SECURE PROTECTION AND HANDLING OF STATE DATA Sample Clauses

SECURE PROTECTION AND HANDLING OF STATE DATA. 29.1. If Contractor is given State Data as part of this Contract, the protection of State Data shall be an integral part of the business activities of Contractor to ensure that there is no inappropriate or unauthorized use of State Data. To the extent that Contractor is given State Data, Contractor shall safeguard the confidentiality, integrity, and availability of the State Data. Contractor agrees to not to copy, reproduce, sell, assign, license, market, transfer, or otherwise dispose of, give, or disclose such information to third parties or use such information for any purpose whatsoever other than the performance of the Contract. The improper use or disclosure of confidential information is strictly prohibited.
AutoNDA by SimpleDocs
SECURE PROTECTION AND HANDLING OF STATE DATA. 29.1. If Subrecipient is given State Data as part of this Contract, the protection of State Data shall be an integral part of the business activities of Subrecipient to ensure that there is no inappropriate or unauthorized use of State Data. To the extent that Subrecipient is given State Data, Subrecipient shall safeguard the confidentiality, integrity, and availability of the State Data. Subrecipient agrees to not copy, reproduce, sell, assign, license, market, transfer, or otherwise dispose of, give, or disclose such information to third parties or use such information for any purpose whatsoever other than the performance of the Contract. The improper use or disclosure of confidential information is strictly prohibited.
SECURE PROTECTION AND HANDLING OF STATE DATA. If Contractor is given State Data as part of this Contract, the protection of State Data shall be an integral part of the business activities of Contractor to ensure that there is no inappropriate or unauthorized use of State Data. To the extent that Contractor is given State Data, Contractor shall safeguard the confidentiality, integrity, and availability of the State Data and comply with the conditions outlined below. DTS reserves the right to verify Contractor’s adherence to the following conditions to ensure they are met during the life of the contract: Network Security: Contractor agrees at all times to maintain network security that - at a minimum - includes: network firewall provisioning, intrusion detection, and regular third party penetration testing. Contractor also agrees to maintain network security that conforms to one of the following:
SECURE PROTECTION AND HANDLING OF STATE DATA. 36.1. If the Subrecipient is given access to or will be storing State Data as part of this agreement, the protection of State Data must be an integral part of the business activities of the Subrecipient to ensure that there is no inappropriate or unauthorized use of State Data. The Subrecipient shall safeguard the confidentiality, integrity, and availability of the State Data. The Subrecipient agrees to not copy, reproduce, sell, assign, license, market, transfer, or otherwise dispose of, give, or disclose such information to third parties or use such information for any purpose whatsoever other than the performance of this agreement. The improper use or disclosure of confidential information is strictly prohibited.
SECURE PROTECTION AND HANDLING OF STATE DATA. If Contractor is given access to State Data, the protection of State Data shall be an integral part of the business activities of Contractor, and Contractor shall ensure that there is no inappropriate or unauthorized use of State Data. Contractor shall safeguard the confidentiality, integrity, and availability of the State Data and comply with the conditions outlined below. The Eligible User reserves the right to verify Contractor’s adherence to the following conditions to ensure they are met: Network Security: Contractor shall maintain network security that, at a minimum, includes: network firewall provisioning, intrusion detection, and regular third-party penetration testing. Contractor shall maintain network security and ensure that Contractor network security policies conform to one of the following: Those standards the State of Utah applies to its own network, found outlined in DTS Policy 5000-0002 Enterprise Information Security Policy; Current standards set forth and maintained by the National Institute of Standards and Technology, includes those at: xxxx://xxxxxxx.xxxx.xxx/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf; or Any generally recognized comparable standard that Contractor then applies to its own network and pre-approved by the Eligible User in writing. State Data Security: Contractor shall protect and maintain the security of State Data with protection that is at least as good as or better than that maintained by the State of Utah which will be provided by an Eligible User upon Contractor’s request (DTS Policy 5000-0002). These security measures included but are not limited to maintaining secure environments that are patched and up to date with all appropriate security updates as designated (ex. Microsoft Notification). The Eligible User reserves the right to determine if Contractor’s level of protection meets the Eligible User’s security requirements. State Data Transmission: Contractor shall ensure all transmission or exchange of system application data with the Eligible User and State of Utah and/or any other parties expressly designated by the State of Utah, shall take place via secure means (ex. HTTPS or FTPS).
SECURE PROTECTION AND HANDLING OF STATE DATA. If Contractor is given State Data as part of this Contract, the protection of State Data shall be an integral part of the business activities of Contractor to ensure that there is no inappropriate or unauthorized use of State Data. To the extent that Contractor is given State Data, Contractor shall safeguard the confidentiality, integrity, and availability of the State Data and comply with the conditions outlined below. DTS reserves the right to verify Contractor’s adherence to the following conditions to ensure they are met during the life of the contract:
SECURE PROTECTION AND HANDLING OF STATE DATA. If Contractor is given State Data as part of this Contract, the protection of State Data shall be an integral part of the business activities of Contractor to ensure that there is no inappropriate or unauthorized use of State Data. To the extent that Contractor is given State Data, Contractor shall safeguard the confidentiality, integrity and availability of the State Data and comply with the following conditions: Network Security: Contractor agrees at all times to maintain network security that - at a minimum - includes: network firewall provisioning, intrusion detection, and regular third party penetration testing. Contractor also agrees to maintain network security that conforms to one of the following:
AutoNDA by SimpleDocs
SECURE PROTECTION AND HANDLING OF STATE DATA. If Contractor is given access to Data, the protection of Data shall be an integral part of the business activities of Contractor, and Contractor shall ensure that there is no inappropriate or unauthorized use of Data. Contractor shall safeguard the confidentiality, integrity, and availability of the Data and comply with the conditions outlined below. USBE reserves the right to verify Contractor’s adherence to the following conditions to ensure they are met.

Related to SECURE PROTECTION AND HANDLING OF STATE DATA

  • Media preservation and protection When a Contractor discovers a cyber incident has occurred, the Contractor shall preserve and protect images of all known affected information systems identified in paragraph (c)(1)(i) of this clause and all relevant monitoring/packet capture data for at least 90 days from the submission of the cyber incident report to allow DoD to request the media or decline interest.

  • Freedom of Information and Protection of Privacy a. The Chair and the Minister acknowledge that the Agency is bound to follow the requirements set out in the Freedom of Information and Protection of Privacy Act (FIPPA) in relation to the collection, retention, security, use, distribution and disposal of records.

  • System Protection To prevent compromise of systems which contain DSHS Data or through which that Data passes:

  • DATA PROTECTION AND FREEDOM OF INFORMATION 7.1. Each party will:-

  • Data Protection and Security A. In this Agreement the following terms shall have the meanings respectively ascribed to them:

  • Xxxx Protection 23.1With respect to the Parties' rights and obligations under this Framework Agreement, the Parties agree that the Authority is the Data Controller and that the Supplier is the Data Processor.

Time is Money Join Law Insider Premium to draft better contracts faster.