Data Security and Confidentiality Sample Clauses

Data Security and Confidentiality. Grantees shall have staff complete CDPH required confidentiality and data security training, and maintain on file associated confidentiality agreements for each staff person with access to confidential public health records and data.
AutoNDA by SimpleDocs
Data Security and Confidentiality. A. NPRQI Program has contracted with Clario (formerly known as BioClinica) to host all confidential data, performance dashboard, and de-identified aggregate performance dashboards of Participant Organizations.
Data Security and Confidentiality. (1) Exhibit A - Data Security Requirements, outlines Vendor responsibility for data/document destruction.
Data Security and Confidentiality. ‌ An LEA may provide education records to the DOR for the performance of transition services but will do so only after the LEA has received the prior written consent of the parent or adult student with educational rights. The DOR shall: (i) keep all personally identifiable information contained in education records confidential; (ii) use education records solely for the purpose of performing this agreement; (iii) disclose education records solely to those employees with a need to know for the purpose of performing this agreement; and (iv) immediately return or confidentially destroy all education records per National Institute of Science and Technology (NIST) Special Publication (SP) 800-88 when no longer needed for the purposes for which it was disclosed. The DOR may provide consumer information to an LEA for the performance of transition services but will do so only after the DOR has received the prior written consent of the consumer. If the consumer is under the age of 18 and is not an emancipated minor, requires the written consent of the parent or guardian. The LEA shall: (i) keep all personally identifiable information contained in consumer records confidential; (ii) use consumer records solely for the purpose of performing this agreement; (iii) disclose consumer records solely to those employees with a need to know for the purpose of performing this agreement; and (iv) immediately destroy all consumer records when no longer needed for the purposes for which it was disclosed. Appropriate steps will be taken to protect confidential information of persons with disabilities, including:
Data Security and Confidentiality. Grantees shall comply with recommendations set forth in CDC’s “Data Security and Confidentiality Guidelines for HIV, Viral Hepatitis, Sexually Transmitted Disease, and Tuberculosis Programs.” xxxx://xxx.xxx.xxx/nchhstp/programintegration/docs/PCSIDataSecurityGuideline s.pdf. Grantees shall have staff complete CDPH required confidentiality and data security training, and maintain on file associated confidentiality agreements for each staff person with access to STD data.
Data Security and Confidentiality. The Contractor will use at least the same degree of care as required by the Payment Card Industry (PCI), not inconsistent with standards and practices codified as ISO 27001 and 27002, to prevent disclosing to third parties the Confidential Information of State of Florida Eligible Users as it employs to avoid unauthorized disclosure, publication or dissemination of its own Confidential Information of like character, but in no event less than reasonable care.
Data Security and Confidentiality. (1) Contractor agrees to abide by the provisions of the FBI Criminal Justice Information Services (CJIS) Security Policy that applies to Electronic Fingerprinting, specifically regarding criminal history background checks on Contractor’s employees and Contractors, as well as the prohibition on dissemination of any confidential information received by the Contractor.
AutoNDA by SimpleDocs
Data Security and Confidentiality. 2.1 IROL warrants and represents to FD that the site is and throughout the term of this agreement will be a secure website with an SSL certification issued by Comodo, an independent Internet security certification company. Site hosting is provided through Microsoft’s Azure (xxxxx.xxxxxxxxx.xxx) on a dedicated IP address.
Data Security and Confidentiality. The ICHP acknowledges that the documents and information provided by KARANDS BUSINESS SERVICES for verification are confidential and sensitive. The ICHP agrees to implement and maintain appropriate security measures to protect against unauthorized access, disclosure, or use of the information. The ICHP further agrees not to use the information for any purpose other than the agreed-upon document verification services.
Data Security and Confidentiality. 3.1. The Data Processor shall implement appropriate technical and organisational measures to safeguard the Personal Data from unauthorised or unlawful processing or accidental loss, destruction or damage in compliance with best industry standards, having regard to the state of technological development and the cost of implementing any measures, such measures shall ensure a level of security appropriate to the harm that might result from unauthorised or unlawful processing or accidental loss, destruction or damage and to the nature of the Personal Data to be protected. Without limiting the foregoing, the Data Processor shall:
Time is Money Join Law Insider Premium to draft better contracts faster.