OPERATIONAL SECURITY CONTROLS Sample Clauses

OPERATIONAL SECURITY CONTROLS. 1. The state CS agency shall restrict access to, and disclosure of, the FPLS information to authorized personnel who need the FPLS information to perform their official duties in connection with the authorized purposes specified in the security agreement. The state CS agency requests submitted to the FPLS are made solely to locate a parent for the purpose of establishing parentage, or establishing, setting the amount of, modifying or enforcing child support obligations, or where applicable, to locate a parent in a parental kidnapping case, establish or enforce a child custody or visitation order, and for other purposes specified in federal law and regulations. The information exchanged between state CS agencies shall be used for authorized purposes and protected against unauthorized access to reduce fraudulent activities and protect the privacy rights of individuals against unauthorized disclosure of confidential information. Policy/Requirements Traceability: Privacy Act 5 U.S.C. 552a (b)(1); 45 CFR 303.3(b)(6); 45 CFR 303.21; and, 45 CFR 307.13(a) and (b), NIST SP 800-53 Rev 4 AC-6 The state CS agency shall restrict access to, and disclosure of, the CS program information to authorized personnel who need the CS program information to perform their official duties in connection with the authorized purposes specified in the security agreement. The information exchanged between state CS agencies and all other state program information must be used for authorized purposes and protected against unauthorized access to reduce fraudulent activities and protect the privacy rights of individuals against unauthorized disclosure of confidential information. Policy/Requirements Traceability: 45 CFR 95.621(f)(2); CFR 303.21(a)(1); 45 CFR 307.13(a) and (b); and Federal Certification Guide, Chapter III, H2, NIST SP 800-53 Rev 4 AC-6
AutoNDA by SimpleDocs
OPERATIONAL SECURITY CONTROLS. 1. The state agency must restrict access to, and disclosure of, the FPLS information to authorized personnel who need the FPLS information to perform their official duties in connection with the authorized purposes specified in the security agreement. The state agency’s requests submitted to the FPLS are made solely to locate a parent for the purpose of establishing parentage, or establishing, setting the amount of, modifying or enforcing child support obligations, or where applicable, to locate a parent in a parental kidnapping case, establish or enforce a child custody or visitation order, and for other purposes specified in federal law and regulations. The information exchanged between state agencies must be used for authorized purposes and protected against unauthorized access to reduce fraudulent activities and protect the privacy rights of individuals against unauthorized disclosure of confidential information. Policy/Requirements Traceability: Privacy Act 5 U.S.C. § 552a (b)(1); 45 C.F.R. §§ 303.3(b)(6), 303.21 and 307.13(a) and (b); NIST SP 800-53 Rev 5, AC-3, AC-6

Related to OPERATIONAL SECURITY CONTROLS

  • Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

  • Security Controls Annually, upon Fund’s reasonable request, Transfer Agent shall provide Fund’s Chief Information Security Officer or his or her designee with a copy of its corporate information security controls that form the basis for Transfer Agent’s Security Policy and an opportunity to discuss Transfer Agent’s information security measures, and a high level summary of any vulnerability testing conducted by Transfer Agent on its information security controls, with a qualified member of Transfer Agent’s information technology management team. Transfer Agent shall review its Security Policy annually.

  • Security Controls for State Agency Data In accordance with Senate Bill 475, Acts 2021, 87th Leg., R.S., pursuant to Texas Government Code, Section 2054.138, Contractor understands, acknowledges, and agrees that if, pursuant to this Contract, Contractor is or will be authorized to access, transmit, use, or store data for System Agency, Contractor is required to meet the security controls the System Agency determines are proportionate with System Agency’s risk under the Contract based on the sensitivity of System Agency’s data and that Contractor must periodically provide to System Agency evidence that Contractor meets the security controls required under the Contract.

  • Additional security requirements The following provisions apply in respect of any Additional Security provided:

  • Audit Controls P. Contractor agrees to an annual system security review by the County to assure that systems processing and/or storing Medi-Cal PII are secure. This includes audits and keeping records for a period of at least three (3) years. A routine procedure for system review to catch unauthorized access to Medi-Cal PII shall be established by the Contractor.

  • Security Compliance Apple will take appropriate steps to ensure compliance with security procedures by its employees, contractors and sub processors and Apple shall ensure that any persons authorized to process Personal Data comply with applicable laws regarding the confidentiality and security of Personal Data with regards to the Service.

  • Operational Control Directing the operation of the Transmission Facilities Under ISO Operational Control to maintain these facilities in a reliable state, as defined by the Reliability Rules. The ISO shall approve operational decisions concerning these facilities, made by each Transmission Owner before the Transmission Owner implements those decisions. In accordance with ISO Procedures, the ISO shall direct each Transmission Owner to take certain actions to restore the system to the Normal State. Operational Control includes security monitoring, adjustment of generation and transmission resources, coordination and approval of changes in transmission status for maintenance, determination of changes in transmission status for reliability, coordination with other Control Areas, voltage reductions and Load Shedding, except that each Transmission Owner continues to physically operate and maintain its facilities.

  • Quality control system (i) The Contractor shall establish a quality control mechanism to ensure compliance with the provisions of this Agreement (the “Quality Assurance Plan” or “QAP”).

  • Compliance Monitoring Grantee must be subject to compliance monitoring during the period of performance in which funds are Expended and up to three years following the closeout of all funds. In order to assure that the program can be adequately monitored, the following is required of Grantee:

  • Paper Document Controls In order to comply with the following paper document controls, the Contractor agrees to:

Time is Money Join Law Insider Premium to draft better contracts faster.