Other Security Requirements. The Company shall maintain all technologies, policies, procedures and practices necessary to secure and protect the confidentiality and integrity of CCS student information, including procedures to (a) establish user IDs and passwords as necessary to protect such information; (b) protect all such user passwords from detection and unauthorized use; (c) prevent hostile or unauthorized intrusion that could result in data corruption, or deny service; (d) prevent and detect computer viruses from spreading to disks, attachments to e-mail, downloaded files, and documents generated by word processing and spreadsheet programs; (e) minimize system downtime; (f) notify CCS of planned system changes that may impact the security of CCS data; (g) return or destroy CCS data that exceed specified retention schedules; (h) notify CCS of any data storage outside the US; (i) in the event of system failure, enable immediate recovery of CCS information to the previous business day. The Company should guarantee that CCS data will not be sold to, accessed by, or moved by third parties. In the event of a security breach, the Company shall (a) immediately take action to close the breach; (b) notify CCS within 24 hours of Company's first knowledge of the breach, the reasons for or cause of the breach, actions taken to close the breach, and identify the CCS student information compromised by the breach; (c) return compromised CCS data for review; (d) provide communications on the breach to be shared with affected parties and cooperate with CCS efforts to communicate to affected parties by providing CCS with prior review of press releases and any communications to be sent to affected parties; (e) take all legally required, reasonable, and customary measures in working with CCS to remediate the breach which may include toll free telephone support with informed customer services staff to address questions by affected parties and/or provide monitoring services if necessary given the nature and scope of the disclosure; (f) cooperate with CCS by providing information, records and witnesses needed to respond to any government investigation into the disclosure of such records or litigation concerning the breach; and (g) provide CCS with notice within 24 hours of notice or service on Company, whichever occurs first, of any lawsuits resulting from, or government investigations of, the Company's handling of CCS data of any kind, failure to follow security requirements and/or failure to safeguard CCS data. The Company’s compliance with the standards of this provision is subject to verification by CCS personnel or its agent at any time during the term of the Agreement. Said information should only be used for the purposes intended and shall not be shared, sold, or moved to other companies or organizations nor should other companies or organization be allowed access to said information.
Appears in 3 contracts
Samples: Memorandum of Agreement (Moa), Memorandum of Agreement (Moa), Memorandum of Agreement (Moa)
Other Security Requirements. The Company shall maintain all technologies, policies, procedures and practices necessary to secure and protect the confidentiality and integrity of CCS student informationFCPS Confidential Records in the Company’s possession, including procedures to (ai) restrict access to such records in accordance with this Addendum; (ii) establish user IDs and passwords as necessary to protect such informationrecords; (biii) protect all such user passwords from detection and unauthorized use; (civ) prevent hostile or unauthorized intrusion that could compromise confidentiality, result in data corruption, or deny service; (dv) prevent and detect computer viruses from spreading to disks, attachments to e-mail, downloaded files, and documents generated by word processing and spreadsheet programs; (ev) minimize system downtime; (fvi) notify CCS FCPS of planned system changes that may impact the security of CCS dataFCPS Confidential Records; (gvii) return or destroy CCS data FCPS Confidential Records that exceed specified retention schedules; (hviii) notify CCS of any data storage outside permit periodic security audits by FCPS or designated third party using applicable regulations and industry best practice standards as benchmarks, and make commercially reasonable efforts to remediate the USvulnerabilities discovered; and (iix) in the event of system failure, enable immediate recovery of CCS information FCPS records to the previous business day. The Company should guarantee that CCS data will not be sold to, accessed by, or moved by third parties. In the event of a security breach, the Company shall (ai) immediately take action to close the breach; (bii) notify CCS FCPS within 24 hours of 2 business days after Company's first knowledge of the breach, the reasons for or cause of the breach, actions taken to close the breach, and identify the CCS student information FCPS Confidential Records compromised by the breach; (ciii) return compromised CCS data FCPS Confidential Records for review; (div) provide communications on the breach to be shared with affected parties and cooperate with CCS FCPS efforts to communicate to affected parties by providing CCS FCPS with prior review of press releases and any communications to be sent to affected parties; (ev) take all legally required, reasonable, and customary measures in working with CCS FCPS to remediate the breach which may include toll free telephone support with informed customer services staff to address questions by affected parties and/or provide monitoring services if necessary given the nature and scope of the disclosure; (fvi) cooperate with CCS FCPS by providing information, records and witnesses needed to respond to any government investigation into the disclosure of such records or litigation concerning the breach; and (gvii) provide CCS FCPS with notice within 24 hours of 2 business days after notice or service on Company, whichever occurs first, of any lawsuits resulting from, or government investigations of, the Company's handling of CCS data FCPS records of any kind, failure to follow security requirements and/or failure to safeguard CCS dataconfidential information. The Company shall provide satisfactory documentation of its compliance with the security requirements of this provision prior to performing services under the Agreement. The Company’s compliance with the standards requirements of this provision is subject to verification by CCS FCPS personnel or its agent at any time during the term of the Agreement. Said information should only be used for the purposes intended and shall not be shared, sold, or moved to other companies or organizations nor should other companies or organization be allowed access to said information.
Appears in 2 contracts
Samples: Acceptance Agreement, Acceptance Agreement
Other Security Requirements. The Company shall maintain all technologies, policies, procedures and practices necessary to secure and protect the confidentiality and integrity of CCS BCS student information, including procedures to (a) establish user IDs and passwords as necessary to protect such information; (b) protect all such user passwords from detection and unauthorized use; (c) prevent hostile or unauthorized intrusion that could result in data corruption, or deny service; (d) prevent and detect computer viruses from spreading to disks, attachments to e-mail, downloaded files, and documents generated by word processing and spreadsheet programs; (e) minimize system downtime; (f) notify CCS BCS of planned system changes that may impact the security of CCS BCS data; (g) return or destroy CCS BCS data that exceed specified retention schedules; (h) notify CCS BCS of any data storage outside the US; (i) in the event of system failure, enable immediate recovery of CCS BCS information to the previous business day; (j) provide a protocol in the event of a security breach. The Company should guarantee that CCS BCS data will not be sold to, accessed by, or moved by third parties. In the event of a security breach, the Company shall (a) immediately take action to close the breach; (b) notify CCS within 24 hours BCS immediately of Company's first knowledge of the breach, the reasons for or cause of the breach, actions taken to close the breach, and identify the CCS BCS student information compromised by the breach; (c) return compromised CCS BCS data for review; (d) provide communications on the breach to be shared with affected parties and cooperate with CCS BCS efforts to communicate to affected parties by providing CCS BCS with prior review of press releases and any communications to be sent to affected parties; (e) take all legally required, reasonable, and customary measures in working with CCS BCS to remediate the breach which may include toll free telephone support with informed customer services staff to address questions by affected parties and/or provide monitoring services if necessary given the nature and scope of the disclosure; (fdisclosure;(f) cooperate with CCS BCS by providing information, records and witnesses needed to respond to any government investigation into the disclosure of such records or litigation concerning the breach; and (g) provide CCS BCS with notice within 24 hours immediately of notice or service on Company, whichever occurs first, of any lawsuits resulting from, or government investigations of, the Company's handling of CCS BCS data of any kind, failure to follow security requirements and/or failure to safeguard CCS BCS data. The Company’s compliance with the standards of this provision is subject to verification by CCS BCS personnel or its agent at any time during the term of the Agreement. Said information should only be used for the purposes intended and shall not be shared, sold, or moved to other companies or organizations nor should other companies or organization be allowed access to said information.
Appears in 1 contract
Samples: Memorandum of Agreement (Moa)
Other Security Requirements. The Company shall maintain all technologies, policies, procedures and practices necessary to secure and protect the confidentiality and integrity of CCS student informationFCPS Confidential Records, including procedures to (ai) restrict access to such records as described in the “Confidentiality” provision of this Agreement; (ii) establish user IDs and passwords as necessary to protect such informationrecords; (biii) protect all such user passwords from detection and unauthorized use; (civ) prevent hostile or unauthorized intrusion that could compromise confidentiality, result in data corruption, or deny service; (dv) prevent and detect computer viruses from spreading to disks, attachments to e-mail, downloaded files, and documents generated by word processing and spreadsheet programs; (evi) minimize system downtime; (fvii) notify CCS FCPS of planned system changes that may impact the security of CCS dataFCPS Confidential Records; (gviii) return or destroy CCS data FCPS Confidential Records that exceed specified retention schedules; (h) notify CCS of any data storage outside the US; (iix) in the event of system failure, enable immediate recovery of CCS information FCPS records to the previous business day. The Company should guarantee that CCS data will not be sold to, accessed by, or moved by third parties. In the event of a security breach, the Company shall (ai) immediately take action to close the breach; (bii) notify CCS FCPS within 24 72 hours of Company's first knowledge of the breach, the reasons for or cause of the breach, actions taken to close the breach, and identify the CCS student information FCPS Confidential Records compromised by the breach; (ciii) return compromised CCS data FCPS Confidential Records for review; (div) provide communications on the breach to be shared with affected parties and cooperate with CCS FCPS efforts to communicate to affected parties by providing CCS FCPS with prior review of press releases and any communications to be sent to affected parties; (ev) take all legally required, reasonable, and customary measures in working with CCS FCPS to remediate the breach which may include toll free telephone support with informed customer services staff to address questions by affected parties and/or provide monitoring services if necessary given the nature and scope of the disclosure; (fvi) cooperate with CCS FCPS by providing information, records and witnesses needed to respond to any government investigation into the disclosure of such records or litigation concerning the breach; and (gvii) provide CCS FCPS with notice within 24 72 hours of notice or service on Company, whichever occurs first, of any lawsuits resulting from, or government investigations of, the Company's handling of CCS data FCPS records of any kind, failure to follow security requirements and/or failure to safeguard CCS dataconfidential information. The Company’s compliance with the standards of this provision is subject to verification by CCS FCPS personnel or its agent at any time during the term of the Agreement. Said information should only be used for the purposes intended and shall not be shared, sold, or moved to other companies or organizations nor should other companies or organization be allowed access to said information.
Appears in 1 contract
Samples: Acceptance Agreement
Other Security Requirements. The Company shall maintain all technologies, policies, procedures and practices necessary to secure and protect the confidentiality and integrity of CCS OCS student information, including procedures to (a) establish user IDs and passwords as necessary to protect such information; (b) protect all such user passwords from detection and unauthorized use; (c) prevent hostile or unauthorized intrusion that could result in data corruption, or deny service; (d) prevent and detect computer viruses from spreading to disks, attachments to e-mail, downloaded files, and documents generated by word processing and spreadsheet programs; (e) minimize system downtime; (f) notify CCS OCS of planned system changes that may impact the security of CCS OCS data; (g) return or destroy CCS OCS data that exceed specified retention schedules; (h) notify CCS OCS of any data storage outside the US; (i) in the event of system failure, enable immediate recovery of CCS OCS information to the previous business day. The Company should guarantee that CCS OCS data will not be sold to, accessed by, or moved by third parties. In the event of a security breach, the Company shall (a) immediately take action to close the breach; (b) notify CCS OCS within 24 hours of Company's first knowledge of the breach, the reasons for or cause of the breach, actions taken to close the breach, and identify the CCS OCS student information compromised by the breach; (c) return compromised CCS OCS data for review; (d) provide communications on the breach to be shared with affected parties and cooperate with CCS OCS efforts to communicate to affected parties by providing CCS OCS with prior review of press releases and any communications to be sent to affected parties; (e) take all legally required, reasonable, and customary measures in working with CCS OCS to remediate the breach which may include toll free telephone support with informed customer services staff to address questions by affected parties and/or provide monitoring services if necessary given the nature and scope of the disclosure; (f) cooperate with CCS OCS by providing information, records and witnesses needed to respond to any government investigation into the disclosure of such records or litigation concerning the breach; and (g) provide CCS OCS with notice within 24 hours of notice or service on Company, whichever occurs first, of any lawsuits resulting from, or government investigations of, the Company's handling of CCS OCS data of any kind, failure to follow security requirements and/or failure to safeguard CCS OCS data. The Company’s compliance with the standards of this provision is subject to verification by CCS OCS personnel or its agent at any time during the term of the Agreement. Said information should only be used for the purposes intended and shall not be shared, sold, or moved to other companies or organizations nor should other companies or organization be allowed access to said information.
Appears in 1 contract
Samples: Memorandum of Agreement (Moa)
Other Security Requirements. The Company shall maintain all technologies, policies, procedures and practices necessary to secure and protect the confidentiality and integrity of CCS student informationFCPS Confidential Student Records, including procedures to (ai) restrict access to such records as described in the “Confidentiality” provision of this Agreement; (ii) establish user IDs and passwords as necessary to protect such informationrecords; (biii) protect all such user passwords from detection and unauthorized use; (civ) prevent hostile or unauthorized intrusion that could compromise confidentiality, result in data corruption, or deny service; (dv) prevent and detect computer viruses from spreading to disks, attachments to e-mail, downloaded files, and documents generated by word processing and spreadsheet programs; (evi) minimize system downtime; (fvii) notify CCS FCPS of planned system changes that may impact the security of CCS dataFCPS Confidential Student Records; (gviii) return or destroy CCS data FCPS Confidential Student Records that exceed specified retention schedules; (hix) notify CCS of any data storage outside permit periodic security audits by FCPS or designated third party using applicable regulations and industry best practice standards as benchmarks, and make commercially reasonable efforts to remediate the USvulnerabilities discovered; (ix) in the event of system failure, enable immediate recovery of CCS information FCPS records to the previous business day. The Company should guarantee that CCS data will not be sold to, accessed by, or moved by third parties. In the event of a security breach, the Company shall (ai) immediately take action to close the breach; (bii) notify CCS FCPS within 24 hours of Company's first knowledge of the breach, the reasons for or cause of the breach, actions taken to close the breach, and identify the CCS student information FCPS Confidential Student Records compromised by the breach; (ciii) return compromised CCS data FCPS Confidential Student Records for review; (div) provide communications on the breach to be shared with affected parties and cooperate with CCS FCPS efforts to communicate to affected parties by providing CCS FCPS with prior review of press releases and any communications to be sent to affected parties; (ev) take all legally required, reasonable, and customary measures in working with CCS FCPS to remediate the breach which may include toll free telephone support with informed customer services staff to address questions by affected parties and/or provide monitoring services if necessary given the nature and scope of the disclosure; (fvi) cooperate with CCS FCPS by providing information, records and witnesses needed to respond to any government investigation into the disclosure of such records or litigation concerning the breach; and (gvii) provide CCS FCPS with notice within 24 hours of notice or service on Company, whichever occurs first, of any lawsuits resulting from, or government investigations of, the Company's handling of CCS data FCPS records of any kind, failure to follow security requirements and/or failure to safeguard CCS dataconfidential information. The Company shall provide satisfactory documentation of its compliance with the security requirements of this provision prior to performing services under the Agreement. The Company’s compliance with the standards of this provision is subject to verification by CCS FCPS personnel or its agent at any time during the term of the Agreement. Said information should only be used for the purposes intended and shall not be shared, sold, or moved to other companies or organizations nor should other companies or organization be allowed access to said information.
Appears in 1 contract
Samples: Confidentiality Agreement
Other Security Requirements. The Company shall maintain all technologies, policies, procedures and practices necessary to secure and protect the confidentiality and integrity of CCS student informationFCPS Confidential Student Records, including procedures to (ai) restrict access to such records as described in the “Confidentiality” provision of this Addendum; (ii) establish user IDs and passwords as necessary to protect such informationrecords; (biii) protect all such user passwords from detection and unauthorized use; (civ) prevent hostile or unauthorized intrusion that could compromise confidentiality, result in data corruption, or deny service; (dv) prevent and detect computer viruses from spreading to disks, attachments to e-mail, downloaded files, and documents generated by word processing and spreadsheet programs; (ev) minimize system downtime; (fvi) notify CCS FCPS of planned system changes that may impact the security of CCS dataFCPS Confidential Student Records; (gvii) return or destroy CCS data FCPS Confidential Student Records that exceed specified retention schedules; (hviii) notify CCS of any data storage outside permit periodic security audits by FCPS or designated third party using applicable regulations and industry best practice standards as benchmarks, and make commercially reasonable efforts to remediate the USvulnerabilities discovered; (iix) in the event of system failure, enable immediate recovery of CCS information FCPS records to the previous business day. The Company should guarantee that CCS data will not be sold to, accessed by, or moved by third parties. In the event of a security breach, the Company shall (ai) immediately take action to close the breach; (bii) notify CCS FCPS within 24 hours of Company's first knowledge of the breach, the reasons for or cause of the breach, actions taken to close the breach, and identify the CCS student information FCPS Confidential Student Records compromised by the breach; (ciii) return compromised CCS data FCPS Confidential Student Records for review; (div) provide communications on the breach to be shared with affected parties and cooperate with CCS FCPS efforts to communicate to affected parties by providing CCS FCPS with prior review of press releases and any communications to be sent to affected parties; (ev) take all legally required, reasonable, and customary measures in working with CCS FCPS to remediate the breach which may include toll free telephone support with informed customer services staff to address questions by affected parties and/or provide monitoring services if necessary given the nature and scope of the disclosure; (fvi) cooperate with CCS FCPS by providing information, records and witnesses needed to respond to any government investigation into the disclosure of such records or litigation concerning the breach; and (gvii) provide CCS FCPS with notice within 24 hours of notice or service on Company, whichever occurs first, of any lawsuits resulting from, or government investigations of, the Company's handling of CCS data FCPS records of any kind, failure to follow security requirements and/or failure to safeguard CCS dataconfidential information. The Company shall provide satisfactory documentation of its compliance with the security requirements of this provision prior to performing services under the Agreement. The Company’s compliance with the standards of this provision is subject to verification by CCS FCPS personnel or its agent at any time during the term of the Agreement. Said information should only be used for the purposes intended and shall not be shared, sold, or moved to other companies or organizations nor should other companies or organization be allowed access to said information.
Appears in 1 contract
Samples: Addendum