Portable/Mobile Devices Sample Clauses

Portable/Mobile Devices. RESPEC shall employ best practices to take measures that prevent unauthorized disclosure and shall not store confidential and sensitive TexasSure data on a portable computing device or device outside of a Texas State Data Center. In situations that require RESPEC to use a portable computing device, RESPEC must comply with the following: a) Request written authorization from TDI of the business need for accessing or storing TexasSure data on a portable device. TDI’s Information Security Officer (ISO) shall review RESPEC’s request to determine if the request will be granted or denied. b) Encrypt PII or confidential data in transmission using WPA2 wireless encryption for portable/mobile devices to ensure the TexasSure System data is protected end to end. 1) Due to the inherently mobile nature of these devices, in the event that a portable/mobile device is lost or stolen, encryption that meets FIPS 140-2 shall be provided on all WLAN-enabled portable/mobile devices. 2) Data at rest encryption is implemented in a manner that protects PII and confidential information stored on WLAN-enabled portable/mobile devices by requiring that the portable/mobile device be powered on and credentials successfully authenticated in order for the data to be deciphered. 3) All System components within a WLAN that wirelessly transmit PII or confidential information shall have cryptographic functionality that meets or exceeds encryption requirements per FIPS 140-2. c) Portable/mobile devices must be password protected. d) Portable/mobile devices must be encrypted. e) Portable/mobile devices must use tracking mechanisms to locate the lost or stolen device. f) Portable/mobile devices shall not be used for long-term storage of any confidential or Sensitive Information. g) Portable/mobile devices must have proper protection mechanisms installed, including antivirus and firewall software, with unneeded services and ports turned off. h) Respondent shall not use removable storage media including all CD/DVD-ROMs, floppy disks, backup tapes, memory cards, portable hard drives, and USB memory drives, at any time, for storing or transferring Texas Sure System data. i) In the event a portable/mobile device is lost or stolen, Respondent shall notify TDI in writing upon discovery.
AutoNDA by SimpleDocs

Related to Portable/Mobile Devices

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Video Display Terminals ‌ The Employer shall ensure that any new office equipment or facility required for use in conjunction with VDTs shall meet the standards recommended by the Workers' Compensation Board.

  • Equipment and Software To use the Mobile Remote Deposit Services, you must obtain and maintain at your expense, compatible equipment and software that we may specify from time to time.

  • Network Interface Device 4.1 The NID is defined as any means of interconnection of end-user customer premises wiring to BellSouth’s distribution plant, such as a cross-connect device used for that purpose. The NID is a single-line termination device or that portion of a multiple-line termination device required to terminate a single line or circuit at the premises. The NID features two independent xxxxxxxx or divisions that separate the service provider’s network from the End User’s on-premises wiring. Each chamber or division contains the appropriate connection points or posts to which the service provider and the End User each make their connections. The NID provides a protective ground connection and is capable of terminating cables such as twisted pair cable. 4.1.1 BellSouth shall permit Al-Call to connect Al-Call ’s loop facilities to on-premises wiring through the BellSouth NID or at any other technically feasible point.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • Embedded Software To the extent any goods contain Embedded Software (defined below) that is not Buyer’s Property, no title to such Embedded Software shall pass to Buyer, and Supplier shall grant Buyer, its customers and all other users a non-exclusive worldwide, irrevocable, perpetual, royalty-free right to use, load, install, execute, demonstrate, market, test, resell, sublicense and distribute such Embedded Software as an integral part of such goods or for servicing the goods (the “Buyer-Required License”). If such Embedded Software or any part thereof is owned by a third party, prior to delivery, Supplier shall obtain the Buyer-Required License from such third-party owner. “Embedded Software” means software necessary for operation of goods and embedded in and delivered as an integral part of goods.

  • Computer Equipment Recycling Program If this Contract is for the purchase or lease of computer equipment, then Contractor certifies that it is in compliance with Subchapter Y, Chapter 361 of the Texas Health and Safety Code related to the Computer Equipment Recycling Program and the Texas Commission on Environmental Quality rules in 30 TAC Chapter 328.

  • Equipment and Materials CONTRACTOR shall provide all equipment, materials, and supplies necessary for the performance on the Agreement except:

  • Customer Equipment Customer represents and warrants that it owns or has the legal right and authority, and will continue to own or maintain the legal right and authority during the term of this Agreement, to place and use the Customer Equipment as contemplated by this Agreement. Customer further represents and warrants that its placement, arrangement, and use of the Customer Equipment in the Internet Data Centers complies with the Customer Equipment Manufacturer's environmental and other specifications.

  • Server Software Subject to the terms and conditions of this XXXX, Vocera grants you the non-exclusive right to (i) install and run (“Use”) the Server Software on computer systems (each, a “Server Computer”) located at End User’s Facilities in the geographic territory designated above (“Territory”); (ii) to Use the Client Software in conjunction with Authorized Client Devices and such Server Computers; and (iii) for pilot licenses for certain Software provided on a trial basis, use such Software for the limited term specified by Vocera in writing. You may Use the standard Server Software on one primary Server Computer (or a primary cluster of computers suitably configured for productive use of the Server Software). You may install backup copies of the Server Software on backup Server Computers to provide redundancy in the event of failure of the primary Server Computer(s) but, unless you have acquired additional licenses or a failover license from Vocera, you may not run such backup or additional copies concurrently with the primary copies. Vocera grants you the right to use the applicable License Key issued by Vocera only to enable Use of the Server Software in conjunction with the licensed Server Computers. Server Software may be licensed for a Subscription Term as specified in the Quote.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!