Computer System Security Requirements. To the extent that Contractor electronically stores or transmits Confidential Information or has access to any ETF Information Resources, it will include in its written, comprehensive Information Security Plan the establishment and maintenance of a security system covering its computers, including any wireless system, that, at a minimum, and to the extent technically feasible, will have the following elements: (1) Secure user authentication protocols including: a. Control of user IDs and other identifiers; b. A secure method of assigning and selecting passwords, or use of unique identifier technologies, such as biometrics or token devices; c. Multi-Factor Authentication (MFA);
Appears in 4 contracts
Samples: Third Party Administration for Health Savings Accounts (Hsa) and Limited Flexible Spending Accounts (Lfsa), Third Party Administration for Employee Reimbursement Accounts (Era) and Commuter Benefits, Third Party Administration for Employee Reimbursement Accounts (Era) and Commuter Benefits