Security Codes and Passwords Clause Samples

Security Codes and Passwords. Business Associate agrees that its employees will only use their access security codes or passwords to perform their duties under this BAA and that employees are strictly prohibited from disclosing their security codes or passwords to anyone, including family, friends, fellow workers (other than the system security administrator), supervisors, and subordinates for any reason. Business Associate agrees its employees will keep their security codes and passwords in confidence and not misuse or attempt to alter Covered Entity's Information System in any way.
Security Codes and Passwords. Physician Office agrees that its Authorized Users will only use their access security codes or passwords to perform their duties under this Agreement and that Authorized Users are strictly prohibited from disclosing their security codes or passwords to anyone, including family, friends, fellow workers, supervisors, and subordinates for any reason. Physician Offices agrees its Authorized Users will keep their security codes and passwords in confidence.

Related to Security Codes and Passwords

  • Usernames and Passwords 1. Staff will not share usernames and passwords with anyone, including supervisors and technical support staff. 2. In the event that staff suspect their password is compromised or known to others, staff will change their password and notify their supervisor immediately.

  • Passwords Passwords are an important aspect of computer security. A poorly chosen password may result in unauthorized access and/or exploitation of Placer County’s resources. All users, including contractors and vendors with access to the County’s systems, are responsible for the creation and protection of passwords and additionally any updates to County Password policies must be followed. Users must not use the same password for Placer County accounts and personal accounts. The reliability of passwords for maintaining confidentiality cannot be guaranteed. Always assume that someone, in addition to the intended or designated recipient, may read any and all messages and files. Any user suspecting that his/her password may have been compromised must, without delay, report the incident to Placer County IT. 10.2.4.1 Passwords must never be shared or disclosed. If a password is accidentally exposed or suspected of exposure, the password should be changed immediately. 10.2.4.2 All passwords must be changed on a specified, periodic basis. 10.2.4.3 Default passwords provided by the vendor for access to applications/systems on the network must be changed to unique and secret passwords. 10.2.4.4 Immediately inform the Information Technology Service Desk when user accounts are no longer required or will not be used for a period of 30 days or more. 10.2.4.5 All accounts not used for 90 days will be automatically disabled.

  • Accessibility of Information Technology Contractor represents and warrants that any software/ hardware/ communications system/ equipment (collectively “technology”), if any, provided under this Agreement adheres to the standards and/or specifications as may be set forth in the Section 508 of the Rehabilitation Act of 1973 standards guide and is fully compliant with WCAG 2.0 AA standards for accessibility and compliant with any applicable FCC regulations. Technology that will be used on a mobile device must also be navigable with Voiceover on iOS devices in addition to meeting WCAG 2.0 level AA. If portions of the technology or user experience are alleged to be non-compliant or non- accessible at any point, District will provide Contractor with notice of such allegation and Contractor shall use its best efforts to make the technology compliant and accessible. If a state or federal department, office or regulatory agency, or if any other third party administrative agency or organization (“Claimants”), make a claim, allegation, initiates legal or regulatory process, or if a court finds or otherwise determines that technology is non-compliant or non-accessible, Contractor shall indemnify, defend and hold harmless the District from and against any and all such claims, allegations, liabilities, damages, penalties, fees, costs (including but not limited to reasonable attorneys’ fees), arising out of or related to ▇▇▇▇▇▇▇▇▇’ claims. Contractor shall also fully indemnify District for the full cost of any user accommodation that is found to be necessary due to an identifiable lack of accessibility in the Contractor’s technology. If necessary, an independent 3rd party accessibility firm using POUR standards (Perceivable, Operable, Understandable and Robust) may be used to validate the accessibility of the technology.

  • Preservation of Information; Communications to Holders The Trustee shall preserve, in as current a form as is reasonably practicable, the names and addresses of Holders contained in the most recent list furnished to the Trustee as provided in Section 701 and the names and addresses of Holders received by the Trustee in its capacity as Security Registrar. The Trustee may destroy any list furnished to it as provided in Section 701 upon receipt of a new list so furnished. The rights of Holders to communicate with other Holders with respect to their rights under this Indenture or under the Securities, and the corresponding rights and privileges of the Trustee, shall be as provided by the Trust Indenture Act. Every Holder of Securities, by receiving and holding the same, agrees with the Company and the Trustee that neither the Company nor the Trustee nor any agent of either of them shall be held accountable by reason of any disclosure of information as to names and addresses of Holders made pursuant to the Trust Indenture Act.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store County PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Security Office.