DATA AUTHENTICITY AND INTEGRITY; BACKUPS Sample Clauses

DATA AUTHENTICITY AND INTEGRITY; BACKUPS. 6.1. Supplier will take reasonable measures, including audit trails, to protect University Data against deterioration or degradation of data quality and authenticity.
AutoNDA by SimpleDocs

Related to DATA AUTHENTICITY AND INTEGRITY; BACKUPS

  • Medical Records Medical records relating to Trial Subjects that are not submitted to Sponsor may include some of the same information as is included in Trial Data; however, Sponsor makes no claim of ownership to those documents or the information they contain. c.

  • E-Verification If applicable, Contractor represents and warrants that it will ensure its compliance with the Mississippi Employment Protection Act of 2008, and will register and participate in the status verification system for all newly hired employees. Mississippi Code Annotated §§ 71-11-1 et seq. The term “employee” as used herein means any person that is hired to perform work within the State of Mississippi. As used herein, “status verification system” means the Illegal Immigration Reform and Immigration Responsibility Act of 1996 that is operated by the United States Department of Homeland Security, also known as the E-Verify Program, or any other successor electronic verification system replacing the E-Verify Program. Contractor agrees to maintain records of such compliance. Upon request of the State and after approval of the Social Security Administration or Department of Homeland Security when required, Contractor agrees to provide a copy of each such verification. Contractor further represents and warrants that any person assigned to perform services hereafter meets the employment eligibility requirements of all immigration laws. The breach of this agreement may subject Contractor to the following:

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Review of Records Business Associate agrees to make internal practices, books, and records relating to the use and Disclosure of PHI received from, or created or received by Business Associate on behalf of Covered Entity available to Covered Entity, or at the request of Covered Entity to the Secretary, in a time and manner designated by Covered Entity or the Secretary, for purposes of the Secretary determining Covered Entity’s compliance with the HIPAA Regulations. Business Associate agrees to make copies of its HIPAA training records and HIPAA business associate agreements with agents and subcontractors available to Covered Entity at the request of Covered Entity.

  • Electronic Visit Verification (EVV). Provider shall cooperate with State requirements for electronic visit verification for personal care services and home health services, as applicable.

Time is Money Join Law Insider Premium to draft better contracts faster.