Technical Safeguards Sample Clauses

Technical Safeguards. 1. USAC and the Department will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data, so unauthorized persons cannot retrieve any data by computer, remote terminal, or other means.
AutoNDA by SimpleDocs
Technical Safeguards. SSA and OPM will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel in a manner that will protect the confidentiality of the data, so that unauthorized persons cannot retrieve any data by computer, remote terminal, or other means. Systems personnel must enter personal identification numbers when accessing data on the agencies’ systems. SSA and OPM will strictly limit authorization to those electronic data areas necessary for the authorized analyst to perform his or her official duties.
Technical Safeguards. SSA and ED will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel in a manner that will protect the confidentiality of the data, so that unauthorized persons cannot retrieve any data by computer, remote terminal, or other means. Systems personnel must enter personal identification numbers when accessing data on the agencies’ systems. SSA and ED will strictly limit authorization to those electronic data areas necessary for the authorized analyst to perform his or her official duties.
Technical Safeguards. Custodian has implemented, and agrees to maintain, commercially reasonable technical safeguards that include, but are not limited to, (i) logical separation of Confidential Information on information systems, (ii) access controls to maintain appropriate segregation of duties and limit access to information resources on a need-to-know and least privileged basis, (iii) complex passwords at least seven characters in length, changed on a regular basis, and stored and transmitted in a secure manner, (iv) device and software management controls to guard against viruses and other malicious or unauthorized software, (v) information system and software patching consistent with manufacturer recommendations, (vi) intrusion detection and prevention systems to guard against unauthorized information system access, (vii) encryption of Confidential Information transmitted across unsecure or public networks including enforcement of Transport Layer Security1 for e-mail exchanged between Custodian and the Funds, (viii) encryption of Confidential Information stored on mobile media, and mobile electronic devices, and (ix) audit logging that records user and system activities.
Technical Safeguards. “Technical Safeguards” shall mean the Standards for the Protection of Electronic Protected Health Information at 45 CFR §164.312.
Technical Safeguards. 1. USAC and DHHS will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data, so unauthorized persons cannot retrieve any data by computer, remote terminal, or other means.
Technical Safeguards. CMS and VHA will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data in such a way that unauthorized persons cannot retrieve any such data by means of computer, remote terminal, or other means. Systems personnel must enter personal identification numbers when accessing data on a party's systems. VHA and CMS will strictly limit authorization to those electronic data areas necessary for the authorized analyst to perform his or her official duties.
AutoNDA by SimpleDocs
Technical Safeguards. The Service Provider has implemented, and agrees to maintain, commercially reasonable technical safeguards that include, but are not limited to, (i) logical separation of Confidential Information and Personal Data on information systems, (ii) access controls to maintain appropriate segregation of duties and limit access to information resources on a need-to-know and least privileged basis, (iii) complex passwords at least seven characters in length or pass phrases, changed on a regular basis, and stored and transmitted in a secure manner, (iv) device and software management controls to guard against viruses and other malicious or unauthorized software, (v) information system and software patching consistent with manufacturer recommendations, (vi) intrusion detection and prevention systems to guard against unauthorized information system access, (vii) encryption of Confidential Information and Personal Data at rest and transmitted across unsecure or public networks including enforcement of Transport Layer Security1for e-mail exchanged between Service Provider and the Client, (viii) encryption of Confidential Information and Personal Data stored on mobile media, and mobile electronic devices, and (ix) audit logging that records user and system activities.
Technical Safeguards. 1. USAC and DSS will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data, so unauthorized persons cannot retrieve any data by computer, remote terminal, or other means.
Technical Safeguards. SSA and VA/VHA will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel in a manner that will protect the confidentiality of the data, so that unauthorized persons cannot retrieve any data by computer, remote terminal, or other means. Systems personnel must enter personal identification numbers when accessing data on the agencies’ systems. SSA and VA/VHA will strictly limit authorization to those electronic data areas necessary for the authorized analyst to perform his or her official duties.
Time is Money Join Law Insider Premium to draft better contracts faster.