PERSONAL INFORMATION PRIVACY AND SECURITY CONTRACT 11 Any reference to statutory, regulatory, or contractual language herein shall be to such language as in 12 effect or as amended. 13 A. DEFINITIONS
Operator’s Security Contact Information ▇▇▇▇▇▇▇ ▇. ▇▇▇▇▇▇▇ Named Security Contact ▇▇▇▇▇▇▇▇@▇▇▇▇▇▇▇▇▇.▇▇▇ Email of Security Contact (▇▇▇) ▇▇▇-▇▇▇▇ Phone Number of Security Contact
Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.
Security Controls Annually, upon Fund’s reasonable request, DST shall provide Fund’s Chief Information Security Officer or his or her designee with a summary of its corporate information security policy and an opportunity to discuss DST’s information security measures, and a high level and non-confidential summary of any penetration testing related to the provision of in-scope services . DST shall review its Security Policy annually.
Covenant to Provide Financial Information and Maintain Sufficient Capital The Administrator shall obtain and maintain the necessary capital to fulfill its obligations under this Agreement and shall remain solvent. The Administrator will report to the Issuer on a semi-annual basis its current and total assets, current and total liabilities, and total equity and the Company intends to include such amounts in its SEC reports.