Computer Security Safeguards Sample Clauses

Computer Security Safeguards. The Contractor agrees to comply with the general computer security safeguards, system security controls, and audit controls in this section. In order to comply with the following general computer security safeguards, the Contractor agrees to: A. Encrypt portable computer devices, such as laptops and notebook computers that process and/or store Medi-Cal PII, with a solution using a vendor product that is recognized as an industry leader in meeting the needs for the intended solution. One source of recommended solutions is specified on the California Strategic Sourced Initiative (CSSI) located at the following link: xxx.xx.xxx.xx.xxx/xxxxxxx/XxxxxxxxxxXxxxxxxx.xxxx. The Contractor shall use an encryption solution that is full-disk unless otherwise approved by DHCS. B. Encrypt workstations where Medi-Cal PII is stored using a vendor product that is recognized as an industry leader in meeting the needs for the intended solution, such as products specified on the CSSI. C. Ensure that only the minimum necessary amount of Medi-Cal PII is downloaded to a laptop or hard drive when absolutely necessary for current business purposes. D. Encrypt all electronic files that contain Medi-Cal PII when the file is stored on any removable media type device (i.e. USB thumb drives, floppies, CD/DVD, etc.) using a vendor product that is recognized as an industry leader in meeting the needs for the intended solution, such as products specified on the CSSI. E. Ensure that all emails sent outside the Contractor’s e-mail environment that include Medi-Cal PII are sent via an encrypted method using a vendor product that is recognized as an industry leader in meeting the needs for the intended solution, such as products specified on the CSSI. F. Ensure that all workstations, laptops and other systems that process and/or store Medi-Cal PII have a commercial third-party anti-virus software solution and are updated when a new anti-virus definition/software release is available. G.Ensure that all workstations, laptops and other systems that process and/or store Medi-Cal PII have current security patches applied and up-to-date.
AutoNDA by SimpleDocs
Computer Security Safeguards. The Contractor agrees to comply with the general computer security safeguards, system security controls, and audit controls in this section. In order to comply with the following general computer security safeguards, the Contractor agrees to: A. Encrypt portable computer devices, such as laptops and notebook computers that process and/or store Medi-Cal PII, with a solution using a vendor product that is recognized as an industry leader in meeting the needs for the intended solution. One source of recommended solutions is specified on the California Strategic Sourced Initiative (CSSI) located at the following link: xxx.xx.xxx.xx.
Computer Security Safeguards. Requesting Program agrees to comply with the general computer security safeguards, system security controls, and audit controls in this section. General Computer Security Safeguards: 1. Encrypt portable computer devices, such as but not limited to laptops and notebook computers that process and/or store NJDOH data with a solution of using a product that is recognized as an industry leader in meeting the needs for the intended solution. Use an encryption solution that is full disk unless otherwise approved by NJDOH Information Security. 2. Encrypt workstations where NJDOH data is stored using a product that is recognized as an industry leader in meeting the needs for the intended solution. 3. Ensure that only the minimum necessary amount of NJDOH data is downloaded to a laptop or hard drive when necessary for current business purposes. 4. Encrypt all electronic files that contain NJDOH data when the file is stored on any removable media type device (i.e., USB thumb drives, floppies, CD/DVD, portable hard drives, etc.) using a product that is recognized as an industry leader in meeting the needs for the intended solution. 5. Ensure that all emails sent outside Requesting Program’s e-mail environment that include NJDOH data are sent via an encrypted method using a product that is recognized as an industry leader in meeting the needs of the intended solution. 6. Ensure that all workstations, laptops and other systems that process and/or store NJDOH data have a commercial third-party anti-virus software solution and are updated when a new ant-virus definition/software release is available. 7. Ensure that all workstations, laptops and other systems that process and/or store NJDOH data have current security patches applied and up to date. 8. Ensure that all NJDOH data is wiped from all systems and backups when the data is no longer legally required. Ensure in writing that the wipe method conforms to the US Department of Defense standards for data destruction. 9. Ensure that any remote access to NJDOH data is established over an encrypted session protocol using a product that is recognized as an industry leader in meeting the needs of the intended solution. Ensure all remote access is limited to minimum necessary and least privilege principles.

Related to Computer Security Safeguards

  • Security Safeguards (a) Each party acknowledges that it is solely responsible for determining and communicating to the other the appropriate technological, physical and organizational security measures required to protect Personal Data. (b) Each party will ensure that Personal Data is protected in accordance with the security safeguards communicated and agreed to by the other. (c) Each party will ensure that any third party to whom Personal Data is transferred is bound by the applicable terms of this section. (d) Additional or different services required to comply with the Laws will be deemed a request for new services.

  • Safeguards Business Associate, its Agent(s) and Subcontractor(s) shall implement and use appropriate safeguards to prevent the use or disclosure of PHI other than as provided for by this Agreement. With respect to any PHI that is maintained in or transmitted by electronic media, Business Associate or its Subcontractor(s) shall comply with 45 CFR sections 164.308 (administrative safeguards), 164.310 (physical safeguards), 164.312 (technical safeguards) and 164.316 (policies and procedures and documentation requirements). Business Associate or its Agent(s) and Subcontractor(s) shall identify in writing upon request from Covered Entity all of the safeguards that it uses to prevent impermissible uses or disclosures of PHI.

  • Server Security Servers containing unencrypted PHI COUNTY discloses to 4 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 5 must have sufficient administrative, physical, and technical controls in place to protect that data, based 6 upon a risk assessment/system security review.

  • Technical Safeguards 1. USAC and DSS will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data, so unauthorized persons cannot retrieve any data by computer, remote terminal, or other means. 2. USAC and DSS will strictly limit authorization to these electronic data areas necessary for the authorized user to perform their official duties. All data in transit will be encrypted using algorithms that meet the requirements of the Federal Information Processing Standard (FIPS) Publication 140-2 or 140-3 (when applicable). 3. Authorized system users will be identified by User ID and password, and individually tracked to safeguard against the unauthorized access and use of the system. System logs of all user actions will be saved, tracked and monitored periodically. 4. USAC will transmit data to DSS via encrypted secure file delivery system. For each request, a response will be sent back to USAC to indicate success or failure of transmission.

  • Cyber Security Insurance for loss to the Owner due to data security and privacy breach, including costs of investigating a potential or actual breach of confidential or private information. (Indicate applicable limits of coverage or other conditions in the fill point below.) « »

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!