Minimum Security Requirements Sample Clauses

Minimum Security Requirements. Each insurance policy required hereunder shall be (1) subject to reasonable approval by City that it conforms with the requirements of this Section, and (2) be issued by an insurer rated A–:VII or higher in the then-current A. M. Best’s Key Rating Guide and licensed to do business in the State of Washington unless procured under the provisions of chapter 48.15 RCW (Unauthorized insurers).
AutoNDA by SimpleDocs
Minimum Security Requirements. Each insurance policy required hereunder shall be issued by an insurer rated A-:VIII or higher in the then-current A. M. Best’s Key Rating Guide.
Minimum Security Requirements. A General Computing Environment: CalHR and Departments shall comply with all of State Fund's requirements in relation to the security of the State Fund Facilities, including the State Fund computing environment. CalHR and Department Personnel shall execute all documents generally required by State Fund for access to State Fund's computing environment or other restricted access areas. CalHR and Departments agree that any and all security measures may be changed from time-to-time, and further agree to abide by the then-current security measures, as they are provided to CalHR. B System Access: CalHR and Departments represent and warrant to State Fund that they shall not alter any hardware or software security residing on State Fund's hardware or systems, including allowing non-read only access. CalHR and Departments further represent and warrant to State Fund that they shall not allow unauthorized traffic to pass into State Fund's networks. If CalHR or Departments do allow unauthorized traffic to pass into State Fund's networks, State Fund may immediately terminate such access in addition to any other remedies that State Fund may have under this Agreement. C Network Connections: CalHR and Departments agree to allow State Fund to perform network assessments of any CalHR or Department connections to State Fund's networks on a schedule reasonably required by State Fund. In the event a network connection is created between the Parties, Departments agree to maintain an alert status regarding all vulnerabilities and security patches or corrective actions by subscribing to an industry-recognized service, such as CERT or CIAC. CalHR understands that should a State Fund assessment reveal inappropriate or inadequate security based on State Fund’s requirements for security, State Fund may, in addition to other remedies it may have under this Agreement, remove CalHR and Department access to the State Fund network until CalHR and Departments satisfactorily comply with the applicable security requirements. D Electronic Authentication:
Minimum Security Requirements. To promote the confidentiality, integrity, and availability of EHI and minimize the potential for Breaches of EHI, each Participant Member shall be required to: (i) maintain reasonable and appropriate administrative, technical, and physical safeguards for protecting EHI; (ii) protect against reasonably anticipated impermissible Uses and Disclosures of EHI; (iii) identify and protect against reasonably anticipated threats to the security or integrity of EHI; and (iv) monitor compliance with such safeguards by its workforce. In determining which administrative, technical and physical safeguards to implement, the Participant Member shall consider the following: (i) its size, complexity, and capabilities; (ii) its technical, hardware, and software infrastructure; (iii) the costs of security measures; and (iv) the likelihood and possible impact of potential risks to EHI. Each Participant Member further shall review and modify such safeguards to continue protecting EHI in a changing environment of security threats within a reasonable period of time. Additionally, each Participant Member shall be required to implement the following minimum security requirements described below.
Minimum Security Requirements. (A) General Computing Environment: CalHR and Departments shall comply with all of State Fund's requirements in relation to the security of the State Fund Facilities, including the State Fund computing environment. CalHR and Department Personnel shall execute all documents generally required by State Fund for access to State Fund's computing environment or other restricted access areas. CalHR and Departments agree that any and all security measures may be changed from time-to-time, and further agree to abide by the then-current security measures, as they are provided to CalHR.
Minimum Security Requirements. The System shall include the following, minimum security requirements:
Minimum Security Requirements. 1. The Broker shall:
AutoNDA by SimpleDocs
Minimum Security Requirements. The Data Processor shall by itself, and shall ensure that its Sub-processor(s) (if any), at all times comply with the following minimum-security requirements:
Minimum Security Requirements. The MRTCs Draft 2 requires that QHINs comply with the HIPAA Privacy and Security Rules as it pertains to EHI. Also, QHINs must evaluate their security program for the protection of Controlled Unclassified Information (CUI), and develop and implement an action plan to comply with the security requirements of the most recently published version of the NIST Special Publication 800-171 (Protecting Controlled Unclassified Information in Non-federal Information Systems and Organizations). A CUI category includes EHI. This Publication provides principle guidelines to federal government-wide requirements for CUI, and entities which handle EHI are required to demonstrate the security controls and be compliant with the NIST 800-171 requirements of the most recent publication. In addition, as part of its ongoing security risk analysis and risk management program, QHINs shall review the most recently published version of the HIPAA Security Rule Crosswalk to the NIST Cybersecurity Framework. The NIST Cybersecurity Framework is guidance that was developed with industry for organizations to better manage and reduce cybersecurity risks. Additionally, it was designed to xxxxxx risk and cybersecurity management communications among both internal and external organizational stakeholders. The NIST Cybersecurity Framework is based on existing standards, guidelines, and practices. To the extent the QHIN’s risk analysis identifies any risks, vulnerabilities, or gaps in the QHIN’s compliance with the HIPAA Privacy and Security Rules or other Applicable Law, the QHIN would be required to assess and implement appropriate security measures consistent with industry standards and best practices that it determines would be reasonable and appropriate to ensure the confidentiality, integrity and availability of the EHI that it creates, receives, maintains or transmits, and provide documentation of any such evaluation. This evaluation would not be required for Participants and Participant Members. QHINs are to evaluate their security program on at least an annual basis. Participants and Participant Members must comply with the HIPAA Privacy and Security Rules and Applicable Law, when applicable. However, regardless of whether they are a Covered Entity or Business Associate, Participants and Participant Members must take reasonable steps to promote the confidentiality, integrity, and availability of EHI, including maintaining reasonable and appropriate administrative, technical, and physic...
Minimum Security Requirements. All external doors are fitted with appropriate locking mechanisms - All French doors, patio doors and windows are fitted with appropriate security locks
Time is Money Join Law Insider Premium to draft better contracts faster.