Audit Rights and Access. County shall maintain records in such a manner as to clearly document its compliance with and performance under this Privacy and Security Agreement, and provide ODHS, the Oregon Secretary of State, the federal government, and their duly authorized representatives access to County’s officers, agents, contractors, subcontractors, employees, facilities and records for ODHS to: 8.5.1. Determine County’s compliance with this Privacy and Security Agreement, 8.5.2. Validate County’s written security risk management plan, or 8.5.3. Gather or verify any additional information ODHS may require to meet any state or federal laws, rules, or orders regarding Information Assets. 8.5.4. Access to facilities, systems, and records under this section will be granted following reasonable notice to County. Records include paper or electronic form, system security logs, and related system components and tools (including hardware and software), required to perform examinations and audits, and to make excerpts and transcripts, including for data forensics.
Appears in 5 contracts
Samples: Intergovernmental Grant Agreement, Intergovernmental Agreement, Intergovernmental Grant Agreement
Audit Rights and Access. County shall maintain records in such a manner as to clearly document its compliance with and performance under this Privacy and Security Agreement, and provide ODHS, the Oregon Secretary of State, the federal government, and their duly authorized representatives access to County’s officers, agents, contractors, subcontractors, employees, facilities and records for ODHS to:
8.5.1. Determine County’s compliance with this Privacy and Security Agreement,
8.5.2. Validate County’s written security risk management plan, or
8.5.3. Gather or verify any additional information ODHS may require to meet any state or federal laws, rules, or orders regarding Information Assets.
8.5.4. Access to facilities, systems, and records under this section will be granted following reasonable notice to the County. Records include paper or electronic form, system security logs, and related system components and tools (including hardware and software), required to perform examinations and audits, and to make excerpts and transcripts, including for data forensics.
Appears in 1 contract
Samples: Grant Agreement