a secured manner through a data encryption service for email systems or if the client file(s) are encrypted prior to sending via email. When faxing client information the Provider shall: Limit the client information to the minimum necessary to accomplish the purpose of the communication; When faxing to a client, do not fax sensitive protected health information (PHI) such as PHI related to alcohol abuse, drug abuse, mental health issues, HIV testing, antigens indicating hepatitis infection, sexually transmitted diseases (STD), or presence of malignancy; Take reasonable precautions to ensure that the intended recipient is either available to receive the fax as it arrives or has exclusive access to the fax machine; Pre-program frequently used non-patient fax numbers to minimize potential for misdirected faxes. Confirm pre-programmed numbers at least every six (6) months; If there is any reason to question the accuracy of a fax number, contact the recipient to confirm the number prior to...
Data Integrity and Safeguarding Information. (1) The subrecipient shall ensure an appropriate level of data security for the information the subrecipient is collecting or using in the performance of this contract, or any PSC referencing this contract. An appropriate level of security includes approving and tracking all subrecipient employees that request system or information access and ensuring that user access has been removed from all terminated employees.
AutoNDA by SimpleDocs
Data Integrity and Safeguarding Information. The Provider shall insure an appropriate level of data security for the information the Provider is collecting or using in the performance of this Agreement. An appropriate level of security includes approving and tracking all Provider employees that request system or information access and ensuring that user access has been removed from all terminated employees. The Provider, among other requirements, must anticipate and prepare for the loss of information processing capabilities. All data and software must be routinely backed up to insure recovery from losses or outages of the computer system. The security over the backed-up data is to be as stringent as the protection required of the primary systems. The Provider shall insure all subcontractors maintain written procedures for computer system back up and recovery. The Provider shall complete and sign ATTACHMENT III prior to the execution of the Master Agreement. Electronic client records and files must be stored in an encrypted format at all times. Storage devices include, but not limited to, computer servers, mobile devices such as laptops, notebooks, and phones, removable media such as CDs, jump drives, DVDs, and tape. Access shall be limited to staff members requiring the information in order to provide a service to the client. The Provider shall not send any client information via email unless the information is sent in a secured manner through a data encryption service for email systems or if the client file(s) are encrypted prior to sending via email. When faxing client information the Provider shall:
Data Integrity and Safeguarding Information. The Sub-recipient shall ensure an appropriate level of data security for the information the Sub-recipient is collecting or using in the performance of any contract or agreement incorporating this Master Contract by reference. An appropriate level of security includes approving and tracking all Sub-recipient employees that request system or information access and ensuring that user access has been removed from all terminated employees. The Sub-recipient, among other requirements, must anticipate and prepare for the loss of information processing capabilities. All data and software shall be routinely backed up to ensure recovery from losses or outages of the computer system. The security over the backed-up data is to be as stringent as the protection required of the primary systems. The Sub-recipient shall ensure all Subcontractors maintain written procedures for computer system backup and recovery. The Sub-recipient shall complete and sign ATTACHMENT III prior to the execution of the Master Contract.

Related to Data Integrity and Safeguarding Information

  • Safeguarding Information Not to use or disclose any information concerning a recipient of services under this contract for any purpose not in conformity with state and federal law except upon written consent of the recipient, or the responsible parent or guardian when authorized by law.

  • Confidentiality and Safeguarding Information 1. Each Party may have access to confidential information made available by the other. The provisions of the Florida Public Records Act, Chapter 119, F.S., and other applicable state and federal laws will govern disclosure of any confidential information received by the State of Florida.

  • Information Safeguards Business Associate will develop, document, implement, maintain and use appropriate administrative, technical and physical safeguards to preserve the integrity and confidentiality of and to prevent non-permitted use or disclosure of PHI created for or received from Recipient or its Subsidiaries. These safeguards must be appropriate to the size and complexity of Business Associate’s operations and the nature and scope of its activities. Business Associate agrees that these safeguards will meet any applicable requirements set forth by the U.S. Department of Health and Human Services, including (as of the effective date or as of the compliance date, whichever is applicable) any requirements set forth in the final HIPAA security regulations. Business Associate agrees to mitigate, to the extent practicable, any harmful effect that is known to Business Associate resulting from a use or disclosure of PHI by Business Associate in violation of the requirements of this Addendum.

  • Data Integrity Contractor shall implement policies and procedures reasonably intended to ensure that Protected Health Information and Personally Identifiable Information in its possession is complete, accurate, and current, to the extent necessary for the Contractor’s intended purposes, and has not been altered or destroyed in an unauthorized manner.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • DATA PROTECTION AND FREEDOM OF INFORMATION 7.1. Each party will:-

  • Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.

  • Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: xxxx://xxx.xxxxxx-xxxxx.xxx/508.htm.

  • System Security and Data Safeguards When SAP is given access to Licensee’s systems and data, SAP shall comply with Licensee’s reasonable administrative, technical, and physical safeguards to protect such data and guard against unauthorized access. In connection with such access, Licensee shall be responsible for providing Consultants with user authorizations and passwords to access its systems and revoking such authorizations and terminating such access, as Licensee deems appropriate from time to time. Licensee shall not grant SAP access to Licensee systems or personal information (of Licensee or any third party) unless such access is essential for the performance of Services under the Agreement. The parties agree that no breach of this provision shall be deemed to have occurred in the event of SAP non-conformance with the aforementioned safeguard but where no personal information has been compromised.

  • Customer Information CPNI of a Customer and any other non-public, individually identifiable information about a Customer or the purchase by a Customer of the services or products of a Party.

Time is Money Join Law Insider Premium to draft better contracts faster.