Access to Agency Data Sample Clauses

Access to Agency Data. Pursuant to Section 2054.138, Texas Government Code, PROVIDER shall implement and maintain appropriate administrative, technical, and physical security measures, including without limitation, the security controls available at xxxxx://xxxxx-xxxxxxxxx.xxxxx.xxx, as may be amended from time to time (the “Security Controls”), to safeguard and preserve the confidentiality, integrity, and availability of A&M System’s data. PROVIDER shall periodically provide A&M System with evidence of its compliance with the Security Controls within thirty (30) days of A&M System’s request.
AutoNDA by SimpleDocs
Access to Agency Data. Pursuant to §2054.138, Texas Government Code, Vendor shall implement and maintain appropriate administrative, technical, and physical security measures, including without limitation, the security controls available at xxxxx://xxx.xxxxxx.xxx/governance/rules-procedures/assets/support-docs/cybersecurity-control-standards.pdf as may be amended from time to time (the “Security Controls”), to safeguard and preserve the confidentiality, integrity, and availability of Customer’s data. Vendor shall periodically provide Customer with evidence of its compliance with its Security Controls within thirty (30) days of Customer’s request.
Access to Agency Data. As of September 1, 2021, all A&M System members must require any vendor that is authorized to access, transmit, use, or store data for the A&M member to meet the security controls the A&M member determines are appropriate. The vendor must also periodically provide the A&M member with evidence that the vendor meets the security controls required in the contract. A&M System members should consult with their IT/security teams to determine the appropriate security controls for each applicable vendor and also include the below provision in the vendor contract: Pursuant to Section 2054.138, Texas Government Code, [CONTRACTING PARTY] shall implement and maintain appropriate administrative, technical, and physical security measures, including without limitation, [the security controls attached hereto as Exhibit ____, as may be amended from time to time] [the security controls available at _________, as may be amended from time to time] (the “Security Controls”), to safeguard and preserve the confidentiality, integrity, and availability of [MEMBER’s] data. [CONTRACTING PARTY] shall periodically provide [MEMBER] with evidence of its compliance with the Security Controls within thirty (30) days of [MEMBER’s] request.
Access to Agency Data. Pursuant to Section 2054.138, Texas Government Code, Vendor shall implement and maintain appropriate administrative, technical, and physical security measures, including without limitation, the security controls available at xxxxx://xxx.xxxxx.xxx/it/information-technology-information- controls-catalog.html, as may be amended from time to time, (the “Security Controls”), to safeguard and preserve the confidentiality, integrity, and availability of WTAMU’s data. Vendor shall periodically provide WTAMU with evidence of its compliance with the Security Controls within thirty (30) days of WTAMU’s request.
Access to Agency Data. Pursuant to Section 2054.138, Texas Government Code, Astadia shall implement and maintain appropriate administrative, technical, and physical security measures, including without limitation, the security controls available at xxxxx://xxxxx- xxxxxxxxx.xxxxx.xxx, as may be amended from time to time (the “Security Controls”), to safeguard and preserve the confidentiality, integrity, and availability of End User’s data. Astadia shall periodically provide End User with evidence of its compliance with the Security Controls within thirty (30) days of End User’s request.
Access to Agency Data. Pursuant to Section 2054.138, Texas Government Code, JED shall implement and maintain appropriate administrative, technical, and physical security measures, including without limitation, the security controls available at xxxxx://xxxxx-xxxxxxxxx.xxxxx.xxx, as may be amended from time to time (the “Security Controls”), to safeguard and preserve the confidentiality, integrity, and availability of A&M System’s data. JED shall periodically provide A&M System with evidence of its compliance with the Security Controls within thirty (30) days of A&M System’s request.
Access to Agency Data. Pursuant to Section 2054.138, Texas Government Code, PROVIDER shall implement and maintain appropriate administrative, technical, and physical security measures, including without limitation, the security controls available at xxxxx://xxxxx-xxxxxxxxx.xxxxx.xxx, as may be amended from time to time (the “Security Controls”), to safeguard and preserve the confidentiality, integrity, and availability of A&M System’s data. PROVIDER shall periodically provide A&M System with evidence of its compliance with the Security Controls within thirty (30) days of A&M System’s request. All other terms and conditions not hereby amended are to remain in full force and effect. The Texas A&M University System: Xxxxxx Xxxxxx & Company P.C.: By: Xxxx Xxxxxxxxxx Executive Director, Procurement Date: 9/9/2022 | 9:24:44 CDT By: Xxxxx Xxxxxx PRESIDENT
AutoNDA by SimpleDocs
Access to Agency Data. Pursuant to Section 2054.138, Texas Government Code, PROVIDER shall implement and maintain appropriate administrative, technical, and physical security measures. PROVIDER follows NIST SP 800-53 standards. PROVIDER ensures privacy and security of data in our possession through these best practices, annual penetration testing, and a vulnerability management program. PROVIDER shall periodically provide A&M System with evidence of its compliance with the Security Controls within thirty (30) days of A&M System’s request and as available/applicable, independent third party audits and assessments. All other terms and conditions not hereby amended are to remain in full force and effect. The Texas A&M University System: FORVIS, LLP: By: By: Xxxx Xxxxxxxxxx Xxxxxx Xxxxx Executive Director, Procurement Partner
Access to Agency Data. Pursuant to Section 2054.138, Texas Government Code, Pluralsight shall implement and maintain appropriate administrative, technical, and physical security measures (the “Security Controls") to safeguard and preserve the confidentiality, integrity, and availability of Customer’s data. Pluralsight shall periodically provide Customer with evidence of its compliance with the Security Controls within thirty (30) days of Customer’s request.

Related to Access to Agency Data

  • SYSTEM AGENCY DATA A. As between the Parties, all data and information acquired, accessed, or made available to Grantee by, through, or on behalf of System Agency or System Agency contractors, including all electronic data generated, processed, transmitted, or stored by Grantee in the course of providing data processing services in connection with Xxxxxxx’s performance hereunder (the “System Agency Data”), is owned solely by System Agency.

  • Access to NID 2.17.3.1 TWTC may access the customer’s premises wiring by any of the following means and TWTC shall not disturb the existing form of electrical protection and shall maintain the physical integrity of the NID:

  • Access to File 12.01 An employee shall upon written request, made a reasonable time before the time of viewing, have an opportunity to view their personnel file in the presence of the Director of Human Resources or their designate. The information the employee may review will be:

  • Access to Data Operator shall make Data in the possession of the Operator available to the LEA within five (5) business days of a request by the LEA.

  • Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.

  • Access to Site 3.05.1 Contractor may enter and leave the premises at all reasonable times without charge. Contractor and its employees may use the common areas and roadways of the premises where it is to perform the services together with all facilities, equipment, improvements, and services provided in connection with the premises for common use. This excludes parking for Contractor’s personnel. Contractor shall repair any damage caused by it or its employees as a result of its use of the common areas.

  • Access to System If Business Associate needs access to a Covered Entity Information Technology system to comply with its obligations under the Contract or this Agreement, Business Associate shall request, review, and comply with any and all policies applicable to Covered Entity regarding such system including, but not limited to, any policies promulgated by the Office of Information Technology and available at xxxx://xxx.xxxxx.xx.xx/about/policies.

  • Access to Services 1. Subject to DHCS provider enrollment certification requirements, the Contractor shall maintain continuous availability and accessibility of covered services and facilities, service sites, and personnel to provide the covered services through use of DMC certified providers. Such services shall not be limited due to budgetary constraints.

  • Access to Documents To the extent applicable to this Agreement, in accordance with §1861(v)(I)(i) of the Social Security Act (42 USC §1395x) as amended, and the provisions of 42 CFR §420.300 et seq, Contractor will allow, during and for a period of not less than four (4) years after the expiration or termination of this Agreement, access to this Agreement and its books, documents, and records; and contracts between Contractor and its subcontractors or related organizations, including books, documents and records relating to same, by the Comptroller General of the United States, the U.S. Department of Health and Human Services and their duly authorized representatives.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!