Common use of Integrity Controls & Data Protection Clause in Contracts

Integrity Controls & Data Protection. All computer workstations accessing IPAWS-OPEN must be protected by up-to-date anti-virus software. Virus scans must be performed on a periodic basis and when notified by the anti-virus software. • Users accessing interoperable system(s) to utilize IPAWS-OPEN must: o Physically protect computing devices such as laptops, PEDs, blackberry devices, smartphones, etc; o Protect sensitive data sent to or received from IPAWS-OPEN; o Not use peer-to-peer (P2P) file sharing, which can provide a mechanism for the spreading of viruses and put sensitive information at risk; o Not program computing devices with automatic sign-on sequences, passwords or access credentials when utilizing IPAWS-OPEN. Users may not provide personal or official IPAWS-OPEN information solicited by e-mail. If e-mail messages are received from any source requesting personal information or asking to verify accounts or other authentication credentials, immediately report this and provide the questionable e-mail to the Local System Administrator and/or the Xxxxx County Emergency Management Agency Help Desk. • Only devices officially issued through or approved by DHS, FEMA and/or approved emergency management organizations are authorized for use to interoperate with IPAWS-OPEN and use of personal devices to access and/or store IPAWS-OPEN data and information is prohibited. • If a Blackberry, smartphone or other PED is used to access the interoperable system(s) to utilize IPAWS- OPEN, the device must be password protected and configured to timeout or lock after 10 minutes of inactivity. • If sensitive information is processed, stored, or transmitted on wireless devices, it must be encrypted using approved encryption methods.

Appears in 1 contract

Samples: lcapps.co.lucas.oh.us

AutoNDA by SimpleDocs

Integrity Controls & Data Protection. All computer workstations accessing IPAWS-OPEN must be protected by up-to-date anti-virus software. Virus scans must be performed on a periodic basis and when notified by the anti-virus software. Users accessing interoperable system(s) to utilize IPAWS-OPEN must: o Physically protect computing devices such as laptops, PEDs, blackberry devices, smartphones, etc; o Protect sensitive data sent to or received from IPAWS-OPEN; o Not use peer-to-peer (P2P) file sharing, which can provide a mechanism for the spreading of viruses and put sensitive information at risk; o Not program computing devices with automatic sign-on sequences, passwords or access credentials when utilizing IPAWS-OPEN. Users may not provide personal or official IPAWS-OPEN information solicited by e-mail. If e-mail messages are received from any source requesting personal information or asking to verify accounts or other authentication credentials, immediately report this and provide the questionable e-mail to the Local System Administrator and/or the Xxxxx Fort Bend County Emergency Management Agency Help Desk. Only devices officially issued through or approved by DHS, FEMA and/or approved emergency management organizations are authorized for use to interoperate with IPAWS-OPEN and use of personal devices to access and/or store IPAWS-OPEN data and information is prohibited. If a Blackberry, smartphone or other PED is used to access the interoperable system(s) to utilize IPAWS- OPEN, the device must be password protected and configured to timeout or lock after 10 minutes of inactivity. If sensitive information is processed, stored, or transmitted on wireless devices, it must be encrypted using approved encryption methods.

Appears in 1 contract

Samples: Memorandum of Agreement

Integrity Controls & Data Protection. All computer workstations accessing IPAWS-OPEN must be protected by up-to-date anti-virus software. Virus scans must be performed on a periodic basis and when notified by the anti-virus software. • Users accessing interoperable system(s) to utilize IPAWS-OPEN must: o Physically protect computing devices such as laptops, PEDs, blackberry devices, smartphones, etc; o Protect sensitive data sent to or received from IPAWS-OPEN; o Not use peer-to-peer (P2P) file sharing, which can provide a mechanism for the spreading of viruses and put sensitive information at risk; o Not program computing devices with automatic sign-on sequences, passwords or access credentials when utilizing IPAWS-OPEN. Users may not provide personal or official IPAWS-OPEN information solicited by e-mail. If e-mail messages are received from any source requesting personal information or asking to verify accounts or other authentication credentials, immediately report this and provide the questionable e-mail to the Local System Administrator and/or the Xxxxx County Emergency Management Agency Gila County, Arizona Help Desk. • Only devices officially issued through or approved by DHS, FEMA and/or approved emergency management organizations are authorized for use to interoperate with IPAWS-OPEN and use of personal devices to access and/or store IPAWS-OPEN data and information is prohibited. • If a Blackberry, smartphone or other PED is used to access the interoperable system(s) to utilize IPAWS- OPEN, the device must be password protected and configured to timeout or lock after 10 minutes of inactivity. • If sensitive information is processed, stored, or transmitted on wireless devices, it must be encrypted using approved encryption methods.

Appears in 1 contract

Samples: agenda.gilacountyaz.gov

Integrity Controls & Data Protection. All computer workstations accessing IPAWS-OPEN must be protected by up-to-date anti-virus software. Virus scans must be performed on a periodic basis and when notified by the anti-virus software. • Users accessing interoperable system(s) to utilize IPAWS-OPEN must: o Physically protect computing devices such as laptops, PEDs, blackberry devices, smartphones, etc; o Protect sensitive data sent to or received from IPAWS-OPEN; o Not use peer-to-peer (P2P) file sharing, which can provide a mechanism for the spreading of viruses and put sensitive information at risk; o Not program computing devices with automatic sign-on sequences, passwords or access credentials when utilizing IPAWS-OPEN. Users may not provide personal or official IPAWS-OPEN information solicited by e-mail. If e-mail messages are received from any source requesting personal information or asking to verify accounts or other authentication credentials, immediately report this and provide the questionable e-mail to the Local System Administrator and/or the Xxxxx County Emergency Management Agency Cochise County, Arizona Help Desk. • Only devices officially issued through or approved by DHS, FEMA and/or approved emergency management organizations are authorized for use to interoperate with IPAWS-OPEN and use of personal devices to access and/or store IPAWS-OPEN data and information is prohibited. • If a Blackberry, smartphone or other PED is used to access the interoperable system(s) to utilize IPAWS- OPEN, the device must be password protected and configured to timeout or lock after 10 minutes of inactivity. • If sensitive information is processed, stored, or transmitted on wireless devices, it must be encrypted using approved encryption methods.

Appears in 1 contract

Samples: agenda.cochise.az.gov

Integrity Controls & Data Protection. All computer workstations accessing IPAWS-OPEN must be protected by up-to-date anti-virus software. Virus scans must be performed on a periodic basis and when notified by the anti-virus software. • Users accessing interoperable system(s) to utilize IPAWS-OPEN must: o Physically protect computing devices such as laptops, PEDs, blackberry devices, smartphones, etc; o Protect sensitive data sent to or received from IPAWS-OPEN; o Not use peer-to-peer (P2P) file sharing, which can provide a mechanism for the spreading of viruses and put sensitive information at risk; o Not program computing devices with automatic sign-on sequences, passwords or access credentials when utilizing IPAWS-OPEN. Users may not provide personal or official IPAWS-OPEN information solicited by e-mail. If e-mail messages are received from any source requesting personal information or asking to verify accounts or other authentication credentials, immediately report this and provide the questionable e-mail to the Local System Administrator and/or the Xxxxx Merced County Office of Emergency Management Agency Services Help Desk. • Only devices officially issued through or approved by DHS, FEMA and/or approved emergency management organizations are authorized for use to interoperate with IPAWS-OPEN and use of personal devices to access and/or store IPAWS-OPEN data and information is prohibited. • If a Blackberry, smartphone or other PED is used to access the interoperable system(s) to utilize IPAWS- OPEN, the device must be password protected and configured to timeout or lock after 10 minutes of inactivity. • If sensitive information is processed, stored, or transmitted on wireless devices, it must be encrypted using approved encryption methods.

Appears in 1 contract

Samples: web2.co.merced.ca.us

Integrity Controls & Data Protection. All computer workstations accessing IPAWS-OPEN must be protected by up-to-date anti-virus software. Virus scans must be performed on a periodic basis and when notified by the anti-virus software. • Users accessing interoperable system(s) to utilize IPAWS-OPEN must: o Physically protect computing devices such as laptops, PEDs, blackberry devices, smartphones, etc; o Protect sensitive data sent to or received from IPAWS-OPEN; o Not use peer-to-peer (P2P) file sharing, which can provide a mechanism for the spreading of viruses and put sensitive information at risk; o Not program computing devices with automatic sign-on sequences, passwords or access credentials when utilizing IPAWS-OPEN. Users may not provide personal or official IPAWS-OPEN information solicited by e-mail. If e-mail messages are received from any source requesting personal information or asking to verify accounts or other authentication credentials, immediately report this and provide the questionable e-mail to the Local System Administrator and/or the Xxxxx Santa Xxxx County Emergency Management Agency Board of County Commisisoners Help Desk. • Only devices officially issued through or approved by DHS, FEMA and/or approved emergency management organizations are authorized for use to interoperate with IPAWS-OPEN and use of personal devices to access and/or store IPAWS-OPEN data and information is prohibited. • If a Blackberry, smartphone or other PED is used to access the interoperable system(s) to utilize IPAWS- OPEN, the device must be password protected and configured to timeout or lock after 10 minutes of inactivity. • If sensitive information is processed, stored, or transmitted on wireless devices, it must be encrypted using approved encryption methods.

Appears in 1 contract

Samples: santarosacofl.civicclerk.com

Integrity Controls & Data Protection. All computer workstations accessing IPAWS-OPEN must be protected by up-to-date anti-virus software. Virus scans must be performed on a periodic basis and when notified by the anti-virus software. • Users accessing interoperable system(s) to utilize IPAWS-OPEN must: o Physically protect computing devices such as laptops, PEDs, blackberry devices, smartphones, etc; o Protect sensitive data sent to or received from IPAWS-OPEN; o Not use peer-to-peer (P2P) file sharing, which can provide a mechanism for the spreading of viruses and put sensitive information at risk; o Not program computing devices with automatic sign-on sequences, passwords or access credentials when utilizing IPAWS-OPEN. Users may not provide personal or official IPAWS-OPEN information solicited by e-mail. If e-mail messages are received from any source requesting personal information or asking to verify accounts or other authentication credentials, immediately report this and provide the questionable e-mail to the Local System Administrator and/or the Xxxxx Fort Bend County Emergency Management Agency Help Desk. • Only devices officially issued through or approved by DHS, FEMA and/or approved emergency management organizations are authorized for use to interoperate with IPAWS-OPEN and use of personal devices to access and/or store IPAWS-OPEN data and information is prohibited. • If a Blackberry, smartphone or other PED is used to access the interoperable system(s) to utilize IPAWS- OPEN, the device must be password protected and configured to timeout or lock after 10 minutes of inactivity. • If sensitive information is processed, stored, or transmitted on wireless devices, it must be encrypted using approved encryption methods.

Appears in 1 contract

Samples: Memorandum of Agreement

Integrity Controls & Data Protection. All computer workstations accessing IPAWS-OPEN must be protected by up-to-date anti-virus software. Virus scans must be performed on a periodic basis and when notified by the anti-virus software. • Users accessing interoperable system(s) to utilize IPAWS-OPEN must: o Physically protect computing devices such as laptops, PEDs, blackberry devices, smartphones, etc; o Protect sensitive data sent to or received from IPAWS-OPEN; o Not use peer-to-peer (P2P) file sharing, which can provide a mechanism for the spreading of viruses and put sensitive information at risk; o Not program computing devices with automatic sign-on sequences, passwords or access credentials when utilizing IPAWS-OPEN. Users may not provide personal or official IPAWS-OPEN information solicited by e-mail. If e-mail messages are received from any source requesting personal information or asking to verify accounts or other authentication credentials, immediately report this and provide the questionable e-mail to the Local System Administrator and/or the Xxxxx County Emergency Management Agency City of Angleton Help Desk. • Only devices officially issued through or approved by DHS, FEMA and/or approved emergency management organizations are authorized for use to interoperate with IPAWS-OPEN and use of personal devices to access and/or store IPAWS-OPEN data and information is prohibited. • If a Blackberry, smartphone or other PED is used to access the interoperable system(s) to utilize IPAWS- OPEN, the device must be password protected and configured to timeout or lock after 10 minutes of inactivity. • If sensitive information is processed, stored, or transmitted on wireless devices, it must be encrypted using approved encryption methods.

Appears in 1 contract

Samples: Memorandum of Agreement

AutoNDA by SimpleDocs

Integrity Controls & Data Protection. All computer workstations accessing IPAWS-OPEN must be protected by up-to-date anti-virus software. Virus scans must be performed on a periodic basis and when notified by the anti-virus software. • Users accessing interoperable system(s) to utilize IPAWS-OPEN must: o Physically protect computing devices such as laptops, PEDs, blackberry devices, smartphones, etc; o Protect sensitive data sent to or received from IPAWS-OPEN; o Not use peer-to-peer (P2P) file sharing, which can provide a mechanism for the spreading of viruses and put sensitive information at risk; o Not program computing devices with automatic sign-on sequences, passwords or access credentials when utilizing IPAWS-OPEN. Users may not provide personal or official IPAWS-OPEN information solicited by e-mail. If e-mail messages are received from any source requesting personal information or asking to verify accounts or other authentication credentials, immediately report this and provide the questionable e-mail to the Local System Administrator and/or the Xxxxx County Emergency Management Agency Charlotte County, Florida Help Desk. • Only devices officially issued through or approved by DHS, FEMA and/or approved emergency management organizations are authorized for use to interoperate with IPAWS-OPEN and use of personal devices to access and/or store IPAWS-OPEN data and information is prohibited. • If a Blackberry, smartphone or other PED is used to access the interoperable system(s) to utilize IPAWS- OPEN, the device must be password protected and configured to timeout or lock after 10 minutes of inactivity. • If sensitive information is processed, stored, or transmitted on wireless devices, it must be encrypted using approved encryption methods.

Appears in 1 contract

Samples: Memorandum of Agreement

Integrity Controls & Data Protection. All computer workstations accessing IPAWS-OPEN must be protected by up-to-date anti-virus software. Virus scans must be performed on a periodic basis and when notified by the anti-virus software. • Users accessing interoperable system(s) to utilize IPAWS-OPEN must: o Physically protect computing devices such as laptops, PEDs, blackberry devices, smartphones, etc; o Protect sensitive data sent to or received from IPAWS-OPEN; o Not use peer-to-peer (P2P) file sharing, which can provide a mechanism for the spreading of viruses and put sensitive information at risk; o Not program computing devices with automatic sign-on sequences, passwords or access credentials when utilizing IPAWS-OPEN. Users may not provide personal or official IPAWS-OPEN information solicited by e-mail. If e-mail messages are received from any source requesting personal information or asking to verify accounts or other authentication credentials, immediately report this and provide the questionable e-mail to the Local System Administrator and/or the Xxxxx Columbia County Emergency Management Agency Board of County Commissioners Help Desk. • Only devices officially issued through or approved by DHS, FEMA and/or approved emergency management organizations are authorized for use to interoperate with IPAWS-OPEN and use of personal devices to access and/or store IPAWS-OPEN data and information is prohibited. • If a Blackberry, smartphone or other PED is used to access the interoperable system(s) to utilize IPAWS- OPEN, the device must be password protected and configured to timeout or lock after 10 minutes of inactivity. • If sensitive information is processed, stored, or transmitted on wireless devices, it must be encrypted using approved encryption methods.

Appears in 1 contract

Samples: www.columbiacountyfla.com

Integrity Controls & Data Protection. All computer workstations accessing IPAWS-OPEN must be protected by up-to-date anti-virus software. Virus scans must be performed on a periodic basis and when notified by the anti-virus software. • Users accessing interoperable system(s) to utilize IPAWS-OPEN must: o Physically protect computing devices such as laptops, PEDs, blackberry devices, smartphones, etc; o Protect sensitive data sent to or received from IPAWS-OPEN; o Not use peer-to-peer (P2P) file sharing, which can provide a mechanism for the spreading of viruses and put sensitive information at risk; o Not program computing devices with automatic sign-on sequences, passwords or access credentials when utilizing IPAWS-OPEN. Users may not provide personal or official IPAWS-OPEN information solicited by e-mail. If e-mail messages are received from any source requesting personal information or asking to verify accounts or other authentication credentials, immediately report this and provide the questionable e-mail to the Local System Administrator and/or the Xxxxx Pacific County Emergency Management Agency Help Desk. • Only devices officially issued through or approved by DHS, FEMA and/or approved emergency management organizations are authorized for use to interoperate with IPAWS-OPEN and use of personal devices to access and/or store IPAWS-OPEN data and information is prohibited. • If a Blackberry, smartphone or other PED is used to access the interoperable system(s) to utilize IPAWS- OPEN, the device must be password protected and configured to timeout or lock after 10 minutes of inactivity. • If sensitive information is processed, stored, or transmitted on wireless devices, it must be encrypted using approved encryption methods.

Appears in 1 contract

Samples: Memorandum of Agreement

Integrity Controls & Data Protection. All computer workstations accessing IPAWS-OPEN must be protected by up-to-date anti-virus software. Virus scans must be performed on a periodic basis and when notified by the anti-virus software. • Users accessing interoperable system(s) to utilize IPAWS-OPEN must: o Physically protect computing devices such as laptops, PEDs, blackberry devices, smartphones, etc; o Protect sensitive data sent to or received from IPAWS-OPEN; o Not use peer-to-peer (P2P) file sharing, which can provide a mechanism for the spreading of viruses and put sensitive information at risk; o Not program computing devices with automatic sign-on sequences, passwords or access credentials when utilizing IPAWS-OPEN. Users may not provide personal or official IPAWS-OPEN information solicited by e-mail. If e-mail messages are received from any source requesting personal information or asking to verify accounts or other authentication credentials, immediately report this and provide the questionable e-mail to the Local System Administrator and/or the Xxxxx Lancaster County Emergency Management Agency Help Desk. • Only devices officially issued through or approved by DHS, FEMA and/or approved emergency management organizations are authorized for use to interoperate with IPAWS-OPEN and use of personal devices to access and/or store IPAWS-OPEN data and information is prohibited. • If a Blackberry, smartphone or other PED is used to access the interoperable system(s) to utilize IPAWS- OPEN, the device must be password protected and configured to timeout or lock after 10 minutes of inactivity. • If sensitive information is processed, stored, or transmitted on wireless devices, it must be encrypted using approved encryption methods.

Appears in 1 contract

Samples: app.lincoln.ne.gov

Time is Money Join Law Insider Premium to draft better contracts faster.