Data Integrity and Safeguarding Information Sample Clauses

Data Integrity and Safeguarding Information. The Sub-Recipient shall ensure an appropriate level of data security for the information the Sub-Recipient is collecting or using in the performance of this contract. An appropriate level of security includes approving and tracking all Sub- Recipient employees that request system or information access and ensuring that user access has been removed from all terminated employees. The Sub-Recipient, among other requirements, must anticipate and prepare for the loss of information processing capabilities. All data and software shall be routinely backed up to ensure recovery from losses or outages of the computer system. The security over the backed-up data is to be as stringent as the protection required of the primary systems. The Sub-Recipient shall ensure all Subcontractors maintain written procedures for computer system backup and recovery. The Sub-Recipient shall complete and sign the Certification Regarding Data Integrity Compliance for Agreements, Grants, Loans, and Cooperative Agreements prior to the execution of this contract.
AutoNDA by SimpleDocs
Data Integrity and Safeguarding Information. The Contractor shall ensure an appropriate level of data security for the information the Contractor is collecting or using in the performance of this contract. An appropriate level of security includes approving and tracking all Contractor employees that request system or information access and ensuring that user access has been removed from all terminated employees. The Contractor, among other requirements, must anticipate and prepare for the loss of information processing capabilities. All data and software shall be routinely backed up to ensure recovery from losses or outages of the computer system. The security over the backed-up data is to be as stringent as the protection required of the primary systems. The Contractor shall ensure all Subcontractors maintain written procedures for computer system backup and recovery. The Contractor shall complete and sign the Certification Regarding Data Integrity Compliance for Agreements, Grants, Loans, and Cooperative Agreements prior to the execution of this contract.
Data Integrity and Safeguarding Information. The vendor shall ensure an appropriate level of data security for the information the vendor is collecting or using in the performance of this agreement. An appropriate level of security includes approving and tracking all vendor employees that request system or information access and ensuring that user access has been removed from all terminated employees. The vendor, among other requirements, must anticipate and prepare for the loss of information processing capabilities. All data and software must be routinely backed up to insure recovery from losses or outages of the computer system. The security over the backed-up data is to be as stringent as the protection required of the primary systems. The vendor shall insure all vendors maintain written procedures for computer system back-up and recovery. The vendor shall sign the Certification Regarding Data Integrity Compliance for Agreements, Grants, Loans and Cooperative Agreements prior to the execution of this agreement.
Data Integrity and Safeguarding Information. The sub-recipient shall ensure an appropriate level of data security for the information the sub-recipient is collecting or using in the performance of this contract. An appropriate level of security includes approving and tracking all employees that request system or information access and ensuring that user access has been removed from all terminated employees. The sub-recipient, among other requirements, must anticipate and prepare for the loss of information processing capabilities. All data and software must be routinely backed up to ensure recovery from losses or outages of the computer system. The security over the backed-up data is to be as stringent as the protection required of the primary systems. The sub-recipient shall ensure all of their subcontractors maintain written procedures for computer system back up and recovery. The sub-recipient shall complete and sign Attachment IV prior to the execution of this contract.
Data Integrity and Safeguarding Information. The Contractor shall ensure an appropriate level of data security for the information the Contractor is collecting or using in the performance of any contract or agreement incorporating this Master Contract by reference. An appropriate level of security includes approving and tracking all Contractor employees that request system or information access and ensuring that user access has been removed from all terminated employees. The Contractor, among other requirements, must anticipate and prepare for the loss of information processing capabilities. All data and software shall be routinely backed up to ensure recovery from losses or outages of the computer system. The security over the backed-up data is to be as stringent as the protection required of the primary systems. The Contractor shall ensure all Subcontractors maintain written procedures for computer system backup and recovery. The Contractor shall complete and sign ATTACHMENT III prior to the execution of the Master Contract.
Data Integrity and Safeguarding Information. The Provider shall ensure an appropriate level of data security for the information the Provider is collecting or using in the performance of this Agreement. An appropriate level of security includes approving and tracking all Provider employees that request system or information access and ensuring that user access has been removed from all terminated employees. The Provider, among other requirements, must anticipate and prepare for the loss of information processing capabilities. All data and software shall be routinely backed up to ensure recovery from losses or outages of the computer system. The security over the backed-up data is to be as stringent as the protection required of the primary systems. The Provider shall ensure all subcontractors maintain written procedures for computer system backup and recovery. The Provider shall complete and sign the Certification Regarding Data Integrity Compliance for Agreements, Grants, Loans, and Cooperative Agreements and return it with the Agreement to Agency contact. Electronic client records and files must be stored in an encrypted format at all times. Storage devices include, but not limited to, computer servers, mobile devices such as laptops, notebooks, and phones, removable media such as CD’s, jump drives, DVD’s and tape. Access shall be limited to staff members requiring the information in order to provide a service to the client. The Provider shall not send any client information via email unless the information is sent in a secured manner through a data encryption service for email systems or if the client file(s) are encrypted prior to sending via email. When faxing client information the Provider shall: Limit the client information to the minimum necessary to accomplish the purpose of the communication; When faxing to a client, do not fax sensitive protected health information (PHI) such as PHI related to alcohol abuse, drug abuse, mental health issues, HIV testing, antigens indicating hepatitis infection, sexually transmitted diseases (STD), or presence of malignancy; Take reasonable precautions to ensure that the intended recipient is either available to receive the fax as it arrives or has exclusive access to the fax machine; Pre-program frequently used non-patient fax numbers to minimize potential for misdirected faxes. Confirm pre-programmed numbers at least every six (6) months; If there is any reason to question the accuracy of a fax number, contact the recipient to confirm the number prior to...
Data Integrity and Safeguarding Information. (1) The subrecipient shall ensure an appropriate level of data security for the information the subrecipient is collecting or using in the performance of this contract, or any PSC referencing this contract. An appropriate level of security includes approving and tracking all subrecipient employees that request system or information access and ensuring that user access has been removed from all terminated employees.
AutoNDA by SimpleDocs
Data Integrity and Safeguarding Information. The Provider shall insure an appropriate level of data security for the information the Provider is collecting or using in the performance of this Agreement. An appropriate level of security includes approving and tracking all Provider employees that request system or information access and ensuring that user access has been removed from all terminated employees. The Provider, among other requirements, must anticipate and prepare for the loss of information processing capabilities. All data and software must be routinely backed up to insure recovery from losses or outages of the computer system. The security over the backed-up data is to be as stringent as the protection required of the primary systems. The Provider shall insure all subcontractors maintain written procedures for computer system back up and recovery. The Provider shall complete and sign ATTACHMENT III prior to the execution of the Master Agreement. Electronic client records and files must be stored in an encrypted format at all times. Storage devices include, but not limited to, computer servers, mobile devices such as laptops, notebooks, and phones, removable media such as CDs, jump drives, DVDs, and tape. Access shall be limited to staff members requiring the information in order to provide a service to the client. The Provider shall not send any client information via email unless the information is sent in a secured manner through a data encryption service for email systems or if the client file(s) are encrypted prior to sending via email. When faxing client information the Provider shall:
Data Integrity and Safeguarding Information. The Sub-recipient shall ensure an appropriate level of data security for the information the Sub-recipient is collecting or using in the performance of any contract or agreement incorporating this Master Contract by reference. An appropriate level of security includes approving and tracking all Sub-recipient employees that request system or information access and ensuring that user access has been removed from all terminated employees. The Sub-recipient, among other requirements, must anticipate and prepare for the loss of information processing capabilities. All data and software shall be routinely backed up to ensure recovery from losses or outages of the computer system. The security over the backed-up data is to be as stringent as the protection required of the primary systems. The Sub-recipient shall ensure all Subcontractors maintain written procedures for computer system backup and recovery. The Sub-recipient shall complete and sign ATTACHMENT III prior to the execution of the Master Contract.

Related to Data Integrity and Safeguarding Information

  • Confidentiality and Safeguarding Information 1. Each Party may have access to confidential information made available by the other. The provisions of the Florida Public Records Act, Chapter 119, F.S., and other applicable state and federal laws will govern disclosure of any confidential information received by the State of Florida.

  • Information Safeguards Business Associate will develop, document, implement, maintain and use appropriate administrative, technical and physical safeguards to preserve the integrity and confidentiality of and to prevent non-permitted use or disclosure of PHI created for or received from Recipient or its Subsidiaries. These safeguards must be appropriate to the size and complexity of Business Associate’s operations and the nature and scope of its activities. Business Associate agrees that these safeguards will meet any applicable requirements set forth by the U.S. Department of Health and Human Services, including (as of the effective date or as of the compliance date, whichever is applicable) any requirements set forth in the final HIPAA security regulations. Business Associate agrees to mitigate, to the extent practicable, any harmful effect that is known to Business Associate resulting from a use or disclosure of PHI by Business Associate in violation of the requirements of this Addendum.

  • Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: xxxx://xxx.xxxxxx-xxxxx.xxx/508.htm.

  • Customer Information CPNI of a Customer and any other non-public, individually identifiable information about a Customer or the purchase by a Customer of the services or products of a Party.

Time is Money Join Law Insider Premium to draft better contracts faster.