Computing and Communication. The Contractor shall select, in consultation with the Agency of Human Services’ Information Technology unit, one of the approved methods for secure access to the State’s systems and data, if required. Approved methods are based on the type of work performed by the Contractor as part of this agreement. Options include, but are not limited to:
Appears in 121 contracts
Samples: Business Associate Agreement, Personal Services Contract, Business Associate Agreement
Computing and Communication. The Contractor shall select, in consultation with the Agency of Human Services’ Information Technology unit, one of the approved methods for secure access to the State’s systems and data, if required. Approved methods are based on the type of work performed by the Contractor as part of this agreementContract. Options include, but are not limited to:
Appears in 2 contracts
Samples: Attachment E Business Associate Agreement, Attachment E Business Associate Agreement
Computing and Communication. The Contractor shall select, in consultation with the Agency of Human Services’ Information Technology unit, one of the approved methods for secure access to the State’s systems and data, if required. Approved methods are based on the type of work performed by the Contractor as part of this agreement. Options include, but are not limited to:
Appears in 2 contracts
Samples: Attachment E Business Associate Agreement, Business Associate Agreement
Computing and Communication. The Contractor shall select, in consultation with the Agency of Human Services’ Information Technology unit, one of the approved methods for secure access to the State’s systems and data, if required. Approved methods are based on the type of work performed by the Contractor as part of partof this agreement. Options include, but are not limited to:
Appears in 1 contract
Samples: Business Associate Agreement
Computing and Communication. The Contractor shall select, in consultation with the Agency of Human Services’ Information Technology unit, one of the approved methods for secure access to the State’s systems and data, if required. Approved methods are based on the type of work performed performe d by the Contractor as part of this agreement. Options include, but are not limited to:
Appears in 1 contract