Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.
Appears in 37 contracts
Samples: Prevention and Obmudsman Services, Prevention and Obmudsman Services, Program Services
Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, lost or stolen. Subrecipient The Contractor, and its Subcontractors/Vendors, must comply with CDA’s security incident reporting procedures procedure located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resourcesxxxxx://xxx.xxxxx.xx.
Appears in 27 contracts
Samples: web2.co.merced.ca.us, web2.co.merced.ca.us, web2.co.merced.ca.us
Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#ResourcesXxxx://Xxxxx.xx.xxx/InformationSecurity and Privacy.
Appears in 15 contracts
Samples: Agreement, Agreement, Prevention and Obmudsman Services
Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient SUBRECIPIENT must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#ResourcesXxxx://Xxxxx.xx.xxx/InformationSecurity and Privacy.
Appears in 12 contracts
Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, lost or stolen. Subrecipient The contractor and its Subcontractors/Vendors, must comply with CDA’s security incident reporting procedures procedure located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resourcesxxxxx://xxx.xxxxx.xx.
Appears in 9 contracts
Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient Contractor must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.
Appears in 5 contracts
Samples: cams.ocgov.com, cams.ocgov.com, cams.ocgov.com
Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, lost or stolen. Subrecipient The Contractor, and its Subcontractors/Vendors, must comply with CDA’s security incident reporting procedures procedure located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.
Appears in 4 contracts
Samples: www.acgov.org, clkrep.lacity.org, web2.co.merced.ca.us
Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed belived to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient SUBRECIPIENT must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#ResourcesXxxx://Xxxxx.xx.xxx/InformationSecurity and Privacy.
Appears in 3 contracts
Samples: Monthly Services Report, Model Contract, cams.ocgov.com
Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.xxxxx://xxx.xxxxx.xx.xxx/Information_Security/Security_Incident_Reporting_Pro cedures/
Appears in 2 contracts
Samples: cams.ocgov.com, cams.ocgov.com
Security Incident Reporting. a. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, lost or stolen. Subrecipient The Service Provider, and its Form 116-105 7/1/2020 Subcontractors/Vendors, must comply with CDA’s security incident reporting procedures reportingsprocedure located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.
Appears in 1 contract
Security Incident Reporting. a. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, lost or stolen. Subrecipient The Service Provider, and its Subcontractors/Vendors, must comply with CDA’s security incident reporting procedures procedure located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.xxxxx://xxx.xxxxx.xx.xxx/Information_Security/Security_Incident_Reporting_Procedures/.
Appears in 1 contract
Samples: Service Provider Agreement
Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient Contractor must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.xxxxx://xxx.xxxxx.xx.xxx/Information_Security/Security_Incident_Reporting_Pro cedures/.
Appears in 1 contract
Samples: cams.ocgov.com
Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient CONTRACTOR must comply with CDA’s report all security incidents COUNTY immediately upon detection. A Security Incident Report (CDA 1025) form must be submitted to the CDA Information Security Officer within five (5) business days of the date the incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resourceswas detected.
Appears in 1 contract
Samples: Model Contract
Security Incident Reporting. a. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, lost or stolen. Subrecipient The Service Provider, and its Subcontractors/Vendors, must comply with CDA’s security incident reporting procedures procedure located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.
Appears in 1 contract
Samples: Service Provider Agreement
Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient The FUNDED PARTNER must comply with report all security incidents to A4AA immediately upon detection. A Security Incident Report form (CDA 1025) must be submitted to CDA’s security , via A4AA, within five (5) business days of the date the incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resourceswas detected.
Appears in 1 contract
Samples: Fiscal Year 2016
Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, lost or stolen. Subrecipient The Contractor, and its Subcontractors/Vendors, must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resourcesprocedure.
Appears in 1 contract
Samples: web2.co.merced.ca.us
Security Incident Reporting. A security incident occurs when CDA information assets are or are reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient The FUNDED PARTNER must comply with report all security incidents to A4AA immediately upon detection. A Security Incident Report form (CDA 1025) must be submitted to CDA’s security , via A4AA, within five (5) business days of the date the incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resourceswas detected.
Appears in 1 contract
Samples: agencyonaging4.org
Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient Contractor must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.. County of Orange Page 3 of 12 Age Well Senior Services, Inc. OC Community Resources MA-012-23010709
Appears in 1 contract
Samples: cams.ocgov.com
Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient must comply with DocuSign Envelope ID: 7CAFB1BB-B16E-416A-A4D1-19CEF63155C6 CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.
Appears in 1 contract
Samples: cams.ocgov.com