Data Integrity and Back up Procedures Sample Clauses

Data Integrity and Back up Procedures. Each Contractor shall anticipate and prepare for the loss of information processing capabilities. The routine backing up of all data and software is required to recover from losses or outages of the computer system. Data and software essential to the continued operation of Contractor functions must be backed up. The security controls over the backup resources shall be as stringent as the protection required of the primary resources. A copy of the backed-up data shall be stored in a secure, offsite location.
AutoNDA by SimpleDocs
Data Integrity and Back up Procedures. The Sub-Recipient shall anticipate and prepare for the loss of information processing capabilities. The routine backing up of all data and software is required to recover from losses or outages of the computer system. Data and software essential to the continued operation of Sub-Recipient functions must be backed up. The security controls over the backup resources shall be as stringent as the protection required of the primary resources. A copy of the backup data shall be stored in a secure, offsite location.

Related to Data Integrity and Back up Procedures

  • Testing Procedures Testing will be conducted by an outside certified Agency in such a way to ensure maximum accuracy and reliability by using the techniques, chain of custody procedures, equipment and laboratory facilities which have been approved by the U.S. Department of Health and Human Services. All employees notified of a positive controlled substance or alcohol test result may request an independent test of their split sample at the employee’s expense. If the test result is negative the Employer will reimburse the employee for the cost of the split sample test.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • POST ONLINE PUBLIC AUCTION PROCEDURES 4.1. Successful E-bidders shall and undertake to sign the Memorandum of Sale at the office of the Auctioneer within 3 working days from the date of auction, failing which the deposit paid will be forfeited to the Assignee bank and the sale will be deemed cancelled/terminated and the property may be put up again for subsequent auction without further notice to the said E-Bidders. The Auctioneer shall send the Memorandum of Sale for stamping and thereafter forward the same together with the required deposit paid under Clause 2.4 above and the differential sum paid under this clause (if any) to the Assignee bank.

  • Information Safeguards Business Associate will develop, document, implement, maintain and use appropriate administrative, technical and physical safeguards to preserve the integrity and confidentiality of and to prevent non-permitted use or disclosure of PHI created for or received from Recipient or its Subsidiaries. These safeguards must be appropriate to the size and complexity of Business Associate’s operations and the nature and scope of its activities. Business Associate agrees that these safeguards will meet any applicable requirements set forth by the U.S. Department of Health and Human Services, including (as of the effective date or as of the compliance date, whichever is applicable) any requirements set forth in the final HIPAA security regulations. Business Associate agrees to mitigate, to the extent practicable, any harmful effect that is known to Business Associate resulting from a use or disclosure of PHI by Business Associate in violation of the requirements of this Addendum.

Time is Money Join Law Insider Premium to draft better contracts faster.