Data Integrity and Back up Procedures Sample Clauses

Data Integrity and Back up Procedures. Each Contractor shall anticipate and prepare for the loss of information processing capabilities. The routine backing up of all data and software is required to recover from losses or outages of the computer system. Data and software essential to the continued operation of Contractor functions must be backed up. The security controls over the backup resources shall be as stringent as the protection required of the primary resources. A copy of the backed-up data shall be stored in a secure, offsite location.
AutoNDA by SimpleDocs
Data Integrity and Back up Procedures. The Sub-Recipient shall anticipate and prepare for the loss of information processing capabilities. The routine backing up of all data and software is required to recover from losses or outages of the computer system. Data and software essential to the continued operation of Sub-Recipient functions must be backed up. The security controls over the backup resources shall be as stringent as the protection required of the primary resources. A copy of the backup data shall be stored in a secure, offsite location.

Related to Data Integrity and Back up Procedures

  • Data Integrity Contractor shall implement policies and procedures reasonably intended to ensure that Protected Health Information and Personally Identifiable Information in its possession is complete, accurate, and current, to the extent necessary for the Contractor’s intended purposes, and has not been altered or destroyed in an unauthorized manner.

  • Drug Testing Procedures a. The testing procedures and safeguards provided in this policy shall be adhered to by any laboratory personnel administering departmental drug tests.

  • AML/KYC Procedures “AML/KYC Procedures” means the customer due diligence (CDD) procedures of a Reporting Financial Institution pursuant to the anti-money laundering or similar requirements of the jurisdiction concerned to which such Reporting Financial Institution is subject.

  • Reporting Procedures Enter in the XXX Entity Management area the information that XXX requires about each proceeding described in paragraph 2 of this award term and condition. You do not need to submit the information a second time under assistance awards that you received if you already provided the information through XXX because you were required to do so under Federal procurement contracts that you were awarded.

  • Testing Procedures Testing will be conducted by an outside certified Agency in such a way to ensure maximum accuracy and reliability by using the techniques, chain of custody procedures, equipment and laboratory facilities which have been approved by the U.S. Department of Health and Human Services. All employees notified of a positive controlled substance or alcohol test result may request an independent test of their split sample at the employee’s expense. If the test result is negative the Employer will reimburse the employee for the cost of the split sample test.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • POST ONLINE PUBLIC AUCTION PROCEDURES 4.1. Successful E-bidders shall and undertake to sign the Memorandum of Sale at the office of the Auctioneer within 3 working days from the date of auction, failing which the deposit paid will be forfeited to the Assignee bank and the sale will be deemed cancelled/terminated and the property may be put up again for subsequent auction without further notice to the said E-Bidders. The Auctioneer shall send the Memorandum of Sale for stamping and thereafter forward the same together with the required deposit paid under Clause 2.4 above and the differential sum paid under this clause (if any) to the Assignee bank.

  • Information Safeguards Business Associate will develop, document, implement, maintain and use appropriate administrative, technical and physical safeguards to preserve the integrity and confidentiality of and to prevent non-permitted use or disclosure of PHI created for or received from Recipient or its Subsidiaries. These safeguards must be appropriate to the size and complexity of Business Associate’s operations and the nature and scope of its activities. Business Associate agrees that these safeguards will meet any applicable requirements set forth by the U.S. Department of Health and Human Services, including (as of the effective date or as of the compliance date, whichever is applicable) any requirements set forth in the final HIPAA security regulations. Business Associate agrees to mitigate, to the extent practicable, any harmful effect that is known to Business Associate resulting from a use or disclosure of PHI by Business Associate in violation of the requirements of this Addendum.

  • System Security and Data Safeguards When SAP is given access to Licensee’s systems and data, SAP shall comply with Licensee’s reasonable administrative, technical, and physical safeguards to protect such data and guard against unauthorized access. In connection with such access, Licensee shall be responsible for providing Consultants with user authorizations and passwords to access its systems and revoking such authorizations and terminating such access, as Licensee deems appropriate from time to time. Licensee shall not grant SAP access to Licensee systems or personal information (of Licensee or any third party) unless such access is essential for the performance of Services under the Agreement. The parties agree that no breach of this provision shall be deemed to have occurred in the event of SAP non-conformance with the aforementioned safeguard but where no personal information has been compromised.

  • Data Quality 4.1 Each party ensures that the shared Personal Data is accurate.

Time is Money Join Law Insider Premium to draft better contracts faster.