Reporting of unauthorized disclosures and other Information security breaches Sample Clauses

Reporting of unauthorized disclosures and other Information security breaches. Any accidental or deliberate unauthorized disclosure of Confidential Information, information security breach, or suspicion of same, shall be immediately reported by Receiving Entity to the OMH Information Security Officer. The Receiving Entity shall maintain a written record of all such incidents.
AutoNDA by SimpleDocs

Related to Reporting of unauthorized disclosures and other Information security breaches

  • Reporting of Unauthorized Disclosure The Contractor shall immediately report to the State any unauthorized disclosure of confidential information.

  • Other Confidential Consumer Information Party agrees to comply with the requirements of AHS Rule No. 08-048 concerning access to and uses of personal information relating to any beneficiary or recipient of goods, services or other forms of support. Party further agrees to comply with any applicable Vermont State Statute and other regulations respecting the right to individual privacy. Party shall ensure that all of its employees, subcontractors and other service providers performing services under this agreement understand and preserve the sensitive, confidential and non-public nature of information to which they may have access.

  • CONFIDENTIALITY/SAFEGUARDING OF INFORMATION The CONTRACTOR shall not use or disclose any information concerning the AGENCY, or information that may be classified as confidential, for any purpose not directly connected with the administration of this contract, except with prior written consent of the AGENCY, or as may be required by law.

  • Court Ordered Requests for Call Detail Records and Other Subscriber Information 7.1 To the extent technically feasible, BellSouth maintains call detail records for Mpower end users for limited time periods and can respond to subpoenas and court ordered requests for this information. BellSouth shall maintain such information for Mpower end users for the same length of time it maintains such information for its own end users.

  • Confidentiality and Safeguarding of University Records; Press Releases; Public Information Under this Agreement, Contractor may (1) create, (2) receive from or on behalf of University, or (3) have access to, records or record systems (collectively, University Records). Among other things, University Records may contain social security numbers, credit card numbers, or data protected or made confidential or sensitive by Applicable Laws. [Option (Include if University Records are subject to FERPA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Family Educational Rights and Privacy Act, 20 United States Code (USC) §1232g (FERPA) are addressed in Section 12.41.] [Option (Include if University is a HIPAA Covered Entity and University Records are subject to HIPAA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Health Insurance Portability and Accountability Act and 45 Code of Federal Regulations (CFR) Part 160 and subparts A and E of Part 164 (collectively, HIPAA) are addressed in Section 12.26.] Contractor represents, warrants, and agrees that it will: (1) hold University Records in strict confidence and will not use or disclose University Records except as (a) permitted or required by this Agreement, (b) required by Applicable Laws, or (c) otherwise authorized by University in writing; (2) safeguard University Records according to reasonable administrative, physical and technical standards (such as standards established by the National Institute of Standards and Technology and the Center for Internet Security [Option (Include if Section 12.39 related to Payment Card Industry Data Security Standards is not include in this Agreement.):, as well as the Payment Card Industry Data Security Standards]) that are no less rigorous than the standards by which Contractor protects its own confidential information; (3) continually monitor its operations and take any action necessary to assure that University Records are safeguarded and the confidentiality of University Records is maintained in accordance with all Applicable Laws and the terms of this Agreement; and (4) comply with University Rules regarding access to and use of University’s computer systems, including UTS165 at xxxx://xxx.xxxxxxxx.xxx/board-of-regents/policy-library/policies/uts165-information-resources-use-and-security-policy. At the request of University, Contractor agrees to provide University with a written summary of the procedures Contractor uses to safeguard and maintain the confidentiality of University Records.

  • Confidentiality and Safeguarding Information 1. Each Party may have access to confidential information made available by the other. The provisions of the Florida Public Records Act, Chapter 119, F.S., and other applicable state and federal laws will govern disclosure of any confidential information received by the State of Florida.

  • - CLEC INFORMATION CLEC agrees to work with Qwest in good faith to promptly complete or update, as applicable, Qwest’s “New Customer Questionnaire” to the extent that CLEC has not already done so, and CLEC shall hold Qwest harmless for any damages to or claims from CLEC caused by CLEC’s failure to promptly complete or update the questionnaire.

  • Information Security Requirements In cases where the State is not permitted to manage/modify the automation equipment (server/computer/other) that controls testing or monitoring devices, the Contractor agrees to update and provide patches for the automation equipment and any installed operating systems or applications on a quarterly basis (at minimum). The Contractor will submit a report to the State of updates installed within 30 days of the installation as well as a Plan of Actions and Milestones (POA&M) to remediate any vulnerabilities ranging from Critical to Low. The contractor will provide an upgrade path or compensatory security controls for any operating systems and applications listed as beyond “end-of-life” or EOL, within 90 days of the EOL and complete the EOL system’s upgrade within 90 days of the approved plan.

  • DISCLOSURE OF CUSTOMER INFORMATION XXXXX.xxx will not share or sell information regarding its customers and/or prospective customers, except to its employees, agents, partners, and associates as required in the ordinary course of XXXXX.xxx’s business conducted on behalf of customers, including, but not limited to, XXXXX.xxx’s banking or credit relationships in accordance with XXXXX.xxx’s privacy policy. XXXXX.xxx may also disclose to federal or state regulatory agencies and law enforcement authorities’ information regarding Customer and Customer’s transactions in response to a request for such information or in response to a court order or subpoena. To read XXXXX.xxx’s entire privacy policy, please visit: xxx.xxxxx.xxx/xx-xx/xxxxx-xxx-xxxxxxxx/xxxxxxx-xxxxxx/

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

Time is Money Join Law Insider Premium to draft better contracts faster.