Data Integrity Policies and procedures to ensure the confidentiality, integrity, and availability of Customer Data or Professional Services Data and protect it from disclosure, improper alteration, or destruction.
Program Integrity The state must have processes in place to ensure that there is no duplication of federal funding for any aspect of the demonstration.
IT Systems Except as would not, individually or in the aggregate, have a Material Adverse Effect, the Company reasonably believes that (i) the Company and the Subsidiaries own or have a valid right to access and use all computer systems, networks, hardware, software, databases, websites, and equipment used to process, store, maintain and operate data, information, and functions used in connection with the business of the Company and the Subsidiaries (the “Company IT Systems”), (ii) the Company IT Systems are adequate for, and operate and perform as required in connection with, the operation of the business of the Company and the Subsidiaries as currently conducted and (iii) the Company and the Subsidiaries have implemented reasonable backup, security and disaster recovery technology consistent with applicable regulatory standards;
Integrity accountability, honesty and professional, ethical conduct in all that we do. Justice – valuing diversity, achieving health equality, cultural respect and a fair share for all.
Database The LERG is available through Telcordia. ICONN is available through the Qwest web site.
Evaluation Software If the Software is an evaluation version or is provided to You for evaluation purposes, then, unless otherwise approved in writing by an authorized representative of Licensor, Your license to use the Software is limited solely for internal evaluation purposes in non-production use and in accordance with the terms of the evaluation offering under which You received the Software, and expires 90 days from installation (or such other period as may be indicated within the Software). Upon expiration of the evaluation period, You must discontinue use of the Software, return to an original state any actions performed by the Software, and delete the Software entirely from Your system and You may not download the Software again unless approved in writing by an authorized representative of Licensor. The Software may contain an automatic disabling mechanism that prevents its use after a certain period of time. RESTRICTIONS
Data Integrity Control Personal Data will remain intact, complete and current during processing activities.
System Protection To prevent compromise of systems which contain DSHS Data or through which that Data passes: a. Systems containing DSHS Data must have all security patches or hotfixes applied within 3 months of being made available. b. The Contractor will have a method of ensuring that the requisite patches and hotfixes have been applied within the required timeframes. c. Systems containing DSHS Data shall have an Anti-Malware application, if available, installed. d. Anti-Malware software shall be kept up to date. The product, its anti-virus engine, and any malware database the system uses, will be no more than one update behind current.
Review Systems The Asset Representations Reviewer will maintain and utilize an electronic case management system to manage the Tests and provide systematic control over each step in the Review process and ensure consistency and repeatability among the Tests.
Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.