We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.

For more information visit our privacy policy.

Common use of Security Incident Reporting Clause in Contracts

Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.

Appears in 42 contracts

Samples: Contract for Snap Ed/Calfresh Healthy Living Program Services, Elderly Nutrition Program Services Agreement, Health Insurance Counseling and Advocacy Program Services Agreement

Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, lost or stolen. Subrecipient The Contractor, and its Subcontractors/Vendors, must comply with CDA’s security incident reporting procedures procedure located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resourcesxxxxx://xxx.xxxxx.xx.

Appears in 30 contracts

Samples: Standard Agreement, Standard Agreement, Standard Agreement

Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient SUBRECIPIENT must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#ResourcesXxxx://Xxxxx.xx.xxx/InformationSecurity and Privacy.

Appears in 18 contracts

Samples: Service Agreement, Service Agreement, Service Agreement

Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#ResourcesXxxx://Xxxxx.xx.xxx/InformationSecurity and Privacy.

Appears in 16 contracts

Samples: Adult Day Care Services Agreement, Elderly Nutrition Program Services Agreement, Elderly Nutrition Program Services Agreement

Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, lost or stolen. Subrecipient The contractor and its Subcontractors/Vendors, must comply with CDA’s security incident reporting procedures procedure located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resourcesxxxxx://xxx.xxxxx.xx.

Appears in 10 contracts

Samples: Service Agreement, Agreement, Agreement

Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient Contractor must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.

Appears in 6 contracts

Samples: Home and Community Based Services Agreement, Home and Community Based Services Agreement, Service Agreement

Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, lost or stolen. Subrecipient The Contractor, and its Subcontractors/Vendors, must comply with CDA’s security incident reporting procedures procedure located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.

Appears in 5 contracts

Samples: Calfresh Healthy Living Expansion Standard Agreement, Standard Agreement, Standard Agreement

Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed belived to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient SUBRECIPIENT must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#ResourcesXxxx://Xxxxx.xx.xxx/InformationSecurity and Privacy.

Appears in 3 contracts

Samples: Contract for Family Caregiver Support Program Services, Family Caregiver Support Program Services Agreement, Family Caregiver Support Program Services Agreement

Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient Contractor must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.xxxxx://xxx.xxxxx.xx.xxx/Information_Security/Security_Incident_Reporting_Pro cedures/.

Appears in 2 contracts

Samples: Legal Assistance Services Agreement, Legal Assistance Services Agreement

Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.xxxxx://xxx.xxxxx.xx.xxx/Information_Security/Security_Incident_Reporting_Pro cedures/

Appears in 2 contracts

Samples: Contract for Provision of Services, Contract for Services

Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, lost or stolen. Subrecipient The Contractor, and its Subcontractors/Vendors, must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resourcesprocedure.

Appears in 2 contracts

Samples: Standard Agreement, Standard Agreement

Security Incident Reporting. a. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, lost or stolen. Subrecipient The Service Provider, and its Subcontractors/Vendors, must comply with CDA’s security incident reporting procedures procedure located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.xxxxx://xxx.xxxxx.xx.xxx/Information_Security/Security_Incident_Reporting_Procedures/.

Appears in 1 contract

Samples: Service Provider Agreement

Security Incident Reporting. a. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, lost or stolen. Subrecipient The Service Provider, and its Form 116-105 7/1/2020 Subcontractors/Vendors, must comply with CDA’s security incident reporting procedures reportingsprocedure located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.

Appears in 1 contract

Samples: Professional Services

Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resourcesxxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources .

Appears in 1 contract

Samples: Ombudsman & Elder Abuse Prevention Services Agreement

Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.proper

Appears in 1 contract

Samples: Contract for Services

Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient The FUNDED PARTNER must comply with report all security incidents to A4AA immediately upon detection. A Security Incident Report form (CDA 1025) must be submitted to CDA’s security , via A4AA, within five (5) business days of the date the incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resourceswas detected.

Appears in 1 contract

Samples: Contract Agreement

Security Incident Reporting. a. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, lost or stolen. Subrecipient The Service Provider, and its Subcontractors/Vendors, must comply with CDA’s security incident reporting procedures procedure located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.

Appears in 1 contract

Samples: Service Provider Agreement

Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient Contractor must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.xxxxx://xxx.xxxxx.xx.xxx/Information_Security/Security_Incident_Reporting_Procedure s/.

Appears in 1 contract

Samples: Contract Ma 012 23010312

Security Incident Reporting. A security incident occurs when CDA information assets are or are reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient The FUNDED PARTNER must comply with report all security incidents to A4AA immediately upon detection. A Security Incident Report form (CDA 1025) must be submitted to CDA’s security , via A4AA, within five (5) business days of the date the incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resourceswas detected.

Appears in 1 contract

Samples: Contract Agreement

Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient must comply with DocuSign Envelope ID: 7CAFB1BB-B16E-416A-A4D1-19CEF63155C6 CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.

Appears in 1 contract

Samples: Contract No. 20 27 0045

Security Incident Reporting. A security incident occurs when CDA information assets are or are reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, lost or stolen. Subrecipient The Contractor, and its subcontractors/vendors, must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resourcesprocedure.

Appears in 1 contract

Samples: Standard Agreement

Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient CONTRACTOR must comply with CDA’s report all security incidents COUNTY immediately upon detection. A Security Incident Report (CDA 1025) form must be submitted to the CDA Information Security Officer within five (5) business days of the date the incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resourceswas detected.

Appears in 1 contract

Samples: Services Agreement

Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.xxxxx://xxx.xxxxx.xx.xxx/Information_Security/Security_Incident_Reporting_Procedure s/

Appears in 1 contract

Samples: Contract Ma 012 23010011