Method of Transfer. (1) All Data transfers to or from the Contractor shall be made by using an approved solution that meets agency and state IT security standards. (2) Approved options include: (a) SFT service provide Washington Technology Solutions (WaTech) (b) The DCYF instance of Xxx.xxx (3) Any information containing sensitive data elements must be encrypted and password protected using a tool such as WinZip, 7zip, or something similar. (4) An account is required to access either of the above solutions, you will need to make a request by contacting the contract contact listed on the cover page of this Agreement. (5) Any other solutions must be approved by the DCYF Information Security Office. To obtain approval, contact the contract contact listed on the first page of this Agreement. Request must include the name of the solution, as well as, any information to help in the approval process.
Appears in 32 contracts
Samples: Service Contract, Service Contract, Service Contract
Method of Transfer. (1) All Data transfers to or from the Contractor shall be made by using an approved solution that meets agency and state IT security standards.
(2) Approved options include:
(a) SFT MFT service provide Washington Technology Solutions (WaTech)
(b) The DCYF instance of Xxx.xxx
(3) Any information containing sensitive data elements must be encrypted and password protected using a tool such as WinZip, 7zip, or something similar.
(4) An account is required to access either of the above solutions, you will need to make a request by contacting the contract contact listed on the cover page of this Agreement.
(5) Any other solutions must be approved by the DCYF Information Security Office. To obtain approval, contact the contract contact listed on the first page of this Agreement. Request must include the name of the solution, as well as, any information to help in the approval process.
Appears in 1 contract
Samples: Service Contract