Safeguarding of State Data Sample Clauses

Safeguarding of State Data. (i) Contractor shall maintain a comprehensive data security program, which shall include reasonable and appropriate technical, organizational and security measures against the destruction, loss, unauthorized access or alteration of State Data in the possession of Contractor, and which shall be (A) no less rigorous than those maintained (or required to be maintained) by State or the relevant state agency (or required or implemented by State or the relevant state agency in the future to the extent deemed necessary by State or such state agency and communicated to Contractor), (B) no less rigorous than those maintained by Contractor for its own information of a similar nature, (C) no less rigorous than accepted security standards in the industry (including but not limited to the Payment Card Industry’s Data Security Standard (PCI DSS)), and (D) (without limiting the Parties' obligations under Section 18Compliance with Laws) compliant with all applicable State Rules and State Standards, including the requirements of State's and the relevant state agency’s then-current privacy, security and records retention policies (such as Internal Revenue Service guidelines contained within IRS Publication 1075 (found at xxxx://xxx.xxx.xxx/pub/irs-pdf/p1075.pdf). Contractor acknowledges and agrees that certain state agencies are legally prohibited from disclosing or allowing access to certain State Data, including disclosures to and access by the State Information Technology Services Division (SITSD), other state agencies and Contractor. The content and implementation of such data security program and associated technical, organizational and security measures shall be fully documented by Contractor in the Operating Manual, including the process state agencies shall follow to identify State Data they are legally prohibited from disclosing and the confidentiality requirements of state agencies. Contractor shall permit legislative auditors and State security personnel to review such documentation and/or to inspect Contractor’s compliance with these provisions in accordance with this Section 26.3(b)(i). State acknowledges that elements of Contractor’s data security program involve customized services offerings regarding the specific means and levels of security protection selected by a customer (regarding, for example, desired levels of host and network intrusion detection services, methods for monitoring and limiting access to data, extent of desired encryption, etc.), and ...
AutoNDA by SimpleDocs

Related to Safeguarding of State Data

  • Limitation on Out-of-State Litigation - Texas Business and Commerce Code § 272 This is a requirement of the TIPS Contract and is non-negotiable. Texas Business and Commerce Code § 272 prohibits a construction contract, or an agreement collateral to or affecting the construction contract, from containing a provision making the contract or agreement, or any conflict arising under the contract or agreement, subject to another state’s law, litigation in the courts of another state, or arbitration in another state. If included in Texas construction contracts, such provisions are voidable by a party obligated by the contract or agreement to perform the work. By submission of this proposal, Vendor acknowledges this law and if Vendor enters into a construction contract with a Texas TIPS Member under this procurement, Vendor certifies compliance.

  • DESTRUCTION OF STATE DATA At any time during the term of this Contract within thirty days of

  • Security of State Information To the extent Contractor shall have access to, processes, handles, collects, transmits, stores or otherwise deals with State Data, the Contractor represents and warrants that it has implemented and it shall maintain during the term of this Master Agreement the highest industry standard administrative, technical, and physical safeguards and controls consistent with NIST Special Publication 800-53 (version 4 or higher) and Federal Information Processing Standards Publication 200 and designed to (i) ensure the security and confidentiality of State Data; (ii) protect against any anticipated security threats or hazards to the security or integrity of the State Data; and (iii) protect against unauthorized access to or use of State Data. Such measures shall include at a minimum: (1) access controls on information systems, including controls to authenticate and permit access to State Data only to authorized individuals and controls to prevent the Contractor employees from providing State Data to unauthorized individuals who may seek to obtain this information (whether through fraudulent means or otherwise); (2) industry-standard firewall protection; (3) encryption of electronic State Data while in transit from the Contractor networks to external networks; (4) measures to store in a secure fashion all State Data which shall include multiple levels of authentication; (5) dual control procedures, segregation of duties, and pre-employment criminal background checks for employees with responsibilities for or access to State Data; (6) measures to ensure that the State Data shall not be altered or corrupted without the prior written consent of the State; (7) measures to protect against destruction, loss or damage of State Data due to potential environmental hazards, such as fire and water damage; (8) staff training to implement the information security measures; and (9) monitoring of the security of any portions of the Contractor systems that are used in the provision of the services against intrusion on a twenty-four (24) hour a day basis.

  • Certification Regarding Use of State Funds If Party is an employer and this Agreement is a State-funded grant in excess of $1,001, Party certifies that none of these State funds will be used to interfere with or restrain the exercise of Party’s employee’s rights with respect to unionization.

  • Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls:

  • Provision of Statistics The aeronautical authorities of each Contracting Party shall, on request, provide such periodic or other statements of statistics as may be reasonably required for the purpose of reviewing the capacity provided on the agreed services by the designated airlines of that Contracting Party to the aeronautical authorities of the other Contracting Party. Such statements shall include all information required to determine the amount of traffic carried by those airlines on the agreed services and the origins and destinations of such traffic.

  • Summary of State Ethics Laws Pursuant to the requirements of section 1-101qq of the Connecticut General Statutes, the summary of State ethics laws developed by the State Ethics Commission pursuant to section 1-81b of the Connecticut General Statutes is incorporated by reference into and made a part of the Contract as if the summary had been fully set forth in the Contract.

  • Provisions for Covered Entity to Inform Business Associate of Privacy Practices and Restrictions (a) Covered Entity shall notify Business Associate of any limitation(s) in the notice of privacy practices of Covered Entity under 45 CFR 164.520, to the extent that such limitation may affect Business Associate’s use or disclosure of protected health information.

  • Confidentiality of State Information The Contractor understands and agrees that data, materials, and information disclosed to the Contractor may contain confidential and protected information. The Contractor covenants that data, material, and information gathered, based upon or disclosed to the Contractor for the purpose of this Contract will not be disclosed to or discussed with third parties without the prior written consent of the State. The parties acknowledge that the services to be performed by Contractor for the State under this Contract may require or allow access to data, materials, and information containing Social Security numbers maintained by the State in its computer system or other records. In addition to the covenant made above in this section and pursuant to 10 IAC 5-3-1(4), the Contractor and the State agree to comply with the provisions of IC § 4-1-10 and IC § 4-1-11. If any Social Security number(s) is/are disclosed by Contractor, Contractor agrees to pay the cost of the notice of disclosure of a breach of the security of the system in addition to any other claims and expenses for which it is liable under the terms of this contract.

  • Provide Data in Compliance with Applicable Laws LEA shall provide Student Data for the purposes of obtaining the Services in compliance with all applicable federal, state, and local privacy laws, rules, and regulations, all as may be amended from time to time.

Time is Money Join Law Insider Premium to draft better contracts faster.