Security Documentation. IHS systems have been certified and accredited and have appropriate supporting documents, including Risk Assessment Reports and System Security Plans. • Members may purchase commercial off-the-shelf (COTS) software and/or rely on custom software development for programming purposes. In such cases, Members must rely upon security documentation, certification and 20 accreditation, if any, of such commercial vendors, consultants, or internal staff. • Describes IHS’s role as a business associate
Appears in 2 contracts
Sources: Multi Purpose Agreement, Multi Purpose Agreement (Mpa)
Security Documentation. IHS systems have been certified and accredited and have appropriate supporting documents, including Risk Assessment Reports and System Security Plans. • – Members may purchase commercial off-the-shelf (COTS) software and/or rely on custom software development for programming purposes. In such cases, Members must rely upon security documentation, certification and 20 accreditation, if any, of such commercial vendors, consultants, or internal staff. • Describes IHS’s role as a business associate– Members are responsible for following IHS methods and procedures to connect or upload to IHS data systems.
Appears in 1 contract
Sources: Multi Purpose Agreement (Mpa)