Privacy, Security and Accuracy Sample Clauses

Privacy, Security and Accuracy. Participant will maintain sufficient safeguards and procedures, in compliance with HIPAA, to maintain the security and privacy of Data.
AutoNDA by SimpleDocs
Privacy, Security and Accuracy. Participant will maintain sufficient safeguards and procedures, in compliance with HIPAA, to maintain the security and privacy of Data. Data Provided. Timely and accurate data are the basis of an effective immunization registry. Following execution of this Agreement, participant will submit patient's vaccination information to the registry no later than thirty days after new vaccinations are administered. In addition, participants are encouraged to submit previous vaccination data to the registry at that time, if it has not already been submitted. Failure to provide such data in a timely manner shall subject Participant to termination pursuant to Subsection 10.3(b) of the Agreement. DPH staff will work with participants who have electronic historical immunization data to upload that data into the registry.
Privacy, Security and Accuracy. Participant will maintain a secure environment that supports the security and privacy of Data in the HIE. Participant shall use sufficient administrative, physical and technical safeguards, in compliance with HIPAA Regulations.
Privacy, Security and Accuracy. Data Recipient will maintain sufficient safeguards and procedures, in compliance with Exhibit C, HIE Policies and Standards, and applicable laws and regulations, to maintain the security and privacy of Data received through the Exchange.
Privacy, Security and Accuracy. Data Supplier will maintain sufficient safeguards and procedures, in compliance with the terms of this Agreement, HIE Policies and Standards, and applicable laws, to maintain the security, privacy and accuracy of Data. Data Supplier will promptly correct any errors discovered in Data it transmits to the Exchange and notify HIE of any such corrections pursuant to HIE Policies and Standards.
Privacy, Security and Accuracy. Data Recipient shall maintain sufficient safeguards and procedures, in compliance with the Policies and Standards, and all applicable laws and regulations, to maintain the security and privacy of Data received through the Exchange. Data Recipients shall comply with the security Policies and Standards established by XXXX-CT.
Privacy, Security and Accuracy. Data Supplier shall maintain sufficient safeguards and procedures, in compliance with the terms of this Agreement, the Policies and Standards and all applicable laws and regulations, to maintain the security, privacy and accuracy of Data. Data Supplier shall, pursuant to the Policies and Standards, promptly correct any errors discovered in any Data that it transmits to the Exchange through document or demographic update/replacement. Data Supplier shall comply with the security Policies and Standards established by XXXX-CT.
AutoNDA by SimpleDocs

Related to Privacy, Security and Accuracy

  • Security and Access The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities Information Technology and Access Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Access Resources or other Company property or materials by others.

  • Information Accuracy I (a) certify that the information and representations contained in this Agreement and any other document or information that has been or will be furnished to You in connection with My account(s) is complete, true and correct, and acknowledge that knowingly giving false information for the purpose of inducing You to extend credit is a federal crime, (b) authorize You to contact any individual or firm noted herein or on the documents referred to in subsection (a) of this Section and any other normal sources of debit or credit information, (c) authorize anyone so contacted to furnish such information to You as You may request, and (d) agree that this Agreement and any other document or information I furnish in connection with My account is Your property, as the case may be. I shall promptly advise You of any changes to the information in such agreements, documents, or information. You may retain this Agreement and all other such documents or information and their respective records at Your sole discretion, whether or not credit is extended.

  • Data Security and Privacy 12.1 SERVICE PROVIDER acknowledges the importance of Data Security and agrees to adhere to the Terms and Conditions of the Data Security Policy of IIMC.

  • Security and Confidentiality Technical and organisational security measures must be taken by the data controller that are appropriate to the risks, such as against accidental or unlawful destruction or accidental loss, alteration, unauthorised disclosure or access, presented by the processing. Any person acting under the authority of the data controller, including a processor, must not process the data except on instructions from the data controller.

  • Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.

  • Information Integrity and Security Contractor shall immediately notify County of any known or suspected breach of personal, sensitive and confidential information related to Contractor’s work under this Agreement.

  • Security and Data Transfers Party shall comply with all applicable State and Agency of Human Services' policies and standards, especially those related to privacy and security. The State will advise the Party of any new policies, procedures, or protocols developed during the term of this agreement as they are issued and will work with the Party to implement any required. Party will ensure the physical and data security associated with computer equipment, including desktops, notebooks, and other portable devices, used in connection with this Agreement. Party will also assure that any media or mechanism used to store or transfer data to or from the State includes industry standard security mechanisms such as continually up-to-date malware protection and encryption. Party will make every reasonable effort to ensure media or data files transferred to the State are virus and spyware free. At the conclusion of this agreement and after successful delivery of the data to the State, Party shall securely delete data (including archival backups) from Party’s equipment that contains individually identifiable records, in accordance with standards adopted by the Agency of Human Services. Party, in the event of a data breach, shall comply with the terms of Section 7 above.

  • Security Violations and Accounts Updates Grantee will adhere to the Confidentiality Article requirements and HHS Data Usage Agreement of this contract and immediately contact System Agency if a security violation is detected, or if Grantee has any reason to suspect that the security or integrity of the CMBHS data has been or may be compromised in any way.

  • Information Security Requirements In cases where the State is not permitted to manage/modify the automation equipment (server/computer/other) that controls testing or monitoring devices, the Contractor agrees to update and provide patches for the automation equipment and any installed operating systems or applications on a quarterly basis (at minimum). The Contractor will submit a report to the State of updates installed within 30 days of the installation as well as a Plan of Actions and Milestones (POA&M) to remediate any vulnerabilities ranging from Critical to Low. The contractor will provide an upgrade path or compensatory security controls for any operating systems and applications listed as beyond “end-of-life” or EOL, within 90 days of the EOL and complete the EOL system’s upgrade within 90 days of the approved plan.

  • Control and Access to Information The Financial Mechanism Committee, the EFTA Board of Auditors and their representatives have the right to carry out any technical or financial mission or review they consider necessary to follow the planning, implementation and monitoring of programmes and projects as well as the use of funds. The Beneficiary State shall provide all necessary assistance, information and documentation.

Time is Money Join Law Insider Premium to draft better contracts faster.