PRIVACY AND SECURITY OF INFORMATION Sample Clauses

PRIVACY AND SECURITY OF INFORMATION. Any information that is obtained about the donor is confidential, and its privacy and security are protected from illegal uses and disclosures in accordance with Federal and Missouri laws. Disclosures will only be made as permitted by law and authorized by the donor or legal representative. AUTHORIZATION FOR DONATION OF BODY Name (Please Print) Street Address: City, State, Zip Code: I hereby donate my body, following my death, to the Department of Pathology and Anatomical Sciences, University of Missouri – Columbia School of Medicine. I have read and understand all of the information contained in this Agreement. The remains of my body shall be cremated and: (Initial applicable statement) Interred at the Memorial Park Cemetery in Columbia, MO, with information about the interment to be provided to (name, address, and phone number): Returned to (name, address, and phone number; please consider identifying several individuals in the event the first named individual cannot be located or has died): I hereby direct that my body be delivered to the University of Missouri–Columbia to be used for educational and research purposed as set forth in this Agreement. Signature of Donor Date Signature of Witness Print Name Relationship to Donor Date If the Donor is physically unable to sign this Authorization, another individual may sign this Authorization which shall be witnessed by two adults, at least one of which shall be a disinterested witness. A “disinterested witness” is a person other than the Donor’s spouse, child, parent, sibling, grandparent, grandchild, or guardian. By signing below, you are indicating that the Donor has authorized and directed the making of this anatomical gift. Signature of Individual Signing at the Direction of Donor Date _ Signature of Disinterested Witness Date Signature of Witness Date NOTICE OF REVOCATION OF AUTHORIZATION FOR DONATION OF BODY I, , hereby revoke my Authorization for Donation of Body, effective immediately. Signature of Donor Date If the Donor is physically unable to sign this Authorization, another individual may sign this Authorization which shall be witnessed by two adults, at least one of which shall be a disinterested witness. A “disinterested witness” is a person other than the Donor’s spouse, child, parent, sibling, grandparent, grandchild, or guardian. By signing below, you are indicating that the Donor has authorized and directed the revocation of this anatomical gift. Signature of Individual Signing at the Dire...
AutoNDA by SimpleDocs
PRIVACY AND SECURITY OF INFORMATION. 6.1. Broker shall assist CGHC in meeting any and all standards as may be imposed by state or federal law or regulation around the security and confidentiality of applicant information and Protected Health Information, as defined under HIPAA. This shall include but not be limited to providing and obtaining confidentiality statements from employees, subcontractors and agents, ensuring the security of applicant data to CGHC’s satisfaction, implementing adequate technological safeguards to prevent unauthorized access or interception of applicant information, and any other protections as may be required consistent with CGHC’s own internal policies and procedures, which shall be furnished to Broker at such time as a change in procedure is requested by CGHC.
PRIVACY AND SECURITY OF INFORMATION. The Contractor shall keep all information relating to any employee or customer of the District in absolute confidence and shall not use the information in connection with any other matters; nor shall it disclose any such information to any other person, firm or corporation, in accordance with the District and federal laws governing the confidentiality of records. The Contractor shall comply with DCHBX’s Privacy and Security Policies for Exchange Operations found on the DC Health Link website and be in compliance with all federal laws including those for exchange operations set forth at 45 C.F.R. 155.260 and security standards consistent with those required for covered entities by 45 CFR Parts 164.306, 164.308, 164.310,164.312, and 164.314.
PRIVACY AND SECURITY OF INFORMATION. Any information that is obtained about the donor is confidential, and its privacy and security are protected from illegal uses and disclosures in accordance with Federal and Missouri laws. Disclosures will only be made as permitted by law and authorized by the donor or legal representative. AUTHORIZATION FOR DONATION OF BODY Name (Please Print) Street Address: City, State, Zip Code: I hereby donate my body, following my death, to the Department of Pathology and Anatomical Sciences, University of Medicine–Columbia School of Medicine. I have read and understand all of the information contained in this Agreement. The remains of my body shall be: (Initial applicable statement) Cremated and interred at the Memorial Park Cemetery in Columbia, MO, with information about the interment to be provided to (name, address, and phone number): Returned to (name, address, and phone number): I hereby direct that my body be delivered to the University of Missouri–Columbia to be used for educational and research purposed as set forth in this Agreement. Signature of Donor Date Signature of Witness Print Name Relationship to Donor Date Signature of Witness Print Name Relationship to Donor Date NOTICE OF REVOCATION OF AUTHORIZATION FOR DONATION OF BODY I, , hereby revoke my Authorization for Donation of Body, effective immediately. Signature of Donor Date
PRIVACY AND SECURITY OF INFORMATION. 1. Information submitted in the report shall be available for public review only to the extent required by federal, state and local law.
PRIVACY AND SECURITY OF INFORMATION eCare Vault’s current Privacy Policy is available here and relates to the collection and use of Personal Data, as defined above. At no point in providing the Services does eCare Vault store or maintain unencrypted ePHI, nor does any of its workforce have routine access to unencrypted ePHI. The most current Privacy Policy will apply to any and all use of the Services. eCare Vault will not intentionally edit, modify, delete or disclose the contents of Personal Data in connection with the Services unless
PRIVACY AND SECURITY OF INFORMATION. 11.1 The Marketing Partner shall at all times comply with the applicable data protection, information security and privacy laws and regulations and any equivalent legislation in any jurisdiction applicable to its Web Property and activities and the provision of the Services under this Agreement. If necessary, the Marketing Partner shall obtain all necessary consents for provision of any data by the Marketing Partner to StoneX in carrying out its obligations under this Agreement. The Marketing Partner shall not do anything or omit to do anything that will or may cause StoneX to be in breach of any provision or requirement under any Applicable Laws relating to data protection, information security or privacy.
AutoNDA by SimpleDocs
PRIVACY AND SECURITY OF INFORMATION. 12.1 The Affiliate shall at all times comply with the applicable data protection, information security and privacy laws and regulations and any equivalent legislation in any jurisdiction applicable to its websites and activities and the performance of its obligations under this Agreement. If necessary, the Affiliate shall obtain all necessary consents for provision of any data by the Affiliate to the GAIN Group in carrying out its obligations under this Agreement. The Affiliate shall not do anything or omit to do anything that will cause the GAIN Group to be in breach of any provision or requirement under any Applicable Law relating to data protection, information security and privacy.
PRIVACY AND SECURITY OF INFORMATION 

Related to PRIVACY AND SECURITY OF INFORMATION

  • Security of Information Unless otherwise specifically authorized by the DOH Chief Information Security Officer, Contractor receiving confidential information under this contract assures that: • Encryption is selected and applied using industry standard algorithms validated by the National Institute of Standards and Technology (NIST) Cryptographic Algorithm Validation Program against all information stored locally and off-site. Information must be encrypted both in-transit and at rest and applied in such a way that it renders data unusable to anyone but authorized personnel, and the confidential process, encryption key or other means to decipher the information is protected from unauthorized access. • It is compliant with the applicable provisions of the Washington State Office of the Chief Information Officer (OCIO) policy 141, Securing Information Technology Assets, available at: xxxxx://xxxx.xx.xxx/policy/securing-information-technology-assets. • It will provide DOH copies of its IT security policies, practices and procedures upon the request of the DOH Chief Information Security Officer. • DOH may at any time conduct an audit of the Contractor’s security practices and/or infrastructure to assure compliance with the security requirements of this contract. • It has implemented physical, electronic and administrative safeguards that are consistent with OCIO security standard 141.10 and ISB IT guidelines to prevent unauthorized access, use, modification or disclosure of DOH Confidential Information in any form. This includes, but is not limited to, restricting access to specifically authorized individuals and services through the use of: o Documented access authorization and change control procedures; o Card key systems that restrict, monitor and log access; o Locked racks for the storage of servers that contain Confidential Information or use AES encryption (key lengths of 256 bits or greater) to protect confidential data at rest, standard algorithms validated by the National Institute of Standards and Technology (NIST) Cryptographic Algorithm Validation Program (CMVP); o Documented patch management practices that assure all network systems are running critical security updates within 6 days of release when the exploit is in the wild, and within 30 days of release for all others; o Documented anti-virus strategies that assure all systems are running the most current anti-virus signatures within 1 day of release; o Complex passwords that are systematically enforced and password expiration not to exceed 120 days, dependent user authentication types as defined in OCIO security standards; o Strong multi-factor authentication mechanisms that assure the identity of individuals who access Confidential Information; o Account lock-out after 5 failed authentication attempts for a minimum of 15 minutes, or for Confidential Information, until administrator reset; o AES encryption (using key lengths 128 bits or greater) session for all data transmissions, standard algorithms validated by NIST CMVP; o Firewall rules and network address translation that isolate database servers from web servers and public networks; o Regular review of firewall rules and configurations to assure compliance with authorization and change control procedures; o Log management and intrusion detection/prevention systems; o A documented and tested incident response plan Any breach of this clause may result in termination of the contract and the demand for return of all personal information.

  • Privacy of Information Subject to clauses 19.2 and 23 of this contract we must keep your information about you confidential in accordance with the Privacy Act 1988 (Cth).

  • Contact Information for Privacy and Security Officers and Reports 2.1 Business Associate shall provide, within ten (10) days of the execution of this Agreement, written notice to the Contract or Grant manager the names and contact information of both the HIPAA Privacy Officer and HIPAA Security Officer of the Business Associate. This information must be updated by Business Associate any time these contacts change.

  • Identification and Disclosure of Privacy and Security Offices Business Associate and Subcontractors shall provide, within ten (10) days of the execution of this agreement, written notice to the Covered Entity’s contract/grant manager the names and contact information of both the HIPAA Privacy Officer and HIPAA Security Officer. This information must be updated any time either of these contacts changes.

  • PERSONAL INFORMATION PRIVACY AND SECURITY CONTRACT 11 Any reference to statutory, regulatory, or contractual language herein shall be to such language as in 12 effect or as amended.

  • Accessibility of Information Technology Contractor represents and warrants that any software/ hardware/ communications system/ equipment (collectively “technology”), if any, provided under this Agreement adheres to the standards and/or specifications as may be set forth in the Section 508 of the Rehabilitation Act of 1973 standards guide and is fully compliant with WCAG 2.0 AA standards for accessibility and compliant with any applicable FCC regulations. Technology that will be used on a mobile device must also be navigable with Voiceover on iOS devices in addition to meeting WCAG 2.0 level AA. If portions of the technology or user experience are alleged to be non-compliant or non- accessible at any point, District will provide Contractor with notice of such allegation and Contractor shall use its best efforts to make the technology compliant and accessible. If a state or federal department, office or regulatory agency, or if any other third party administrative agency or organization (“Claimants”), make a claim, allegation, initiates legal or regulatory process, or if a court finds or otherwise determines that technology is non-compliant or non-accessible, Contractor shall indemnify, defend and hold harmless the District from and against any and all such claims, allegations, liabilities, damages, penalties, fees, costs (including but not limited to reasonable attorneys’ fees), arising out of or related to Xxxxxxxxx’ claims. Contractor shall also fully indemnify District for the full cost of any user accommodation that is found to be necessary due to an identifiable lack of accessibility in the Contractor’s technology. If necessary, an independent 3rd party accessibility firm using POUR standards (Perceivable, Operable, Understandable and Robust) may be used to validate the accessibility of the technology.

  • Use and Protection of Information Recipient agrees to protect such Information of the Discloser provided to Recipient from whatever source from distribution, disclosure or dissemination to anyone except employees of Recipient with a need to know such Information solely in conjunction with Recipient’s analysis of the Information and for no other purpose except as authorized herein or as otherwise authorized in writing by the Discloser. Recipient will not make any copies of the Information inspected by it.

  • Dissemination of Information The Borrower authorizes each Lender to disclose to any Participant or Purchaser or any other Person acquiring an interest in the Loan Documents by operation of law (each a "Transferee") and any prospective Transferee any and all information in such Lender's possession concerning the creditworthiness of the Borrower and its Subsidiaries, including without limitation any information contained in any Reports; provided that each Transferee and prospective Transferee agrees to be bound by Section 9.11 of this Agreement.

  • Security of Confidential Information Each party possessing Confidential Information of the other party will maintain all such Confidential Information under secure conditions, using reasonable security measures and in any event not less than the same security procedures used by such party for the protection of its own Confidential Information of a similar kind.

  • Collection and Use of Information (a) Licensee acknowledges that Licensor may, directly or indirectly through the services of Third Parties, collect and store information regarding use of the Software and about equipment on which the Software is installed or through which it otherwise is accessed and used, through:

Time is Money Join Law Insider Premium to draft better contracts faster.