Application Access Sample Clauses

Application Access. All systems accessible via the internet must employ security controls to prevent access to the application via an asset not approved or owned by the county.  Risk Assessment. Application Service Providers hosting data for HIPAA covered services must conduct an accurate and thorough Risk Assessment as required by HIPAA Security Rule, Security Management (§ 164.308(a)(1)). Further, they must follow the risk assessment methodology, based on the latest version of NIST SP 800-30 (xxxx://xxxx.xxxx.xxx/publications/nistpubs/800-30-rev1/sp800_30_r1.pdf). Upon request, the Risk Assessment findings and remediation strategy must be shared with OCHCA.  NIST. To ensure compliance with HIPAA, Application Service Providers shall implement appropriate security safeguards by following National Institute of Standards and Technology (NIST) guidelines.
AutoNDA by SimpleDocs
Application Access. Customer may access the ClearGov Apps via Customer’s Account to utilize the functionality provided within such ClearGov Apps; and
Application Access. All systems accessible via the internet must employ security controls 2 to prevent access to the application via an asset not approved or owned by the county.
Application Access. All systems accessible via the internet must employ security controls to prevent access to the application via an asset not approved or owned by the county. • Risk Assessment. Application Service Providers hosting data for HIPAA covered services must conduct an accurate and thorough Risk Assessment as required by HIPAA Security Rule, Security Management (§ 164.308(a)(1)). Further, they must follow the risk assessment methodology, based on the latest version of NIST SP 800-30 (xxxx://xxxx.xxxx.xxx/publications/nistpubs/800-30- County of Orange Health Care Agency 41 MA-042-16011679 Environmental Health Data Management System rev1/sp800_30_r1.pdf). Upon request, the Risk Assessment findings and remediation strategy must be shared with XXXXX. • NIST. To ensure compliance with HIPAA, Application Service Providers shall implement appropriate security safeguards by following National Institute of Standards and Technology (NIST) guidelines.
Application Access. All systems accessible via the internet must employ security controls to prevent access to the application via an asset not approved or owned by the county. Risk Assessment. Application Service Providers hosting data for HIPAA covered services must conduct an accurate and thorough Risk Assessment as required by HIPAA Security Rule, Security Management (§ 164.308(a)(1)). Further, they must follow the risk assessment methodology, based on the latest version of NIST SP 800-30 (xxxx://xxxx.xxxx.xxx/publications/nistpubs/800-30-rev1/sp800_30_r1.pdf). Upon request, the Risk Assessment findings and remediation strategy must be shared with OCHCA.
Application Access. (a) Client and Client’s Users will have access to the Provider Application and related systems and data for the purpose of accessing the services provided under Client's Agreement with the Provider. Access to and use of the Provider Application will require Internet access and certain computer hardware and software, which User shall be responsible to provide, operate and maintain at their own expense. Client and its Users shall also be responsible for security of the same. Upon request, Provider shall assist Application User in its efforts to detect or identify security breaches, but shall not be liable in any manner to the User for the failure or inability to detect or identify security breaches. Client and its Users are responsible for all final product set-up and proofing.
Application Access. Oranj™ hereby grants you permission to use the Application as set forth in these Terms of Service, provided that: (i) your use of the Application as permitted is solely for your personal, noncommercial use in connection with your Oranj™ Account; (ii) you will not use the Application in any way that is unlawful, misleading, malicious, or discriminatory; (iii) you will not do anything that could disable, overburden, or impair the proper working of the Application (such as a denial of service attack); and (iv) you will otherwise comply with the terms and conditions of these Terms of Service. You cannot:
AutoNDA by SimpleDocs
Application Access. Provider shall make the Application(s) available over either the Internet or Customer’s intranet to allow the End User to electronically and remotely access the Application(s). You shall provide at your own expense, all necessary telephone lines, Internet connections, equipment, software (including a compatible Web browser), and services for you to effectively access the Application(s). You are responsible for upgrading and configuring your internal systems (e.g., network or Intranet settings, Internet routing, fire walls, and Web browsers) to be and remain compatible with and optimize the performance of the Application(s). You acknowledge that the availability and performance of the Application(s) may be subject to interruption or delay due to causes beyond the reasonable control of Provider. The Application(s) are not the "system of record" for financial information (e.g., balances, transactions, etc.), but rather merely a means to access information. The “system of record” is maintained at the credit card processor. User Codes : Your access to the Application(s) will be controlled by a username and password (collectively referred to as “User Codes”), as well as the authorization approved by the Customer’s program administrator. The User Codes are for your personal use only and you agree not to disclose them to any third party. You are responsible for any damages, losses, costs, or breaches of security incurred or caused by your failure to maintain the confidentiality of your User Codes. You agree to IMMEDIATELY notify both the Provider (using the “Contact Us” link) and your program administrator if you become aware or suspect that your User Codes have been lost, stolen, or compromised in any way, or if you become aware of possible or actual unauthorized use of the Application(s).
Application Access. All systems accessible via the internet must employ security controls to prevent access to the application via an asset not approved or owned by the county. • Risk Assessment. Application Service Providers hosting data for HIPAA covered services must conduct an accurate and thorough Risk Assessment as required by HIPAA Security Rule, Security Management (§ 164.308(a)(1)). Further, they must follow the risk assessment methodology, based on the latest version of NIST SP 800-30 (xxxx://xxxx.xxxx.xxx/publications/nistpubs/800-30- rev1/sp800_30_r1.pdf). Upon request, the Risk Assessment findings and remediation strategy must be shared with XXXXX. • NIST. To ensure compliance with HIPAA, Application Service Providers shall implement appropriate security safeguards by following National Institute of Standards and Technology (NIST) guidelines. ▪ IT Staff Usage Agreement. Vendor agrees that their employees performing services for the County will sign and agree to an IT usage agreement within their own organization as part of an overall security training and awareness program. At a minimum, vendor employees must sign a statement of understanding within their own organization regarding Internet dangers, IT security, and IT ethics and best practices, Vendor’s Acceptable Use Policy is confidential and accessible by Vendor employees only. ▪ Designate a point of contact to facilitate all IT security activities related to services provided to the County, with the allowance of appropriate backups.
Application Access 
Time is Money Join Law Insider Premium to draft better contracts faster.