Common use of Computers Clause in Contracts

Computers. Security for data maintained in the HMIS depends on a secure computing environment. Computer security is adapted from relevant provisions of the Department of Housing and Urban Development’s (“HUD”) “Homeless Management Information Systems (HMIS); Data and Technical Standards Proposed Rule” (Docket No. FR 5475-P-01- Fed. Reg. Vol. 76, No. 237 (December 9, 2011/Proposed Rules). Agencies are encouraged to directly consult that document for complete documentation of HUD’s standards relating to HMIS, and hereby agree to incorporate any changes to HUD policy into their computing environment on the timeline specified by HUD. Agency will allow access to the HMIS only from computers which are: i. protected from viruses by commercially available virus protection software (a) that includes, at a minimum, automated scanning of files as they are accessed by End Users on the system on which the HMIS application is accessed and (b) with virus definitions that are regularly updated from the software vendor; ii. protected with a secure software or hardware firewall between, at least, the workstation and any systems (including the internet and other computer networks) located outside of the Agency; iii. maintained to ensure that the computer operating system running the computer used for the HMIS is kept up to date in terms of security and other operating system patches, updates, and fixes; iv. accessed through web browsers with 128-bit encryption (e.g., Internet Explorer, and Google Chrome). Some browsers have the capacity to remember passwords, so that the End User does not need to type in the password when returning to password-protected sites. This default shall not be used with respect to the HMIS; the End User is expected to physically enter the password each time he or she logs on to the system; and v. staffed at all times when in public areas. When computers are not in use and staff is not present, steps should be taken to ensure that the computers and data are secure and not usable by unauthorized individuals. These steps should minimally include (a) logging off the HMIS system, (b) physically locking the computer in a secure area, (c) shutting down the computer entirely, or (d) using a password protected screen saver.

Appears in 2 contracts

Samples: Hmis Participation Agreement, Hmis Participation Agreement

AutoNDA by SimpleDocs

Computers. Security for data maintained in the GA HMIS depends on a secure computing environment. Computer security is adapted from relevant provisions of the Department of Housing and Urban Development’s (“HUD”) “Homeless Management Information Systems (HMIS); HMIS Data and Technical Standards Proposed Rule” Rule (Docket No. FR 5475-P-01- Fed. Reg. Vol. 76, No. 237 (December 9, 2011/Proposed Rules). Agencies are encouraged to directly consult that document for complete documentation of HUD’s standards relating to HMIS, and hereby agree to incorporate any changes to HUD policy into their computing environment on the timeline specified by HUD. Agency will allow access to the GA HMIS only from computers which are: i. protected from viruses by commercially available virus protection software (a) that includes, at a minimum, automated scanning of files as they are accessed by End Users on the system on which the HMIS application is accessed and (b) with virus definitions that are regularly updated from the software vendor; ii. protected with a secure software or hardware firewall between, at least, the workstation and any systems (including the internet and other computer networks) located outside of the Agency; iii. maintained to ensure that the computer operating system running the computer used for the HMIS is kept up to date in terms of security and other operating system patches, updates, and fixes; iv. accessed through web browsers with 128-bit encryption (e.g., Internet Explorer, and Google Chrome). Some browsers have the capacity to remember passwords, so that the End User does not need to type in the password when returning to password-password- protected sites. This default shall not be used with respect to the HMIS; the End User is expected to physically enter the password each time he or she logs on to the system; and v. staffed at all times when in public areas. When computers are not in use and staff is not present, steps should be taken to ensure that the computers and data are secure and not usable by unauthorized individuals. These steps should minimally include (a) logging off the HMIS system, (b) physically locking the computer in a secure area, (c) shutting down the computer entirely, or (d) using a password protected screen saver.

Appears in 1 contract

Samples: Ga Hmis Agency Participation Agreement

Computers. Security for data maintained in the GA HMIS depends on a secure computing environment. Computer security is adapted from relevant provisions of the Department of Housing and Urban Development’s (“HUD”) “Homeless Management Information Systems (HMIS); HMIS Data and Technical Standards Proposed Rule” Rule (Docket No. FR 5475-P-01- P- 01- Fed. Reg. Vol. 76, No. 237 (December 9, 2011/Proposed Rules). Agencies are encouraged to directly consult that document for complete documentation of HUD’s standards relating to HMIS, and hereby agree to incorporate any changes to HUD policy into their computing environment on the timeline specified by HUD. Agency will allow access to the GA HMIS only from computers which are: i. protected from viruses by commercially available virus protection software (a) that includes, at a minimum, automated scanning of files as they are accessed by End Users on the system on which the HMIS application is accessed and (b) with virus definitions that are regularly updated from the software vendor;. ii. protected with a secure software or hardware firewall between, at least, the workstation and any systems (including the internet and other computer networks) located outside of the Agency; iii. maintained to ensure that the computer operating system running the computer used for the HMIS is kept up to date in terms of security and other operating system patches, updates, and fixes; iv. accessed through web browsers with 128-bit encryption (e.g., Internet Explorer, and Google Chrome). Some browsers have the capacity to remember passwords, so that the End User does not need to type in the password when returning to password-password- protected sites. This default shall not be used with respect to the HMIS; the End User is expected to physically enter the password each time he or she logs on to the system; and v. staffed at all times when in public areas. When computers are not in use and staff is not present, steps should be taken to ensure that the computers and data are secure and not usable by unauthorized individuals. These steps should minimally include (a) logging off the HMIS system, (b) physically locking the computer in a secure area, (c) shutting down the computer entirely, or (d) using a password protected screen saver.

Appears in 1 contract

Samples: Ga Hmis Agency Participation Agreement

Computers. Security for data maintained in the HMIS Comparable Database depends on a secure computing environment. Computer security is adapted from relevant provisions of the Department of Housing and Urban Development’s (“HUD”) “Homeless Management Information Systems (HMIS); Data and Technical Standards Proposed Rule” (Docket No. FR 5475-P-01- Fed. Reg. Vol. 76, No. 237 (December 9, 2011/Proposed Rules). Agencies are encouraged to directly consult that document for complete documentation of HUD’s standards relating to HMISstandards, and hereby agree to incorporate any changes to HUD policy into their computing environment on the timeline specified by HUD. Agency will allow access to the HMIS Comparable Database only from computers which are: i. protected from viruses by commercially available virus protection software (a) that includes, at a minimum, automated scanning of files as they are accessed by End Users on the system on which the HMIS Comparable Database application is accessed and (b) with virus definitions that are regularly updated from the software vendor; ii. protected with a secure software or hardware firewall between, at least, the workstation and any systems (including the internet and other computer networks) located outside of the Agency; iii. maintained to ensure that the computer operating system running the computer used for the HMIS Comparable Database is kept up to date in terms of security and other operating system patches, updates, and fixes; iv. accessed through web browsers with 128-bit encryption (e.g., Internet Explorer, and Google Chrome). Some browsers have the capacity to remember passwords, so that the End User does not need to type in the password when returning to password-protected sites. This default shall not be used with respect to the HMISComparable Database; the End User is expected to physically enter the password each time he or she logs on to the system; and v. staffed at all times when in public areas. When computers are not in use and staff is not present, steps should be taken to ensure that the computers and data are secure and not usable by unauthorized individuals. These steps should minimally include (a) logging off the HMIS Comparable Database system, (b) physically locking the computer in a secure area, (c) shutting down the computer entirely, or (d) using a password protected screen saver.

Appears in 1 contract

Samples: Agency Participation Agreement

AutoNDA by SimpleDocs

Computers. Security for data maintained in the HMIS DV Comparable Database depends on a secure computing environment. Computer security is adapted from relevant provisions of the Department of Housing and Urban Development’s (“HUD”) “Homeless Management Information Systems (HMIS); Data and Technical Standards Proposed Rule” (Docket No. FR 5475-P-01- Fed. Reg. Vol. 76, No. 237 (December 9, 2011/Proposed Rules). Agencies are encouraged to directly consult that document for complete documentation of HUD’s standards relating to HMISstandards, and hereby agree to incorporate any changes to HUD policy into their computing environment on the timeline specified by HUD. Agency will allow access to the HMIS DV Comparable Database only from computers which are: i. protected from viruses by commercially available virus protection software (a) that includes, at a minimum, automated scanning of files as they are accessed by End Users on the system on which the HMIS DV Comparable Database application is accessed and (b) with virus definitions that are regularly updated from the software vendor; ii. protected with a secure software or hardware firewall between, at least, the workstation and any systems (including the internet and other computer networks) located outside of the Agency; iii. maintained to ensure that the computer operating system running the computer used for the HMIS DV Comparable Database is kept up to date in terms of security and other operating system patches, updates, and fixes; iv. accessed through web browsers with 128-bit encryption (e.g., Internet Explorer, and Google Chrome). Some browsers have the capacity to remember passwords, so that the End User does not need to type in the password when returning to password-protected sites. This default shall not be used with respect to the HMISDV Comparable Database; the End User is expected to physically enter the password each time he or she logs on to the system; and v. staffed at all times when in public areas. When computers are not in use and staff is not present, steps should be taken to ensure that the computers and data are secure and not usable by unauthorized individuals. These steps should minimally include (a) logging off the HMIS DV Comparable Database system, (b) physically locking the computer in a secure area, (c) shutting down the computer entirely, or (d) using a password protected screen saver.

Appears in 1 contract

Samples: Agency Participation Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!