Information Privacy/Security/Access Sample Clauses

Information Privacy/Security/Access. If this Agreement requires or allows Recipient or, when allowed, its subcontractor(s), to have access to or use of any OHA computer system or other OHA Information Asset for which OHA imposes security requirements, and OHA grants Recipient or its subcontractor(s) access to such OHA Information Assets or Network and Information Systems, Recipient shall comply and require all subcontractor(s) to which such access has been granted to comply with OAR 943-014-0300 through OAR 943-014-0320, as such rules may be revised from time to time. For purposes of this Section, “Information Asset” and “Network and Information System” have the meaning set forth in OAR 943- 014-0305, as such rule may be revised from time to time.
AutoNDA by SimpleDocs
Information Privacy/Security/Access. If the Work performed under this Contract requires Contractor or, when allowed, its subcontractor(s), to have access to or use of any DHS computer system or other DHS Information Asset for which DHS imposes security requirements, and DHS grants Contractor or its subcontractor(s) access to such DHS Information Assets or Network and Information Systems, Contractor shall comply and require all subcontractor(s) to which such access has been granted to comply with OAR 407-014-0300 through 407-014-0320, as such rules may be revised from time to time. For purposes of this Section, “Information Asset” and “Network and Information System” have the meaning set forth in OAR 407-014-0305, as such rule may be revised from time to time.
Information Privacy/Security/Access. If the Work performed under this Contract requires Contractor or, when allowed, its subcontractor(s), to have access to or use of any OHA computer system or other OHA Information Asset for which OHA imposes security requirements, and OHA grants Contractor or its subcontractor(s) access to such OHA Information Assets or Network and Information Systems, Contractor shall comply and require all subcontractor(s) to which such access has been granted to comply with OAR 943-014-0300 through 943-014-0320, as such rules may be revised from time to time. For purposes of this Section, “Information Asset” and “Network and Information System” have the meaning set forth in OAR 943-014-0305, as such rule may be revised from time to time.
Information Privacy/Security/Access. If the Services performed under this Agreement require or allow County or, when allowed, its Provider(s) or Subcontractors, to have access to or otherwise use any ODHS’ Information Asset(s) or Network and Information System(s) to which security and privacy requirements apply, and ODHS grants County or its Provider(s) or Subcontractor(s) access to such ODHS Information Asset(s) or Network and Information System(s), County shall comply and require its Provider(s) or Subcontractor(s) to which such access has been granted to comply with the terms and conditions applicable to such access or use, including OAR 407-014-0300 through OAR 407-014-0320, as such rules may be revised from time to time. For purposes of this Section, “Information Asset” and “Network and Information System” have the meaning set forth in OAR 407-014-0305, as such rule may be revised from time to time.
Information Privacy/Security/Access. If this Agreement requires or allows Recipient or, when allowed, its subcontractor(s), to have access to or use of any DHS computer system or other DHS Information Asset for which DHS imposes security requirements, and DHS grants Recipient or its subcontractor(s) access to such DHS Information Assets or Network and Information Systems, Recipient shall comply and require all subcontractor(s) to which such access has been granted to comply with OAR 407-014-0300 through OAR 407-014-0320, as such rules may be revised from time to time. For purposes of this Section, “Information Asset” and “
Information Privacy/Security/Access. If this Agreement requires or allows Subrecipient or, when allowed, its subcontractor(s), to have access to or use of any
Information Privacy/Security/Access. If the Work performed under this Contract requires Contractor or, when allowed, its subcontractor(s), to have access to or use of any DHS computer system or other DHS Information Asset for which DHS imposes security requirements, and DHS grants Contractor or its subcontractor(s) access to such DHS Information Assets or Network and Information Systems, Contractor shall comply and require all subcontractor(s) to which such access has been granted to comply with OAR 407-014-0300 through OAR 407-014-0320, as such rules may be revised from time
AutoNDA by SimpleDocs
Information Privacy/Security/Access. If this Agreement requires or allows Recipient or, when permitted in prior written consent from Agency, its subrecipient(s), to have limited electronic access at a facility to the Agency’s electronic systems the Recipient will be provided only the electronic access necessary to be able to safely and professionally exercise independent judgment in the performance of the Work.
Information Privacy/Security/Access. If this Agreement requires or allows Recipient and, when allowed, its subcontractor(s), to have access to or use of any OHA computer system or other OHA Information Asset for which OHA imposes security requirements, and OHA Recipient or its subcontractor(s) access to such OHA Information Assets or Network and Information Systems, Recipient shall comply and require all subcontractor(s) to which such access has been granted to comply with OAR 943-014-0300 through OAR 943-014-0320, including as such rules may be revised from time to time. For purposes of this Section, “Information Asset” and “Network and Information System” have the meaning set forth in OAR 943-014-0305, as such rule may be revised from time to time. If this Agreement requires or allows Recipient, and when allowed, its subcontractor(s), to have access to or use any information systems hosted by a third party in order to support the activities referenced in the Service Description, and OHA Recipient and any authorized subcontractor(s) access to such systems, Recipient shall comply and require all subcontractor(s) to which such access has been granted to comply with the provisions of OAR 943-014-0300 through OAR 943-014-0320 applicable to the client information in the third party system, including as such rules may be revised from time to time. Recipient will be responsible for its compliance and the compliance of its subcontractor(s) with any terms applicable to the system, which may be addressed in a separate agreement.
Information Privacy/Security/Access. If the Work performed under this contract requires Contractor or, when allowed, its subcontractor(s), to have access to or use of any Agency computer system or other Agency Information Asset for which Agency imposes security requirements, and Agency grants Contractor or its subcontractor(s) access to such Agency Information Assets or Network and Information Systems, Contractor shall comply and require all subcontractor(s) to which such access has been granted to comply with OAR 407-014-0300 through OAR 407-014-0320, as such rules may be revised from time to time. For purposes of this section, “Information Asset” and “Network and Information System” have the meaning set forth in OAR 407-014-0305, as such rule may be revised from time to time. CONTRACTOR, BY EXECUTION OF THIS CONTRACT, HEREBY ACKNOWLEDGES THAT CONTRACTOR HAS READ THIS CONTRACT, UNDERSTANDS IT, AND AGREES TO BE BOUND BY ITS TERMS AND CONDITIONS. EXHIBIT A Part 1 Statement of Work
Time is Money Join Law Insider Premium to draft better contracts faster.