Computers. Security for data maintained in the HMIS depends on a secure computing environment. Computer security is adapted from relevant provisions of the Department of Housing and Urban Development’s (“HUD”) “Homeless Management Information Systems (HMIS); Data and Technical Standards Proposed Rule” (Docket No. FR 5475-P-01- Fed. Reg. Vol. 76, No. 237 (December 9, 2011/Proposed Rules). Agencies are encouraged to directly consult that document for complete documentation of HUD’s standards relating to HMIS, and hereby agree to incorporate any changes to HUD policy into their computing environment on the timeline specified by HUD. Agency will allow access to the HMIS only from computers which are: i. protected from viruses by commercially available virus protection software (a) that includes, at a minimum, automated scanning of files as they are accessed by End Users on the system on which the HMIS application is accessed and (b) with virus definitions that are regularly updated from the software vendor; ii. protected with a secure software or hardware firewall between, at least, the workstation and any systems (including the internet and other computer networks) located outside of the Agency; iii. maintained to ensure that the computer operating system running the computer used for the HMIS is kept up to date in terms of security and other operating system patches, updates, and fixes; iv. accessed through web browsers with 128-bit encryption (e.g., Internet Explorer, and Google Chrome). Some browsers have the capacity to remember passwords, so that the End User does not need to type in the password when returning to password-protected sites. This default shall not be used with respect to the HMIS; the End User is expected to physically enter the password each time he or she logs on to the system; and v. staffed at all times when in public areas. When computers are not in use and staff is not present, steps should be taken to ensure that the computers and data are secure and not usable by unauthorized individuals. These steps should minimally include (a) logging off the HMIS system, (b) physically locking the computer in a secure area, (c) shutting down the computer entirely, or (d) using a password protected screen saver.
Appears in 2 contracts
Samples: Hmis Participation Agreement, Hmis Participation Agreement
Computers. Security for data maintained in the HMIS DV Comparable Database depends on a secure computing environment. Computer security is adapted from relevant provisions of the Department of Housing and Urban Development’s (“HUD”) “Homeless Management Information Systems (HMIS); Data and Technical Standards Proposed Rule” (Docket No. FR 5475-P-01- Fed. Reg. Vol. 76, No. 237 (December 9, 2011/Proposed Rules). Agencies are encouraged to directly consult that document for complete documentation of HUD’s standards relating to HMISstandards, and hereby agree to incorporate any changes to HUD policy into their computing environment on the timeline specified by HUD. Agency will allow access to the HMIS DV Comparable Database only from computers which are:
i. protected from viruses by commercially available virus protection software (a) that includes, at a minimum, automated scanning of files as they are accessed by End Users on the system on which the HMIS DV Comparable Database application is accessed and (b) with virus definitions that are regularly updated from the software vendor;
ii. protected with a secure software or hardware firewall between, at least, the workstation and any systems (including the internet and other computer networks) located outside of the Agency;
iii. maintained to ensure that the computer operating system running the computer used for the HMIS DV Comparable Database is kept up to date in terms of security and other operating system patches, updates, and fixes;
iv. accessed through web browsers with 128-bit encryption (e.g., Internet Explorer, and Google Chrome). Some browsers have the capacity to remember passwords, so that the End User does not need to type in the password when returning to password-protected sites. This default shall not be used with respect to the HMISDV Comparable Database; the End User is expected to physically enter the password each time he or she logs on to the system; and
v. staffed at all times when in public areas. When computers are not in use and staff is not present, steps should be taken to ensure that the computers and data are secure and not usable by unauthorized individuals. These steps should minimally include (a) logging off the HMIS DV Comparable Database system, (b) physically locking the computer in a secure area, (c) shutting down the computer entirely, or (d) using a password protected screen saver.
Appears in 1 contract
Samples: Agency Participation Agreement
Computers. Security for data maintained in the GA HMIS depends on a secure computing environment. Computer security is adapted from relevant provisions of the Department of Housing and Urban Development’s (“HUD”) “Homeless Management Information Systems (HMIS); HMIS Data and Technical Standards Proposed Rule” Rule (Docket No. FR 5475-P-01- Fed. Reg. Vol. 76, No. 237 (December 9, 2011/Proposed Rules). Agencies are encouraged to directly consult that document for complete documentation of HUD’s standards relating to HMIS, and hereby agree to incorporate any changes to HUD policy into their computing environment on the timeline specified by HUD. Agency will allow access to the GA HMIS only from computers which are:
i. protected from viruses by commercially available virus protection software (a) that includes, at a minimum, automated scanning of files as they are accessed by End Users on the system on which the HMIS application is accessed and (b) with virus definitions that are regularly updated from the software vendor;
ii. protected with a secure software or hardware firewall between, at least, the workstation and any systems (including the internet and other computer networks) located outside of the Agency;
iii. maintained to ensure that the computer operating system running the computer used for the HMIS is kept up to date in terms of security and other operating system patches, updates, and fixes;
iv. accessed through web browsers with 128-bit encryption (e.g., Internet Explorer, and Google Chrome). Some browsers have the capacity to remember passwords, so that the End User does not need to type in the password when returning to password-password- protected sites. This default shall not be used with respect to the HMIS; the End User is expected to physically enter the password each time he or she logs on to the system; and
v. staffed at all times when in public areas. When computers are not in use and staff is not present, steps should be taken to ensure that the computers and data are secure and not usable by unauthorized individuals. These steps should minimally include (a) logging off the HMIS system, (b) physically locking the computer in a secure area, (c) shutting down the computer entirely, or (d) using a password protected screen saver.
Appears in 1 contract
Computers. Security for data maintained in the HMIS Comparable Database depends on a secure computing environment. Computer security is adapted from relevant provisions of the Department of Housing and Urban Development’s (“HUD”) “Homeless Management Information Systems (HMIS); Data and Technical Standards Proposed Rule” (Docket No. FR 5475-P-01- Fed. Reg. Vol. 76, No. 237 (December 9, 2011/Proposed Rules). Agencies are encouraged to directly consult that document for complete documentation of HUD’s standards relating to HMISstandards, and hereby agree to incorporate any changes to HUD policy into their computing environment on the timeline specified by HUD. Agency will allow access to the HMIS Comparable Database only from computers which are:
i. protected from viruses by commercially available virus protection software (a) that includes, at a minimum, automated scanning of files as they are accessed by End Users on the system on which the HMIS Comparable Database application is accessed and (b) with virus definitions that are regularly updated from the software vendor;
ii. protected with a secure software or hardware firewall between, at least, the workstation and any systems (including the internet and other computer networks) located outside of the Agency;
iii. maintained to ensure that the computer operating system running the computer used for the HMIS Comparable Database is kept up to date in terms of security and other operating system patches, updates, and fixes;
iv. accessed through web browsers with 128-bit encryption (e.g., Internet Explorer, and Google Chrome). Some browsers have the capacity to remember passwords, so that the End User does not need to type in the password when returning to password-protected sites. This default shall not be used with respect to the HMISComparable Database; the End User is expected to physically enter the password each time he or she logs on to the system; and
v. staffed at all times when in public areas. When computers are not in use and staff is not present, steps should be taken to ensure that the computers and data are secure and not usable by unauthorized individuals. These steps should minimally include (a) logging off the HMIS Comparable Database system, (b) physically locking the computer in a secure area, (c) shutting down the computer entirely, or (d) using a password protected screen saver.
Appears in 1 contract
Samples: Agency Participation Agreement
Computers. Security for data maintained in the NW Social Service Connections HMIS depends on a secure computing environment. Computer security is adapted from relevant provisions of the Department of Housing and Urban Development’s (“HUD”) “Homeless Management Information Systems (HMIS); ) Data and Technical Standards Proposed RuleNotice” (Docket No. FR 54754848-P-01- Fed. Reg. Vol. 76, No. 237 (December 9, 2011/Proposed RulesN-02; see xxxx://xxx.xxx.xxx/offices/cpd/homeless/hmis). Agencies are encouraged to directly consult that document for complete documentation of HUD’s standards relating to HMIS, . BHCD and hereby agree THE LEAD ORGANIZATIONS may add additional standards and will provide notice(s) to incorporate any changes to HUD policy into their computing environment on the timeline specified by HUDParticipants. Agency The Participant will allow access to the HMIS only from computers which are:
i. a. physically present on Participant’s premises;
b. owned by Participant; or
c. approved by Participant for the purpose of accessing and utilizing HMIS; and
d. protected from viruses by commercially available virus protection software (a) that includes, at a minimum, automated scanning of files as they are accessed by End Users on the system on which the HMIS application is accessed and (b) with virus definitions that are regularly updated from the software vendor;software,
ii. e. protected with a secure software or hardware firewall between, at least, the workstation and any systems (including the internet and other computer networks) located outside of the Agency;protected from spyware,
iii. f. maintained to ensure insure that the computer operating system running the computer used for the HMIS is kept up to date in terms of security and other operating system patches, updates, and fixes;
iv. , g. accessed through web browsers with 128-bit encryption (e.g., Internet Explorer, and Google Chromeversion 6.0). Some browsers have the capacity to remember passwords, so that the End User user does not need to type in the password when returning to password-protected sites. This default shall not be used with respect to the NWSSC HMIS; the End User end-user is expected required to physically enter the password each time he or she logs on to the system; and,
v. h. secured with password protected screen savers,
i. staffed at all times when in Participant public areas. When computers are not in use and staff is are not present, steps should be taken to ensure that the computers and data are secure and not usable by unauthorized individualspublicly accessible. These steps should minimally include (a) logging include: Logging off the HMIS data entry system, (b) physically locking the computer in a secure area, (c) or shutting down the computer entirely, or (d) using a password protected screen saver.
Appears in 1 contract
Samples: Agency Participation Agreement
Computers. Security for data maintained in the Snohomish County’s HMIS depends on a secure computing environment. Computer The computer security is requirements contained in this subsection are adapted from relevant provisions of the Department of Housing and Urban Development’s (“HUD”) “Homeless Management Information Systems (HMIS); Data and Technical Standards Proposed Rule” (Docket NoHUD Final Notice. FR 5475-P-01- Fed. Reg. Vol. 76, No. 237 (December 9, 2011/Proposed Rules). Agencies are encouraged The Agency is expected to directly consult that document the HUD Final Notice for complete documentation of HUD’s standards relating to HMIS, and hereby agree to incorporate any changes to HUD policy into their computing environment on the timeline specified by HUD. The Agency will allow access to the HMIS only from computers which are:
i. (i) physically present on Agency’s premises; and owned by Agency, or approved by Agency for the purpose of accessing and working with HMIS;
(ii) protected from viruses by commercially available virus protection software (aA) that includes, at a minimum, automated scanning of files as they are accessed by End Users users on the system on which the HMIS application is accessed housed and (bB) with virus definitions that are regularly updated from the software vendor;
ii. (iii) protected with a secure software or hardware firewall between, at least, the workstation and any systems (including the internet and other computer networks) located outside of the Agency;
iii. (iv) maintained to ensure that the computer operating system running the computer used for the HMIS is kept up to date in terms of security and other operating system patches, updates, and fixes;
iv. (v) accessed through web browsers with 128-bit encryption (e.g., Internet Explorer, and Google Chromeversion 6.0). Some browsers have the capacity to remember passwords, so that the End User user does not need to type in the password when returning to password-protected sites. This default shall not be used with respect to the Snohomish County’s HMIS; the End User end-user is expected to physically enter the password each time he or she logs on to the system; and
v. (vi) staffed at all times when in public areas. When computers are not in use and staff is not present, steps should be taken to ensure that the computers and data are secure and not usable by unauthorized individuals. These steps should minimally include (a) logging off the HMIS data entry system, ,
(b) physically locking the computer in a secure area, or (c) shutting down the computer entirely, or (d) using a password protected screen saver.
Appears in 1 contract
Samples: Hmis Agency Partner Agreement
Computers. Security for data maintained in the GA HMIS depends on a secure computing environment. Computer security is adapted from relevant provisions of the Department of Housing and Urban Development’s (“HUD”) “Homeless Management Information Systems (HMIS); HMIS Data and Technical Standards Proposed Rule” Rule (Docket No. FR 5475-P-01- P- 01- Fed. Reg. Vol. 76, No. 237 (December 9, 2011/Proposed Rules). Agencies are encouraged to directly consult that document for complete documentation of HUD’s standards relating to HMIS, and hereby agree to incorporate any changes to HUD policy into their computing environment on the timeline specified by HUD. Agency will allow access to the GA HMIS only from computers which are:
i. protected from viruses by commercially available virus protection software (a) that includes, at a minimum, automated scanning of files as they are accessed by End Users on the system on which the HMIS application is accessed and (b) with virus definitions that are regularly updated from the software vendor;.
ii. protected with a secure software or hardware firewall between, at least, the workstation and any systems (including the internet and other computer networks) located outside of the Agency;
iii. maintained to ensure that the computer operating system running the computer used for the HMIS is kept up to date in terms of security and other operating system patches, updates, and fixes;
iv. accessed through web browsers with 128-bit encryption (e.g., Internet Explorer, and Google Chrome). Some browsers have the capacity to remember passwords, so that the End User does not need to type in the password when returning to password-password- protected sites. This default shall not be used with respect to the HMIS; the End User is expected to physically enter the password each time he or she logs on to the system; and
v. staffed at all times when in public areas. When computers are not in use and staff is not present, steps should be taken to ensure that the computers and data are secure and not usable by unauthorized individuals. These steps should minimally include (a) logging off the HMIS system, (b) physically locking the computer in a secure area, (c) shutting down the computer entirely, or (d) using a password protected screen saver.
Appears in 1 contract