Security Administrator and Authorized Users Sample Clauses

Security Administrator and Authorized Users. Grantee shall: 1. designate a Security Administrator and a back-up Security Administrator. The Security Administrator is required to implement and maintain a system for management of user accounts/user roles to ensure that all the CMBHS user accounts are current. 2. have a security policy that ensures adequate system security and protection of confidential information. 3. notify the CMBHS Help-desk within ten (10) business days of any change to the designated Security Administrator or the back-up Security Administrator. Grantee will: i. ensure that access to CMBHS is restricted to only currently authorized users. ii. within 24 hours, remove access to users who are no longer authorized to have access to secure data in CMBHS. iii. maintain the CMBHS Authorized Users List which includes former and current Grantee’s employees, contracted labor, subcontractors or any other users authorized to have access to secure data in CMBHS. The CMBHS Authorized Users List shall document whose authority has been added and terminated; and the date the authority was added and terminated. 4. submit the CMBHS Security Attestation Form and the CMBHS Authorized Users List as stated in Attachment A, to the following e-mail address: XxxxxxxxxXxxxx.Xxxxxxxxx@xxxx.xxxxx.xx.
Security Administrator and Authorized Users. Grantee shall: ATTACHMENT E (REVISED AUGUST 2021) 1. Designate a Security Administrator and a back-up Security Administrator. The Security Administrator is required to implement and maintain a system for management of user accounts/user roles to ensure that all the CMBHS user accounts are current. 2. Have a security policy that ensures adequate system security and protection of confidential information.
Security Administrator and Authorized Users. Grantee shall: i. Designate a Security Administrator and a back-up Security Administrator. The Security Administrator is required to implement and maintain a system for management of user accounts/user roles to ensure that all the CMBHS System user accounts are current. ii. Have a security policy that ensures adequate system security and protection of confidential information. iii. Notify the CMBHS Help Desk within ten (10) business days of any change to the designated Security Administrator or the back-up Security Administrator. Grantee will: a. Ensure that access to CMBHS System is restricted to only currently authorized users. b. Within 24 hours, remove access to users who are no longer authorized to have access to secure data in CMBHS System. c. Maintain the CMBHS Authorized Users List which includes former and current Grantee’s employees, contracted labor, subcontractors or any other users authorized to have access to secure data in CMBHS System. The CMBHS Authorized Users List shall document whose authority has been added and terminated, and the date the authority was added and terminated. iv. Submit the CMBHS Security Attestation Form and the CMBHS Authorized Users List as stated in Attachment A, to the following e-mail address: XXX.Xxxxxxxxx@xxx.xxxxx.xxx. v. Continually maintain the current CMBHS Authorized Users List on file and make available to System Agency upon request within five (5) business days. vi. Immediately block access to CMBHS System of any person who should no longer have access to CMBHS System, due to severance of employment with Grantee or otherwise: a. Immediately modify access when there is a change in a user’s job responsibilities that affects the user’s need for access to CMBHS System; and b. Update records on a daily basis to reflect any changes in account status.
Security Administrator and Authorized Users. Grantee shall:

Related to Security Administrator and Authorized Users

  • Cloud Computing State Risk and Authorization Management Program In accordance with Senate Bill 475, Acts 2021, 87th Leg., R.S., pursuant to Texas Government Code, Section 2054.0593, Contractor acknowledges and agrees that, if providing cloud computing services for System Agency, Contractor must comply with the requirements of the state risk and authorization management program and that System Agency may not enter or renew a contract with Contractor to purchase cloud computing services for the agency that are subject to the state risk and authorization management program unless Contractor demonstrates compliance with program requirements. If providing cloud computing services for System Agency that are subject to the state risk and authorization management program, Contractor certifies it will maintain program compliance and certification throughout the term of the Contract.

  • Data Ownership and Authorized Access 1. Student Data Property of LEA. All Student Data transmitted to the Provider pursuant to the Service Agreement is and will continue to be the property of and under the control of the LEA. The Provider further acknowledges and agrees that all copies of such Student Data transmitted to the Provider, including any modifications or additions or any portion thereof from any source, are subject to the provisions of this DPA in the same manner as the original Student Data. The Parties agree that as between them, all rights, including all intellectual property rights in and to Student Data contemplated per the Service Agreement, shall remain the exclusive property of the LEA. For the purposes of FERPA, the Provider shall be considered a School Official, under the control and direction of the LEA as it pertains to the use of Student Data, notwithstanding the above.

  • Traditional Individual Retirement Custodial Account The following constitutes an agreement establishing an Individual Retirement Account (under Section 408(a) of the Internal Revenue Code) between the depositor and the Custodian.