Data Sensitivity Sample Clauses

Data Sensitivity unclassified but Sensitive, up to and including “High” level of sensitivity as defined by National Institute of Standards and Technology (NIST) SP800-60 Volume 2, section D.14.4 “Health Care Delivery Services Information type”.
AutoNDA by SimpleDocs
Data Sensitivity. 4.9.1 Data exchanged between CSD and Contractor must be limited to the data fields included on Data Transfer Rules documents posted on the Provider Website. No personal financial information (e.g., credit card, bank account numbers), shall be stored or exchanged in the data exchange sessions.
Data Sensitivity. The sensitivity of all data filed is Sensitive But Unclassified (SBU).
Data Sensitivity. The data is categorized as Moderate based on FIPS 199 Standards for Security Categorization of Federal Information and Information Systems and the guidance of NIST SP 800-60 Guide for Mapping Types of Information and Information Systems to Security Categories. This data categorization matches the overall system security categorization found in the EGS systems security plan. No classified data shall be exchanged between the two systems. But the data exchanged may be proprietary to the proposal record. The EGS system contains personally identifiable information (PII) and proprietary business information that should be disseminated only to those within your agency with a need to know the information in the course of their official duties. Such information when output in any form from the EGS system must be handled and protected in accordance with applicable federal laws and Executive Orders (including Executive Order 13556 of November 4, 2010, Controlled Unclassified Information and its implementing guidance), as well as agency directives, policies, regulations, standards, and operational requirements. Appropriate means shall be used to protect unauthorized disclosure of proposal data in accordance with all federal laws.
Data Sensitivity. VENDOR and CAFS exchange loan borrower data. For test, the vendor should not provide any data that would be Sensitive-But-Unclassified (SBU). For SOE/production Privacy Act data traverse this connection. Though the data classification is Sensitive-But-Unclassified (SBU), its sensitivity demands strong measures to provide a high level of confidence that is confidentiality, integrity, and availability are preserved
Data Sensitivity. The sensitivity of the data transmitted over the connection is Controlled Unclassified Information (CUI). {Specify the sensitivity level of the information that will be handled through the interconnection, including the highest level of sensitivity involved and the most restrictive protection measures required.}{E.g. Data being transferred contains personal information protected by the Privacy Act of 1974 and sensitive financial information. etc. Include which encryption is being used including the mode of operation, and the package name where applicable.}
Data Sensitivity. Data shared under this Agreement will include unclassified but Sensitive, up to and including “High” level of sensitivity as defined by National Institute of Standards and Technology (NIST) SP800-60 Volume 2, section D.14.4 “Health Care Delivery Services Information type”.
AutoNDA by SimpleDocs
Data Sensitivity. [Enter the sensitivity or classification level of the information to be exchanged, in particular, the highest sensitivity (i.e., Privacy Act, Trade Secret Act, Law Enforcement Sensitive, Sensitive-But-Unclassified, etc.) or classification (Confidential, Secret, Top Secret) and most restrictive protection requirements for information to be handled through the interconnection.]
Data Sensitivity. The sensitivity of data exchanged between HUD and Organization B is personally identifiable information (PII).

Related to Data Sensitivity

  • Contractor Sensitive Information 17.1 The Authority must:

  • Substance Abuse Treatment Information Substance abuse treatment information shall be maintained in compliance with 42 C.F.R. Part 2 if the Party or subcontractor(s) are Part 2 covered programs, or if substance abuse treatment information is received from a Part 2 covered program by the Party or subcontractor(s).

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Safety Orientation All employees shall be certified in Safety Orientation. Safety Orientation shall consist of three parts: PART 1 - the CODC Interactive Rights and Responsibilities course; PART 2 - the XXXX course or equivalent, and PART 3 - Employer or Owner Project Specific Training. It is the responsibility of each employee to hold current certification and maintain certification in part 1 and Part 2. The Employer or Owner shall provide to each Employee before commencing work with PART 3 - Employer or Owner Project Specific Training. Each Employee shall be on the payroll and paid while receiving PART 3 training. As a condition of employment it is the sole responsibility of each and every employee to obtain, hold and maintain all current certification(s) in any and all legislated safety training requirements (i.e. WHMIS, Fall Arrest, etc.) that are trade specific. Supporting documentation of all legislated training must be provided by the employee to the Union prior to dispatch and to the employer upon hire and may be further requested by the employer at any time during the duration of their employment. Prior to the expiration of any certification, the Employer will notify the Employee of the pending expiration and give the Employee reasonable time to renew their certification. Further, prior to arriving at site, employees shall hold current qualification(s) for the specific tasks and equipment identified in the dispatch request. If the employee has to be trained after dispatch, all costs borne by the Employer shall be reimbursed by the Training Fund. The CODC Harassment Policy and Procedures, including the provisions regarding General Harassment and as amended from time to time shall be the minimum standard of this Agreement.

  • Screening Services Disclosure to Applicant Pursuant to MN Statute 504B.173, the tenant screening service that we use is the following: Rental History Reports 0000 X. 00xx Xxxxxx, #000 Xxxxx, XX 00000 (000) 000-0000 Applicant Screening Criteria, upon which the decision to rent to the Applicant is based, will be applied to the information provided in this application and the information gathered from the screening report and/or background check we obtain. If we reject your rental application pursuant to Minnesota Statutes and local laws, we will notify you within 14 days of such rejection, identifying the criteria you failed to meet. We are not obligated to return your application fee or deposit except as provided in MN Statute 504B.173 and local laws.

  • Protocol No action to coerce or censor or penalize any negotiation participant shall be made or implied by any other member as a result of participation in the negotiation process.

  • Meteorological Data Reporting Requirement (Applicable to wind generation facilities only) The wind generation facility shall, at a minimum, be required to provide the Transmission Provider with site-specific meteorological data including: • Temperature (degrees Fahrenheit) • Wind speed (meters/second) • Wind direction (degrees from True North) • Atmosphere pressure (hectopascals) • Forced outage data (wind turbine and MW unavailability)

  • Handling Sensitive Personal Information and Breach Notification A. As part of its contract with HHSC Contractor may receive or create sensitive personal information, as section 521.002 of the Business and Commerce Code defines that phrase. Contractor must use appropriate safeguards to protect this sensitive personal information. These safeguards must include maintaining the sensitive personal information in a form that is unusable, unreadable, or indecipherable to unauthorized persons. Contractor may consult the “Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals” issued by the U.S. Department of Health and Human Services to determine ways to meet this standard.

  • Information Safeguards Business Associate will develop, document, implement, maintain and use appropriate administrative, technical and physical safeguards to preserve the integrity and confidentiality of and to prevent non-permitted use or disclosure of PHI created for or received from Recipient or its Subsidiaries. These safeguards must be appropriate to the size and complexity of Business Associate’s operations and the nature and scope of its activities. Business Associate agrees that these safeguards will meet any applicable requirements set forth by the U.S. Department of Health and Human Services, including (as of the effective date or as of the compliance date, whichever is applicable) any requirements set forth in the final HIPAA security regulations. Business Associate agrees to mitigate, to the extent practicable, any harmful effect that is known to Business Associate resulting from a use or disclosure of PHI by Business Associate in violation of the requirements of this Addendum.

  • Study Population ‌ Infants who underwent creation of an enterostomy receiving postoperative care and awaiting enterostomy closure: to be assessed for eligibility: n = 201 to be assigned to the study: n = 106 to be analysed: n = 106 Duration of intervention per patient of the intervention group: 6 weeks between enterostomy creation and enterostomy closure Follow-up per patient: 3 months, 6 months and 12 months post enterostomy closure, following enterostomy closure (12-month follow-up only applicable for patients that are recruited early enough to complete this follow-up within the 48 month of overall study duration).

Time is Money Join Law Insider Premium to draft better contracts faster.