Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.
Video recording During the Construction Period, the Contractor shall provide to the Authority for every calendar quarter, a video recording, which will be compiled into a 3 (three)- hour compact disc or digital video disc, as the case may be, covering the status and progress of Works in that quarter. The video recording shall be provided to the Authority no later than 15 (fifteen) days after the close of each quarter after the Appointed Date.
Reproduction of Documents This Agreement and all schedules, exhibits, attachments and amendments hereto may be reproduced by any photographic, photostatic, microfilm, micro-card, miniature photographic or other similar process. The parties hereto each agree that any such reproduction shall be admissible in evidence as the original itself in any judicial or administrative proceeding, whether or not the original is in existence and whether or not such reproduction was made by a party in the regular course of business, and that any enlargement, facsimile or further reproduction shall likewise be admissible in evidence.
Photographic/Recording Release I hereby grant and convey unto the Released Parties all right, title and interest in any and all photographs and video/audio/electronic recordings of me, including as to my name, image and voice, made by or on behalf of any of the Released Parties during my Activities with the Released Parties, including, but not limited to, the right to use such materials for any purpose and to any royalties, proceeds or other benefits derived from them. I understand that I will not have any ownership interest in or to such photographs, images and/or recordings, I have not been provided or promised any compensation to me, and I hereby waive any rights, privileges or claims based on any right of publicity, privacy, ownership or any other rights arising, relating to or resulting from the photographs, images and/or recordings. I understand and agree that this paragraph also applies to my minor child(ren) who are volunteering.
Operator’s Security Contact Information Xxxxxxx X. Xxxxxxx Named Security Contact xxxxxxxx@xxxxxxxxx.xxx Email of Security Contact (000) 000-0000 Phone Number of Security Contact
Identification and Disclosure of Privacy and Security Offices Business Associate and Subcontractors shall provide, within ten (10) days of the execution of this agreement, written notice to the Covered Entity’s contract/grant manager the names and contact information of both the HIPAA Privacy Officer and HIPAA Security Officer. This information must be updated any time either of these contacts changes.
PERSONAL INFORMATION PRIVACY AND SECURITY CONTRACT 11 Any reference to statutory, regulatory, or contractual language herein shall be to such language as in 12 effect or as amended.
Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.