Safeguards Against Unauthorized Access and Re-disclosure Sample Clauses

Safeguards Against Unauthorized Access and Re-disclosure. THE PARTNER and LCCC shall exercise due care to protect all PII from unauthorized physical and electronic access or disclosure. All parties shall establish and implement the following minimum physical, electronic and managerial safeguards for maintaining the confidentiality of information provided by any party pursuant to this Agreement: Access to the information provided by any party will be restricted to only those authorized staff, officials, and agents of LCCC and the Third Party Evaluator who needs it to perform their official duties in the performance of the work requiring access to the information as detailed in the Purpose of this Agreement. All parties, at all times, will store the information in an area that is safe from access by unauthorized persons. Unless specifically authorized by the other parties, no party will store any PII on portable electronic devices or media, including, but not limited to laptops, handhelds/PDAs, Ultramobile PCs, flash memory devices, floppy discs, optical discs (CDs/DVDs), and portable hard disks. All parties will protect the information in a manner that prevents unauthorized persons from retrieving the information by means of computer, remote terminal or other means. All parties shall take precautions to ensure that only authorized personnel are given access to on-line files containing PII and that such access does not amount to a re-disclosure of information unless authorized by FERPA. All parties shall instruct all individuals with access to these data regarding the confidential nature of the information, the requirements of Use of Data and Safeguards against Unauthorized Access and Re-Disclosure clauses of this Agreement, and the sanctions specified in federal and state laws against unauthorized disclosure of information covered by this Agreement. All parties shall take due care and take reasonable precautions to protect PII from unauthorized physical and electronic access or disclosure. Data Segregation PARTNER Data must be segregated or otherwise distinguishable from non-PARTNER Data. This is to ensure that when no longer needed by LCCC, all PARTNER Data can be identified for destruction. It also aids in determining whether PARTNER Data has or may have been compromised in the event of a security breach. PARTNER Data must be segregated by one or more of the following methods: These data will be kept on media (e.g. hard disk, optical disc, tape, etc.) which will contain no other data; or, These data will be stor...
AutoNDA by SimpleDocs
Safeguards Against Unauthorized Access and Re-disclosure. XX shall exercise due care to protect all Personally Identifiable data from unauthorized physical and electronic access. Both parties shall establish and implement the following minimum physical, electronic and managerial safeguards for maintaining the confidentiality of information provided by either party pursuant to this Agreement:
Safeguards Against Unauthorized Access and Re-disclosure. XX shall exercise due care to protect all Personally Identifiable data from unauthorized physical and electronic access. Both parties shall establish and implement the following minimum physical, electronic and managerial safeguards for maintaining the confidentiality of information provided by either party pursuant to this Agreement: Access to the information provided by RIDE will be restricted to only those authorized staff, officials, and agents of the parties who need it to perform their official duties in the performance of the work requiring access to the information as detailed in the Purpose of this Agreement. XX will store the information in an area that is safe from access by unauthorized persons during duty hours as well as non-duty hours or when not in use. Unless specifically authorized in this Agreement, XX will not store any confidential or sensitive RIDE data on portable electronic devices or media, including, but not limited to laptops, handhelds, flash memory devices, optical discs (CDs/DVDs), and portable hard disks. XX will protect the information in a manner that prevents unauthorized persons from retrieving the information by means of computer, remote terminal or other means.

Related to Safeguards Against Unauthorized Access and Re-disclosure

  • Prohibition on Unauthorized Use or Disclosure The Business Associate will neither use nor disclose the Covered Entity’s Protected Health Information, except as permitted or required by this Addendum or in writing by the Covered Entity or as Required by Law. This Agreement does not authorize the Business Associate to use or disclose the Covered Entity’s Protected Health Information in a manner that will violate Subpart E of 45 CFR Part 164 if done by the Covered Entity.

  • Reporting of Unauthorized Disclosure The Contractor shall immediately report to the State any unauthorized disclosure of confidential information.

  • Information Safeguards Business Associate will develop, document, implement, maintain and use appropriate administrative, technical and physical safeguards to preserve the integrity and confidentiality of and to prevent non-permitted use or disclosure of PHI created for or received from Recipient or its Subsidiaries. These safeguards must be appropriate to the size and complexity of Business Associate’s operations and the nature and scope of its activities. Business Associate agrees that these safeguards will meet any applicable requirements set forth by the U.S. Department of Health and Human Services, including (as of the effective date or as of the compliance date, whichever is applicable) any requirements set forth in the final HIPAA security regulations. Business Associate agrees to mitigate, to the extent practicable, any harmful effect that is known to Business Associate resulting from a use or disclosure of PHI by Business Associate in violation of the requirements of this Addendum.

  • Confidentiality and Safeguarding of University Records; Press Releases; Public Information Under this Agreement, Contractor may (1) create, (2) receive from or on behalf of University, or (3) have access to, records or record systems (collectively, University Records). Among other things, University Records may contain social security numbers, credit card numbers, or data protected or made confidential or sensitive by Applicable Laws. [Option (Include if University Records are subject to FERPA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Family Educational Rights and Privacy Act, 20 United States Code (USC) §1232g (FERPA) are addressed in Section 12.41.] [Option (Include if University is a HIPAA Covered Entity and University Records are subject to HIPAA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Health Insurance Portability and Accountability Act and 45 Code of Federal Regulations (CFR) Part 160 and subparts A and E of Part 164 (collectively, HIPAA) are addressed in Section 12.26.] Contractor represents, warrants, and agrees that it will: (1) hold University Records in strict confidence and will not use or disclose University Records except as (a) permitted or required by this Agreement, (b) required by Applicable Laws, or (c) otherwise authorized by University in writing; (2) safeguard University Records according to reasonable administrative, physical and technical standards (such as standards established by the National Institute of Standards and Technology and the Center for Internet Security [Option (Include if Section 12.39 related to Payment Card Industry Data Security Standards is not include in this Agreement.):, as well as the Payment Card Industry Data Security Standards]) that are no less rigorous than the standards by which Contractor protects its own confidential information; (3) continually monitor its operations and take any action necessary to assure that University Records are safeguarded and the confidentiality of University Records is maintained in accordance with all Applicable Laws and the terms of this Agreement; and (4) comply with University Rules regarding access to and use of University’s computer systems, including UTS165 at xxxx://xxx.xxxxxxxx.xxx/board-of-regents/policy-library/policies/uts165-information-resources-use-and-security-policy. At the request of University, Contractor agrees to provide University with a written summary of the procedures Contractor uses to safeguard and maintain the confidentiality of University Records.

  • CONFIDENTIALITY/SAFEGUARDING OF INFORMATION The CONTRACTOR shall not use or disclose any information concerning the AGENCY, or information that may be classified as confidential, for any purpose not directly connected with the administration of this contract, except with prior written consent of the AGENCY, or as may be required by law.

  • NEPOTISM DISCLOSURE A. In this section the term “relative” means:

  • Passwords and Employee Access Provider shall secure usernames, passwords, and any other means of gaining access to the Services or to Student Data, at a level suggested by Article 4.3 of NIST 800-63-3. Provider shall only provide access to Student Data to employees or contractors that are performing the Services. Employees with access to Student Data shall have signed confidentiality agreements regarding said Student Data. All employees with access to Student Records shall pass criminal background checks.

  • Unauthorized Use or Disclosure The Contractor shall notify COMMERCE within five (5) working days of any unauthorized use or disclosure of any confidential information, and shall take necessary steps to mitigate the harmful effects of such use or disclosure.

  • NOXIOUS WEEDS DISCLOSURE Buyers of property in the State of Montana should be aware that some properties contain noxious weeds. The laws of the State of Montana require owners of property within this state to control, and to the extent possible, eradicate noxious weeds. For information concerning noxious weeds and your obligations as an owner of property, contact either your local County extension agent or Weed Control Board.

  • Disclosure of Account Information to Third Parties It is our general policy to treat your account information as confidential. However, we will disclose information to third parties about your account or the transactions you make in the following situations pursuant to our Privacy Policy (as further described in Section 10 (Your Privacy) of the General Terms), in addition to the circumstances set forth in Section 20 of the General Terms (Information Authorization):

Time is Money Join Law Insider Premium to draft better contracts faster.