Securing Information Technology Assets Sample Clauses

Securing Information Technology Assets. For the purposes of this Agreement, compliance with the HIPAA Security Standard and all subsequent updates meets OICIO standard 141.10 “Securing Information Technology Assets.” The Information Recipient agrees to adhere to the Data Security Requirements in Appendix B. The Information Recipient further assures that it has taken steps necessary to prevent unauthorized access, use, or modification of the information in any form. The Information Recipient agrees to notify the DOH Chief Information Security Officer within two (2) business days of any suspected or actual confidentiality or security breach.
AutoNDA by SimpleDocs
Securing Information Technology Assets. Compliance with the HIPAA Security Standard and all subsequent updates meets OCIO standard 141.10 “Securing Information Technology Assets”. Has taken steps necessary to prevent unauthorized access, use, or modification of the information in any form. The Information Recipient agrees to store information received under this Agreement within the United States on one or more of the following media, and to protect it as described below:
Securing Information Technology Assets. OCIO IT Security Standard 141.10, Securing Information Technology Assets, applies to all OSPI assets stored as part of a service, application, data, system, portal, module, components or plug-in product(s) that are secured as defined by the WaTech OCIO's IT Security Policy 141 and OCIO IT Security Standard 141.10, Securing Information Technology Assets. As part of OCIO IT Security Standard 141.10, a design review checklist and/or other action may be required. These activities will be managed and coordinated between OSPI and Contractor. Any related costs to performing these activities shall be at the expense of Contractor. Any such activities and resulting checklist and/or other products must be shared with OSPI’s Information Technology Services.
Securing Information Technology Assets. For the purposes of this Agreement, compliance with the HIPAA Security Standard and all subsequent updates meets OCIO standard 141.10 “Securing Information Technology Assets.” [TRIBE] agrees to adhere to the Data Security Requirements in Appendix B and this data sharing agreement. [TRIBE] further assures that it has taken steps necessary to prevent unauthorized access, use, or modification of the information in any form.

Related to Securing Information Technology Assets

  • Information Technology The following applies to all contracts for information technology commodities and contractual services. “Information technology” is defined in section 287.012(15), F.S., to have the same meaning as provided in section 282.0041, F.S.

  • COMMERCIAL COMPUTER SOFTWARE If performance involves acquisition of existing computer software, the following Company Exhibit is incorporated by reference: CCS Commercial Computer Software License (Company – July 2010).

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!