SECURE PROTECTION AND HANDLING OF STATE DATA Sample Clauses

SECURE PROTECTION AND HANDLING OF STATE DATA. 29.1. If Contractor is given State Data as part of this Contract, the protection of State Data shall be an integral part of the business activities of Contractor to ensure that there is no inappropriate or unauthorized use of State Data. To the extent that Contractor is given State Data, Contractor shall safeguard the confidentiality, integrity, and availability of the State Data. Contractor agrees to not to copy, reproduce, sell, assign, license, market, transfer, or otherwise dispose of, give, or disclose such information to third parties or use such information for any purpose whatsoever other than the performance of the Contract. The improper use or disclosure of confidential information is strictly prohibited. 29.2. Any and all transmission or exchange of State Data shall take place via secure means. Contractor shall create, store, and maintain any State Data on secure or encrypted computing devices or any portable storage mediums. Contractor agrees to protect and maintain the security of State Data with security measures including, but are not limited to, maintaining secure environments that are patched and up to date with all appropriate security updates as designated, network firewall provisioning, and intrusion detection. Contractor agrees that any computing device or portable medium that has access to the Department’s network or stores any non-public State Data is equipped with strong and secure password protection. 29.3. Contractor shall: (a) limit disclosure of any State Data to Authorized Person who have a need to know such information in connection with the current or contemplated business relationship between the parties to which the Contract relates, and only for that purpose; (b) advise its Authorized Persons of the proprietary nature of 29.4. Contractor will promptly notify the Department of any misuse or misappropriation of State Data that comes to Contractor’s attention. Contractor shall be responsible for any breach of this duty of confidentiality by any of their officers, agents, subcontractors at any tier, and any of their respective representatives, including any required remedies and/or notifications under applicable law (Utah Code Xxx. §§ 00-00-000 through 301). This duty of confidentiality shall be ongoing and survive the term of the Contract. Notwithstanding the foregoing, if there is a discrepancy between a signed business associate agreement and this provision, the business associate agreement language shall take precedence.
AutoNDA by SimpleDocs
SECURE PROTECTION AND HANDLING OF STATE DATA. 29.1. If Subrecipient is given State Data as part of this Contract, the protection of State Data shall be an integral part of the business activities of Subrecipient to ensure that there is no inappropriate or unauthorized use of State Data. To the extent that Subrecipient is given State Data, Subrecipient shall safeguard the confidentiality, integrity, and availability of the State Data. Subrecipient agrees to not copy, reproduce, sell, assign, license, market, transfer, or otherwise dispose of, give, or disclose such information to third parties or use such information for any purpose whatsoever other than the performance of the Contract. The improper use or disclosure of confidential information is strictly prohibited. 29.2. Any and all transmission or exchange of State Data shall take place via secure means. Subrecipient shall create, store, and maintain any State Data on secure or encrypted computing devices or any portable storage mediums. Subrecipient agrees to protect and maintain the security of State Data with security measures including, but are not limited to, maintaining secure environments that are patched and up to date with all appropriate security updates as designated, network firewall provisioning, and intrusion detection. Subrecipient agrees that any computing device or portable medium that has access to the Department’s network or stores any non-public State Data is equipped with strong and secure password protection. 29.3. Subrecipient shall: (a) limit disclosure of any State Data to Authorized Person who have a need to know such information in connection with the current or contemplated business relationship between the parties to which the Contract relates, and only for that purpose; (b) advise its Authorized Persons of the proprietary nature of the State Data and of the obligations set forth in the Contract and require such Authorized Persons to keep the State Data confidential; (c) keep all State Data strictly confidential by using a reasonable degree of care, but not less than the degree of care used by it in safeguarding its own confidential information; and (d) not disclose any State Data received by it to any third parties, except as permitted by the Contract or otherwise agreed to in writing by the Department. 29.4. Subrecipient will promptly notify the Department of any misuse or misappropriation of State Data that comes to Subrecipient’s attention. Subrecipient shall be responsible for any breach of this duty of confidentia...
SECURE PROTECTION AND HANDLING OF STATE DATA. If Contractor is given access to State Data, the protection of State Data shall be an integral part of the business activities of Contractor, and Contractor shall ensure that there is no inappropriate or unauthorized use of State Data. Contractor shall safeguard the confidentiality, integrity, and availability of the State Data and comply with the conditions outlined below. The Eligible User reserves the right to verify Contractor’s adherence to the following conditions to ensure they are met:
SECURE PROTECTION AND HANDLING OF STATE DATA. If Contractor is given access to State Data, the protection of State Data shall be an integral part of the business activities of Contractor, and Contractor shall ensure that there is no inappropriate or unauthorized use of State Data. Contractor shall safeguard the confidentiality, integrity, and availability of the State Data and comply with the conditions outlined below. The Eligible User reserves the right to verify Contractor’s adherence to the following conditions to ensure they are met: Network Security: Contractor shall maintain network security that, at a minimum, includes: network firewall provisioning, intrusion detection, and regular third-party penetration testing. Contractor shall maintain network security and ensure that Contractor network security policies conform to one of the following: Those standards the State of Utah applies to its own network, found outlined in DTS Policy 5000-0002 Enterprise Information Security Policy; Current standards set forth and maintained by the National Institute of Standards and Technology, includes those at: xxxx://xxxxxxx.xxxx.xxx/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf; or Any generally recognized comparable standard that Contractor then applies to its own network and pre-approved by the Eligible User in writing. State Data Security: Contractor shall protect and maintain the security of State Data with protection that is at least as good as or better than that maintained by the State of Utah which will be provided by an Eligible User upon Contractor’s request (DTS Policy 5000-0002). These security measures included but are not limited to maintaining secure environments that are patched and up to date with all appropriate security updates as designated (ex. Microsoft Notification). The Eligible User reserves the right to determine if Contractor’s level of protection meets the Eligible User’s security requirements. State Data Transmission: Contractor shall ensure all transmission or exchange of system application data with the Eligible User and State of Utah and/or any other parties expressly designated by the State of Utah, shall take place via secure means (ex. HTTPS or FTPS).
SECURE PROTECTION AND HANDLING OF STATE DATA. 22.1. If Contractor is given State Data as part of this Contract, the protection of State Data shall be an integral part of the business activities of Contractor to ensure that there is no inappropriate or unauthorized use of State Data. To the extent that Contractor is given State Data, Contractor shall safeguard the confidentiality, integrity, and availability of the State Data. Contractor agrees to not copy, reproduce, sell, assign, license, market, transfer, or otherwise dispose of, give, or disclose such information to third parties or use such information for any purpose whatsoever other than the performance of the Contract. The improper use or disclosure of confidential information is strictly prohibited. 22.2. Any and all transmission or exchange of State Data shall take place via secure means. Contractor shall create, store, and maintain any State Data on secure or encrypted computing devices or any portable storage mediums. Contractor agrees to protect and maintain the security of State Data with security measures including, but are not limited to, maintaining secure environments that are patched and up to date with all appropriate security updates as designated, network firewall provisioning, and intrusion detection. Contractor agrees that any computing device or portable medium that has access to the Department’s network or stores any non-public State Data is equipped with strong and secure password protection. 22.3. Contractor shall: (a) limit disclosure of any State Data to Authorized Person who have a need to know such information in connection with the current or contemplated business relationship between the parties to which the Contract relates, and only for that purpose;
SECURE PROTECTION AND HANDLING OF STATE DATA. If Contractor is given State Data as part of this Contract, the protection of State Data shall be an integral part of the business activities of Contractor to ensure that there is no inappropriate or unauthorized use of State Data. To the extent that Contractor is given State Data, Contractor shall safeguard the confidentiality, integrity and availability of the State Data and comply with the following conditions: Network Security: Contractor agrees at all times to maintain network security that - at a minimum - includes: network firewall provisioning, intrusion detection, and regular third party penetration testing. Contractor also agrees to maintain network security that conforms to one of the following: (1) Those standards the State of Utah applies to its own network, found outlined in DTS Policy 5000-0002 Enterprise Information Security Policy (copy available upon request); (2) Current standards set forth and maintained by the National Institute of Standards and Technology, includes those at: xxxx://xxxxxxx.xxxx.xxx/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf; or (3) Any generally recognized comparable standard that Contractor then applies to its own network and approved by DTS in writing. State Data Security: Contractor agrees to protect and maintain the security of State Data with protection that is at least as good as or better than that maintained by the State of Utah. These security measures included but are not limited to maintaining secure environments that are patched and up to date with all appropriate security updates as designated (ex. Microsoft Notification).
SECURE PROTECTION AND HANDLING OF STATE DATA. If Contractor is given access to Data, the protection of Data shall be an integral part of the business activities of Contractor, and Contractor shall ensure that there is no inappropriate or unauthorized use of Data. Contractor shall safeguard the confidentiality, integrity, and availability of the Data and comply with the conditions outlined below. USBE reserves the right to verify Contractor’s adherence to the following conditions to ensure they are met.
AutoNDA by SimpleDocs

Related to SECURE PROTECTION AND HANDLING OF STATE DATA

  • Compliance with Federal and State Work Authorization and Immigration Laws The Contractor and all subcontractors, suppliers and consultants must comply with all federal and state work authorization and immigration laws, and must certify compliance using the form set forth in Section 7 (“Georgia Security and Immigration Compliance Act Affidavits”). The required certificates must be filed with the Owner and copied maintained by the Contractor as of the beginning date of this contract and each subcontract, supplier contract, or consultant contract, and upon final payment to the subcontractor or consultant. State officials, including officials of the Georgia Department of Audits and Accounts, officials of the Owner, retain the right to inspect and audit the Project Site and employment records of the Contractor, subcontractors and consultants without notice during normal working hours until Final Completion, and as otherwise specified by law and by Rules and Regulations of the Georgia Department of Audits and Accounts.

  • Certification Regarding Use of State Funds If Party is an employer and this Agreement is a State-funded grant in excess of $1,001, Party certifies that none of these State funds will be used to interfere with or restrain the exercise of Party’s employee’s rights with respect to unionization.

  • MAINTENANCE OF STANDARDS The Employer agrees, subject to the following provisions, that all conditions of employment in his/her individual operation relating to wages, hours of work, overtime differentials and general working conditions shall be maintained at not less than the highest standards in effect at the time of the signing of this Agreement, and the conditions of employment shall be improved whenever specific provisions for improvement are made elsewhere in this Agreement.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!