Data Security Controls Sample Clauses

Data Security Controls. Vendor must document and maintain adequate: a) Data security controls, such as but not limited to * . Vendor must ensure at each site that appropriate data controls are implemented and that no shared environments exist with other businesses for all WANs, LANs, network connections, dial-up connections, DASD, distributed systems, or any other computer systems. b) Retention processes and policies for all security data events (i.e., reports) in accordance with legal and regulatory requirements. Examples include: * c) Controls in configuring and operating voice systems, especially as regards * .
Data Security Controls. 1 Programme
Data Security Controls. Pursuant to Section 2054.138 of the Texas Government Code, if Contractor will be authorized to access, transmit, use, or store data for MD ▇▇▇▇▇▇▇▇, Contractor is required to meet the security controls MD ▇▇▇▇▇▇▇▇ determines are proportionate with MD ▇▇▇▇▇▇▇▇’▇ risk under this Agreement based on the sensitivity of MD ▇▇▇▇▇▇▇▇’▇ data. Contractor must periodically provide to MD ▇▇▇▇▇▇▇▇ evidence that Contractor meets the security controls required under this Agreement.
Data Security Controls. 1. Contractor will implement the following standards for County staff passwords: a. Passwords must include 3 of the following 4 types of characters: upper case, lower case, number, special character; b. Passwords must be 12 characters long; c. Passwords must be reset every 90 days; d. Passwords cannot be reused until 24 other passwords have been used. 2. Contractor shall use encryption for its Active Directories. 3. Contractor shall use encryption for data at rest and in transit. 4. Contractor shall maintain detailed User Activity Logs. 5. Contractor shall maintain 24-hour security, alarms, and access restrictions at its data centers. 6. Contractor will subject all staff with access to its data centers to background checks and implement periodic rechecks. 7. The ICS and ISTP shall not receive, store, transport, or otherwise interact with any County data labeled Criminal Justice Information (“CJI”) and County acknowledges that the ICS and ISTP are not Criminal Justice Information Services (“CJIS”) compliant.
Data Security Controls. 1. Within six (6) months of go live, Contractor will implement the following standards for County staff passwords: a. Passwords for users that have not logged in for 60 days will be disabled; b. Passwords must include 3 of the following 4 types of characters: upper case, lower case, number, special character; c. Passwords must be 12 characters long; d. Passwords must be reset every 90 days; e. Passwords cannot be reused until 24 other passwords have been used. 2. Contractor shall use encryption for its Active Directories.