Information Integrity and Security Sample Clauses

Information Integrity and Security. Contractor shall immediately notify County of any known or suspected breach of personal, sensitive and confidential information related to Contractor’s work under this Agreement.
AutoNDA by SimpleDocs
Information Integrity and Security. A. Information Assets SUBRECIPIENT shall have in place operational policies, procedures, and practices to protect State information assets including those assets used to store or access Personal Health Information (PHI), Personal Information (PI), and any information protected under the Health Insurance Portability and Accountability Act (HIPPA) (i.e., public, confidential, sensitive and/or personal information) as specified in the State Administrative Manual, Section 5300 to 5365.3; Cal. Gov. Code § 11019.9; DGS Management Memo 06-12; DOF Budget Letter 06-34; and CDA Program Memorandum 07-18 Protection of Information Assets. Information assets include (but are not limited to):
Information Integrity and Security. A. Information Assets The Contractor, and its Subcontractors/Vendors, shall have in place operational policies, procedures, and practices to protect State information assets, including those assets used to store or access Personal Health Information (PHI), Personal Information (PI) and any information protected under the Health Insurance Portability and Accountability Act (HIPAA), (i.e., public, confidential, sensitive and/or personal identifying information) herein referred to as Personal, Sensitive and Confidential Information (PSCI) as specified in the State Administrative Manual, 5300 to 5365.3; Cal. Gov. Code § 11019.9, DGS Management Memo 06-12; DOF Budget Letter 06-34; and CDA Program Memorandum 07-18 Protection of Information Assets and the Statewide Health Information Policy Manual. Information assets may be in hard copy or electronic format and may include but is not limited to:
Information Integrity and Security. A. Information Assets The Contractor, and its Subcontractors/Vendors, shall have in place operational policies, procedures, and practices to protect State information assets, including those assets used to store or access Personal Health Information (PHI), Personal Information (PI) and any information protected under the Health Insurance Portability and Accountability Act (HIPAA), (i.e., public, confidential, sensitive and/or personal identifying information) as specified in the State Administrative Manual, 5300 to 5365.3; Cal. Gov. Code § 11019.9, DGS Management Memo 06-12; DOF Budget Letter 06-34; and CDA Program Memorandum 07-18 Protection of Information Assets and the Statewide Health Information Policy Manual. Information assets may be in hard copy or electronic format and may include but is not limited to:
Information Integrity and Security. 1. Information Assets. Subrecipient shall have in place operational policies, procedures, and practices to protect State information assets including those assets used to store or access Personal Health Information (PHI), Personal Information (PI), and any information protected under the Health Insurance Portability and Accountability Act (HIPAA) (i.e., public, confidential, sensitive and/or personal information) herein referred to as Personal, Sensitive and Confidential Information (PSCI) as specified in the State Administrative Manual, Section 5300 to 5365.3; Cal. Gov. Code § 11019.9; DGS Management Memo 06-12; DOF Budget Letter 06-34; and CDA Program Memorandum 07-18 Protection of Information Assets and the Statewide Health Information Policy Manual.
Information Integrity and Security. A. Contractor ensures that personal, sensitive and confidential information is protected from inappropriate or unauthorized access or disclosure in accordance with Welfare and Institutions Code Section 10850, LCDSS MEDS Data Privacy and Security Agreement, Lake County Information Security Policy, Health Insurance Portability and Accountability Act (HIPAA), and all other applicable laws, regulations and policies.
Information Integrity and Security. A. Information Assets The Contractor shall have in place operational policies, procedures, and practices to protect State information assets, i.e., public, confidential, sensitive and/or personal information as specified in State Administrative Manual, Section 4841.2., GC Section 11019, Department of Finance (DOF) Management Memo 06-12, and DOF Budget Letter 06-34). Information assets include (but are not limited to):
AutoNDA by SimpleDocs
Information Integrity and Security. A. Information Assets CONTRACTOR shall have in place operational policies, procedures, and practices to protect State information assets (i.e., public, confidential, sensitive and/or personal information) as specified in the State Administrative Manual, Section 5300 to 5365.3; Cal. Gov. Code § 11019.9; DGS Management Memo 06-12; DOF Budget Letter 06-34; and CDA Program Memorandum 07-18 Protection of Information Assets. Information assets include (but are not limited to):
Information Integrity and Security. Contractor shall immediately notify County of any known or suspected breach of personal, sensitive and confidential r this Agreement.
Information Integrity and Security. Subsection 453(m) of the Social Security Act contains requirements to ensure information integrity and security safeguards as follows: The Secretary shall establish and implement safeguards with respect to the entities established under this section designed to – (1) ensure the accuracy and completeness of information in the Federal Parent Locator Service; and (2) restrict access to confidential information in the Federal Parent Locator Service to authorized persons, and restrict use of such information to authorized purposes. 42 U.S.C. § 653(m). In accordance with subsection 453(m)(1) of the Social Security Act, OCSE ensures the accuracy and completeness of information in the Federal Parent Locator Service, which includes the NDNH. OCSE verifies the accuracy of name and Social Security number combinations maintained by OCSE using Social Security Administration processes in accordance with subsections 453(j)(1)(A) and (B) of the Social Security Act. 42 U.S.C. § 653(j)(1)(A) and (B). A record reported to the NDNH is considered “verified” if the name and Social Security number combination has a corresponding name and Social Security number combination within Social Security Administration databases.
Time is Money Join Law Insider Premium to draft better contracts faster.