SECURE PROTECTION AND HANDLING OF STATE DATA Sample Clauses

SECURE PROTECTION AND HANDLING OF STATE DATA. 29.1. If Contractor is given State Data as part of this Contract, the protection of State Data shall be an integral part of the business activities of Contractor to ensure that there is no inappropriate or unauthorized use of State Data. To the extent that Contractor is given State Data, Contractor shall safeguard the confidentiality, integrity, and availability of the State Data. Contractor agrees to not to copy, reproduce, sell, assign, license, market, transfer, or otherwise dispose of, give, or disclose such information to third parties or use such information for any purpose whatsoever other than the performance of the Contract. The improper use or disclosure of confidential information is strictly prohibited. 29.2. Any and all transmission or exchange of State Data shall take place via secure means. Contractor shall create, store, and maintain any State Data on secure or encrypted computing devices or any portable storage mediums. Contractor agrees to protect and maintain the security of State Data with security measures including, but are not limited to, maintaining secure environments that are patched and up to date with all appropriate security updates as designated, network firewall provisioning, and intrusion detection. Contractor agrees that any computing device or portable medium that has access to the Department’s network or stores any non-public State Data is equipped with strong and secure password protection. 29.3. Contractor shall: (a) limit disclosure of any State Data to Authorized Person who have a need to know such information in connection with the current or contemplated business relationship between the parties to which the Contract relates, and only for that purpose; (b) advise its Authorized Persons of the proprietary nature of 29.4. Contractor will promptly notify the Department of any misuse or misappropriation of State Data that comes to Contractor’s attention. Contractor shall be responsible for any breach of this duty of confidentiality by any of their officers, agents, subcontractors at any tier, and any of their respective representatives, including any required remedies and/or notifications under applicable law (Utah Code Xxx. §§ 00-00-000 through 301). This duty of confidentiality shall be ongoing and survive the term of the Contract. Notwithstanding the foregoing, if there is a discrepancy between a signed business associate agreement and this provision, the business associate agreement language shall take precedence.
AutoNDA by SimpleDocs
SECURE PROTECTION AND HANDLING OF STATE DATA. 29.1. If Subrecipient is given State Data as part of this Contract, the protection of State Data shall be an integral part of the business activities of Subrecipient to ensure that there is no inappropriate or unauthorized use of State Data. To the extent that Subrecipient is given State Data, Subrecipient shall safeguard the confidentiality, integrity, and availability of the State Data. Subrecipient agrees to not copy, reproduce, sell, assign, license, market, transfer, or otherwise dispose of, give, or disclose such information to third parties or use such information for any purpose whatsoever other than the performance of the Contract. The improper use or disclosure of confidential information is strictly prohibited. 29.2. Any and all transmission or exchange of State Data shall take place via secure means. Subrecipient shall create, store, and maintain any State Data on secure or encrypted computing devices or any portable storage mediums. Subrecipient agrees to protect and maintain the security of State Data with security measures including, but are not limited to, maintaining secure environments that are patched and up to date with all appropriate security updates as designated, network firewall provisioning, and intrusion detection. Subrecipient agrees that any computing device or portable medium that has access to the Department’s network or stores any non-public State Data is equipped with strong and secure password protection. 29.3. Subrecipient shall: (a) limit disclosure of any State Data to Authorized Person who have a need to know such information in connection with the current or contemplated business relationship between the parties to which the Contract relates, and only for that purpose; (b) advise its Authorized Persons of the proprietary nature of the State Data and of the obligations set forth in the Contract and require such Authorized Persons to keep the State Data confidential; (c) keep all State Data strictly confidential by using a reasonable degree of care, but not less than the degree of care used by it in safeguarding its own confidential information; and (d) not disclose any State Data received by it to any third parties, except as permitted by the Contract or otherwise agreed to in writing by the Department. 29.4. Subrecipient will promptly notify the Department of any misuse or misappropriation of State Data that comes to Subrecipient’s attention. Subrecipient shall be responsible for any breach of this duty of confidentia...
SECURE PROTECTION AND HANDLING OF STATE DATA. If Contractor is given access to State Data, the protection of State Data shall be an integral part of the business activities of Contractor, and Contractor shall ensure that there is no inappropriate or unauthorized use of State Data. Contractor shall safeguard the confidentiality, integrity, and availability of the State Data and comply with the conditions outlined below. The Eligible User reserves the right to verify Contractor’s adherence to the following conditions to ensure they are met: Network Security: Contractor shall maintain network security that, at a minimum, includes: network firewall provisioning, intrusion detection, and regular third-party penetration testing. Contractor shall maintain network security and ensure that Contractor network security policies conform to one of the following: Those standards the State of Utah applies to its own network, found outlined in DTS Policy 5000-0002 Enterprise Information Security Policy; Current standards set forth and maintained by the National Institute of Standards and Technology, includes those at: xxxx://xxxxxxx.xxxx.xxx/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf; or Any generally recognized comparable standard that Contractor then applies to its own network and pre-approved by the Eligible User in writing. State Data Security: Contractor shall protect and maintain the security of State Data with protection that is at least as good as or better than that maintained by the State of Utah which will be provided by an Eligible User upon Contractor’s request (DTS Policy 5000-0002). These security measures included but are not limited to maintaining secure environments that are patched and up to date with all appropriate security updates as designated (ex. Microsoft Notification). The Eligible User reserves the right to determine if Contractor’s level of protection meets the Eligible User’s security requirements. State Data Transmission: Contractor shall ensure all transmission or exchange of system application data with the Eligible User and State of Utah and/or any other parties expressly designated by the State of Utah, shall take place via secure means (ex. HTTPS or FTPS).
SECURE PROTECTION AND HANDLING OF STATE DATA. If Contractor is given access to State Data, the protection of State Data shall be an integral part of the business activities of Contractor, and Contractor shall ensure that there is no inappropriate or unauthorized use of State Data. Contractor shall safeguard the confidentiality, integrity, and availability of the State Data and comply with the conditions outlined below. The Eligible User reserves the right to verify Contractor’s adherence to the following conditions to ensure they are met:
SECURE PROTECTION AND HANDLING OF STATE DATA. 22.1. If Contractor is given State Data as part of this Contract, the protection of State Data shall be an integral part of the business activities of Contractor to ensure that there is no inappropriate or unauthorized use of State Data. To the extent that Contractor is given State Data, Contractor shall safeguard the confidentiality, integrity, and availability of the State Data. Contractor agrees to not copy, reproduce, sell, assign, license, market, transfer, or otherwise dispose of, give, or disclose such information to third parties or use such information for any purpose whatsoever other than the performance of the Contract. The improper use or disclosure of confidential information is strictly prohibited. 22.2. Any and all transmission or exchange of State Data shall take place via secure means. Contractor shall create, store, and maintain any State Data on secure or encrypted computing devices or any portable storage mediums. Contractor agrees to protect and maintain the security of State Data with security measures including, but are not limited to, maintaining secure environments that are patched and up to date with all appropriate security updates as designated, network firewall provisioning, and intrusion detection. Contractor agrees that any computing device or portable medium that has access to the Department’s network or stores any non-public State Data is equipped with strong and secure password protection. 22.3. Contractor shall: (a) limit disclosure of any State Data to Authorized Person who have a need to know such information in connection with the current or contemplated business relationship between the parties to which the Contract relates, and only for that purpose;
SECURE PROTECTION AND HANDLING OF STATE DATA. If Contractor is given State Data as part of this Contract, the protection of State Data shall be an integral part of the business activities of Contractor to ensure that there is no inappropriate or unauthorized use of State Data. To the extent that Contractor is given State Data, Contractor shall safeguard the confidentiality, integrity and availability of the State Data and comply with the following conditions: Network Security: Contractor agrees at all times to maintain network security that - at a minimum - includes: network firewall provisioning, intrusion detection, and regular third party penetration testing. Contractor also agrees to maintain network security that conforms to one of the following: (1) Those standards the State of Utah applies to its own network, found outlined in DTS Policy 5000-0002 Enterprise Information Security Policy (copy available upon request); (2) Current standards set forth and maintained by the National Institute of Standards and Technology, includes those at: xxxx://xxxxxxx.xxxx.xxx/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf; or (3) Any generally recognized comparable standard that Contractor then applies to its own network and approved by DTS in writing. State Data Security: Contractor agrees to protect and maintain the security of State Data with protection that is at least as good as or better than that maintained by the State of Utah. These security measures included but are not limited to maintaining secure environments that are patched and up to date with all appropriate security updates as designated (ex. Microsoft Notification).
SECURE PROTECTION AND HANDLING OF STATE DATA. If Contractor is given access to Data, the protection of Data shall be an integral part of the business activities of Contractor, and Contractor shall ensure that there is no inappropriate or unauthorized use of Data. Contractor shall safeguard the confidentiality, integrity, and availability of the Data and comply with the conditions outlined below. USBE reserves the right to verify Contractor’s adherence to the following conditions to ensure they are met.
AutoNDA by SimpleDocs

Related to SECURE PROTECTION AND HANDLING OF STATE DATA

  • System Protection To prevent compromise of systems which contain DSHS Data or through which that Data passes: a. Systems containing DSHS Data must have all security patches or hotfixes applied within 3 months of being made available. b. The Contractor will have a method of ensuring that the requisite patches and hotfixes have been applied within the required timeframes. c. Systems containing DSHS Data shall have an Anti-Malware application, if available, installed. d. Anti-Malware software shall be kept up to date. The product, its anti-virus engine, and any malware database the system uses, will be no more than one update behind current.

  • Certification Regarding Use of State Funds If Party is an employer and this Agreement is a State-funded grant in excess of $1,001, Party certifies that none of these State funds will be used to interfere with or restrain the exercise of Party’s employee’s rights with respect to unionization.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!