Records Security Sample Clauses

Records Security.  If working in a clinical environment always click on the ‘lock’ screen icon when leaving the exam room so the patient cannot access OSCAR. Minimizing the screen is not sufficient. (Example ‐ patient who very quickly got into OSCAR, printed out a prescription, and left the clinic with it).  Do not share program access (e.g. passwords) and be sure to log out of any programs containing confidential information if you need to be away from your work station.  Do not leave confidential files or paperwork unattended on or around your workstation and be sure to place them in a secure area (e.g. locking filing cabinet) when they are not in use or not in your possession. Verbal Communication:
AutoNDA by SimpleDocs
Records Security 

Related to Records Security

  • Premises Security 10.1 Security of premises and control of access.

  • E7 Security E7.1 The Authority shall be responsible for maintaining the security of the Authority’s Premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority’s Premises, and shall ensure that all Staff comply with such requirements.

  • REMOVAL OF RECORDS FROM PREMISES Where performance of the Contract involves use by the Contractor (or the Contractor’s subsidiaries, affiliates, partners, agents or subcontractors) of Authorized User owned or licensed papers, files, computer disks or other electronic storage devices, data or records at Authorized User facilities or offices, or via remote access, the Contractor (or the Contractor’s subsidiaries, affiliates, partners, agents or subcontractors) shall not remotely access, modify, delete, copy or remove such Records without the prior written approval of the Authorized User. In no case, with or without the written approval of the Authorized User, can the Authorized User data be accessed, moved or sent outside the continental United States.

  • Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.

  • Criminal Records Check Section 1. Except as provided by Governor’s executive order or state or federal law as implemented by Agency rule or policy, the Employer will not require a criminal records check on any current employee in his or her current position if the requirement was not in place when the employee was appointed to the position. Agencies will send Agency rules, policies, and subsequent changes to SEIU Headquarters. Upon notification, the Union may exercise its rights pursuant to Article 5 of this agreement as it applies to changes in Agency rule or policy implementing Governor’s executive orders or state or federal laws regarding criminal records check requirements.

  • Password Security You are responsible for maintaining adequate security and control of any and all User IDs, Passwords, hints, personal identification numbers (PINs), or any other codes that you use to access the Account. Do not discuss, compare, or share information about your account number or password unless you are willing to give them full use of your money. Any loss or compromise of the foregoing information and/or your personal information may result in unauthorized access to your Account by third-parties and the loss or theft of any funds held in your Account and any associated accounts, including your Account. Checks and electronic withdrawals are processed by automated methods, and anyone who obtains your account number or access device could use it to withdraw money from your account, with or without your permission. You are responsible for keeping your email address and telephone number up to date in order to receive any notices or alerts that we may send you. We assume no responsibility for any loss that you may sustain due to compromise of your account login credentials due to no fault of ours and/or your failure to follow or act on any notices or alerts that we may send to you. If you believe your Account information has been compromised, or that someone has transferred or may transfer money from your account without your permission, contact us immediately, through Synapse, at xxxx@xxxxxxxxx.xxx or call at +0(000) 000-0000. You agree to promptly review all Account and transaction records and other Communications that we make available to you and to promptly report any discrepancy to us.

  • Mobile Deposit Security You will complete each deposit promptly. If you are unable to complete your deposit promptly, you will ensure that your mobile device remains securely in your possession until the deposit has been completed. It is your responsibility to establish and maintain procedures to safeguard against unauthorized deposits. You will notify us immediately by telephone with written confirmation if you learn of any loss or theft of original checks. You will ensure the safety and integrity of original checks from the time of receipt until the time of destruction. If warranted in our reasonable judgment, we may audit and monitor you, and you agree to cooperate with us to permit such monitoring, to confirm that you have satisfied your obligations under this Agreement.

  • JOB SECURITY 23.01 Subject to the willingness and capacity of individual employees to accept relocation and retraining, the Employer will make every reasonable effort to ensure that any reduction in the work force will be accomplished through attrition.

  • CRIMINAL RECORDS CHECKS The Employer agrees to the treatment of criminal records checks in accordance with the Criminal Records Review Act of BC.

  • Leasing of Real and Personal Property ‌ The Government contemplates that leases may be part of a task order solution offered by a Contractor, but the Government, where the Contractor’s solution includes leasing, must not be the Lessee. Under no circumstances on any task order awarded under XXXXX shall the Government be deemed to have privity-of-contract with the Owner/Lessor of the Leased Items; or, the Government be held liable for early Termination/Cancellation damages if the Government decides not to exercise an option period under a task order unless the Contractor has specifically disclosed the amount of such damages (or the formula by which such damages would be calculated) as part of its proposal and the OCO for the task order has specifically approved/allowed such damages as part of the task order terms and conditions.

Time is Money Join Law Insider Premium to draft better contracts faster.