Information Assets Sample Clauses
The Information Assets clause defines and governs the handling, protection, and ownership of data, documents, and other informational resources exchanged or created under an agreement. It typically specifies what constitutes an information asset, outlines responsibilities for safeguarding such assets, and may set requirements for access, use, or return of information upon contract termination. This clause ensures that sensitive or proprietary information is properly managed, reducing the risk of misuse or unauthorized disclosure.
POPULAR SAMPLE Copied 1 times
Information Assets. Subrecipient shall have in place operational policies, procedures, and practices to protect State information assets including those assets used to store or access Personal Health Information (PHI), Personal Information (PI), and any information protected under the Health Insurance Portability and Accountability Act (HIPAA) (i.e., public, confidential, sensitive and/or personal information) as specified in the State Administrative Manual, Section 5300 to 5365.3; Cal. Gov. Code § 11019.9; DGS Management Memo 06-12; DOF Budget Letter 06-34; and CDA Program Memorandum 07-18 Protection of Information Assets and the Statewide Health Information Policy Manual. Information assets may be in hard copy or electronic format and may include (but are not limited to):
a) Reports
b) Notes
c) Forms
d) Computer, laptops, cellphones, printers, scanners
e) Networks (LAN, WAN, WIFI) servers, switches, routers
f) Storage media, hard drives, flash drives, cloud storage g) Data, applications, databases
Information Assets. Subrecipient shall have in place operational policies, procedures, and practices to protect State information assets including those assets used to store or access Personal Health Information (PHI), Personal Information (PI), and any information protected under the Health Insurance Portability and Accountability Act (HIPPA) (i.e., public, confidential, sensitive and/or personal information) herein referred to as Personal, Sensitive and Confidential Information (PSCI) as specified in the State Administrative Manual, Section 5300 to 5365.3; Cal. Gov. Code § 11019.9; DGS Management Memo 06-12; DOF Budget Letter 06-34; and CDA Program Memorandum 07-18 Protection of Information Assets. Information assets include (but are not limited to):
a) Information collected and/or accessed in the administration of the State programs and services.
b) Information stored in any media form, paper or electronic.
Information Assets. The Contractor, and its Subcontractors/Vendors, shall have in place operational policies, procedures, and practices to protect State information assets including those assets used to store or access Personal Health Information (PHI), Personal Information (PI) and any information protected under the health Insurance Portability and Accountability Act (HIPAA), (i.e. public, confidential, sensitive and/or personal identifying information) herein referred to as Personal, Sensitive and Confidential Information (PSCI) as specified in State Administrative Manual, Section 5300-5365.3, GC Section 11019.9, Department of General Services (DGS) Management Memo 06-12, Department of Finance (DOF) Budget Letter (06-34), and Program Memorandum 07-18 Protection of Information Assets, and the Statewide Health Information Policy Manual. Information assets may be in hard copy or electronic format and may include (but is not limited to):
1. Reports
2. Notes
3. Forms
4. Computers, laptops, cell phones, printers, scanners 5. Networks (LAN, WAN WIFI) servers, switches, routers
Information Assets. Subrecipient shall have in place operational policies, procedures, and practices to protect State information assets including those assets used to store or access Personal Health Information (PHI), Personal Information (PI), and any information protected under the Health Insurance Portability and Accountability Act (HIPPA) (i.e., public, confidential, sensitive and/or personal information) as specified in the State Administrative Manual, Section 5300 to 5365.3; Cal. Gov. Code § 11019.9; DGS Management Memo 06-12; DOF Budget Letter 06-34; and CDA Program Memorandum 07-18 Protection of Information Assets. Information assets include (but are not limited to):
a) Information collected and/or accessed in the administration of the State programs and services.
b) Information stored in any media form, paper or electronic.
Information Assets. The Contractor, and its Subcontractors/Vendors, shall have in place operational policies, procedures, and practices to protect State information assets, including those assets used to store or access Personal Health Information (PHI), Personal Information (PI) and any information protected under the Health Insurance Portability and Accountability Act (HIPAA), (i.e., public, confidential, sensitive and/or personal identifying information) as specified in the State Administrative Manual, 5300 to 5365.3; Cal. Gov. Code § 11019.9, DGS Management Memo 06-12; DOF Budget Letter 06-34; and CDA Program Memorandum 07-18 Protection of Information Assets and the Statewide Health Information Policy Manual. Information assets may be in hard copy or electronic format and may include but is not limited to:
1. Reports
2. Notes
3. Forms
4. Computers, laptops, cellphones, printers, scanners 5. Networks (LAN, WAN, WIFI) servers, switches, routers
Information Assets. Subrecipient shall have in place operational policies, procedures, and practices to protect State information assets including those assets used to store or access Personal Health Information (PHI), Personal Information (PI), and any information protected under the Health Insurance Portability and Accountability Act (HIPAA) (i.e., public, confidential, sensitive and/or personal information) herein referred to as Personal, Sensitive and Confidential Information (PSCI) as specified in the State Administrative Manual, Section 5300 to 5365.3; Cal. Gov. Code § 11019.9; DGS Management Memo 06-12; DOF Budget Letter 06-34; and CDA Program Memorandum 07-18 Protection of Information Assets and the Statewide Health Information Policy Manual. Information assets may be in hard copy or electronic format and may include (but are not limited to):
a) Reports
b) Notes
c) Forms
d) Computer, laptops, cellphones, printers, scanners
e) Networks (LAN, WAN, WIFI) servers, switches, routers
f) Storage media, hard drives, flash drives, cloud storage g) Data, applications, databases
Information Assets. The Contractor shall have in place operational policies, procedures, and practices to protect State information assets, i.e., public, confidential, sensitive and/or personal information as specified in State Administrative Manual, Section. 5310, GC Section 11019, Department of Finance (DOF) Management Memo 06- 12, and DOF Budget Letter 06-34). Information assets include (but are not limited to):
1. Information collected and/or accessed in the administration of the State programs and services
2. Information stored in any media form, paper or electronic
Information Assets. In order to ensure the integrity and security of SFDPH systems, I agree not to disclose any portion of the organization’s information assets to any unauthorized person. This includes, but is not limited to, the design, programming techniques, flow charts, source code, screens, documentation or intellectual capital created, licensed or owned by SFDPH. I agree to forward any request for such information to my supervisor and/or the SFDPH Public Information Officer.
Information Assets. The Company and its Subsidiaries have implemented commercially reasonable practices to ensure the physical and electronic protection of its information assets from unauthorized disclosure, use or modification. There has been no breach of security involving any information assets.
Information Assets. (a) The Disclosure Schedule sets forth a list of all of the United States, Australian, Canadian, European and Pacific rim Trademark registrations and applications maintained by the Sellers and all United States, Australian, Canadian, European, Pacific rim issued patents and patent applications maintained by the Sellers, included in the Purchased Assets (the "Intellectual Property"), and other Trademark registrations and applications, included in the Purchased Assets, and other issued patents and patent applications, and U.S. copyright registrations, in each case owned by the Sellers. To the Knowledge of Sellers, all of such Intellectual Property registrations are valid and subsisting, all pending applications for such Intellectual Property are live and all maintenance, renewal and other fees relating to such registrations or applications are current, in each case, in all material respects. As defined herein, Intellectual Property includes all Trademark registrations and applications that Sellers currently use.
(b) Except as set forth in the Disclosure Schedule, each Seller owns the entire right, title and interest in and to each item of Intellectual Property which it purports to own. Each Seller owns or possesses adequate licenses or other rights to use all other items of Information Assets used by such Seller. No Seller has received written notice alleging that it is infringing on the intellectual property rights of others. There are no material claims, demands or proceedings instituted or pending or, to the Knowledge of Sellers, threatened by any Person contesting or challenging the right of any Seller to use any Information Assets which, if adversely determined, would be materially adverse to the Sellers' U.S. wholesale business, the Purchased Assets or the Purchased Stores. To the Knowledge of Sellers, there are no material registered patents, trademarks, trade names or copyrights owned by a Person other than the Sellers which any Seller is using without license to do so. To the Knowledge of Sellers, no Person is infringing in any material respect on any item of Information Assets which is material to the operation of the Sellers' U.S. wholesale business, the Purchased Assets or the Purchased Stores in the ordinary course of business consistent with past practice.
