Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.
Appears in 42 contracts
Samples: Contract for Snap Ed/Calfresh Healthy Living Program Services, Elderly Nutrition Program Services Agreement, Health Insurance Counseling and Advocacy Program Services Agreement
Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, lost or stolen. Subrecipient The Contractor, and its Subcontractors/Vendors, must comply with CDA’s security incident reporting procedures procedure located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resourcesxxxxx://xxx.xxxxx.xx.
Appears in 30 contracts
Samples: Standard Agreement, Standard Agreement, Standard Agreement
Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient SUBRECIPIENT must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#ResourcesXxxx://Xxxxx.xx.xxx/InformationSecurity and Privacy.
Appears in 18 contracts
Samples: Service Agreement, Service Agreement, Service Agreement
Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#ResourcesXxxx://Xxxxx.xx.xxx/InformationSecurity and Privacy.
Appears in 16 contracts
Samples: Adult Day Care Services Agreement, Elderly Nutrition Program Services Agreement, Elderly Nutrition Program Services Agreement
Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, lost or stolen. Subrecipient The contractor and its Subcontractors/Vendors, must comply with CDA’s security incident reporting procedures procedure located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resourcesxxxxx://xxx.xxxxx.xx.
Appears in 10 contracts
Samples: Service Agreement, Agreement, Agreement
Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient Contractor must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.
Appears in 6 contracts
Samples: Home and Community Based Services Agreement, Home and Community Based Services Agreement, Service Agreement
Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, lost or stolen. Subrecipient The Contractor, and its Subcontractors/Vendors, must comply with CDA’s security incident reporting procedures procedure located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.
Appears in 5 contracts
Samples: Calfresh Healthy Living Expansion Standard Agreement, Standard Agreement, Standard Agreement
Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed belived to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient SUBRECIPIENT must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#ResourcesXxxx://Xxxxx.xx.xxx/InformationSecurity and Privacy.
Appears in 3 contracts
Samples: Contract for Family Caregiver Support Program Services, Family Caregiver Support Program Services Agreement, Family Caregiver Support Program Services Agreement
Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient Contractor must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.xxxxx://xxx.xxxxx.xx.xxx/Information_Security/Security_Incident_Reporting_Pro cedures/.
Appears in 2 contracts
Samples: Legal Assistance Services Agreement, Legal Assistance Services Agreement
Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.xxxxx://xxx.xxxxx.xx.xxx/Information_Security/Security_Incident_Reporting_Pro cedures/
Appears in 2 contracts
Samples: Contract for Provision of Services, Contract for Services
Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, lost or stolen. Subrecipient The Contractor, and its Subcontractors/Vendors, must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resourcesprocedure.
Appears in 2 contracts
Samples: Standard Agreement, Standard Agreement
Security Incident Reporting. a. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, lost or stolen. Subrecipient The Service Provider, and its Subcontractors/Vendors, must comply with CDA’s security incident reporting procedures procedure located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.xxxxx://xxx.xxxxx.xx.xxx/Information_Security/Security_Incident_Reporting_Procedures/.
Appears in 1 contract
Samples: Service Provider Agreement
Security Incident Reporting. a. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, lost or stolen. Subrecipient The Service Provider, and its Form 116-105 7/1/2020 Subcontractors/Vendors, must comply with CDA’s security incident reporting procedures reportingsprocedure located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.
Appears in 1 contract
Samples: Professional Services
Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resourcesxxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources .
Appears in 1 contract
Samples: Ombudsman & Elder Abuse Prevention Services Agreement
Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.proper
Appears in 1 contract
Samples: Contract for Services
Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient The FUNDED PARTNER must comply with report all security incidents to A4AA immediately upon detection. A Security Incident Report form (CDA 1025) must be submitted to CDA’s security , via A4AA, within five (5) business days of the date the incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resourceswas detected.
Appears in 1 contract
Samples: Contract Agreement
Security Incident Reporting. a. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, lost or stolen. Subrecipient The Service Provider, and its Subcontractors/Vendors, must comply with CDA’s security incident reporting procedures procedure located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.
Appears in 1 contract
Samples: Service Provider Agreement
Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient Contractor must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.xxxxx://xxx.xxxxx.xx.xxx/Information_Security/Security_Incident_Reporting_Procedure s/.
Appears in 1 contract
Samples: Contract Ma 012 23010312
Security Incident Reporting. A security incident occurs when CDA information assets are or are reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient The FUNDED PARTNER must comply with report all security incidents to A4AA immediately upon detection. A Security Incident Report form (CDA 1025) must be submitted to CDA’s security , via A4AA, within five (5) business days of the date the incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resourceswas detected.
Appears in 1 contract
Samples: Contract Agreement
Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient must comply with DocuSign Envelope ID: 7CAFB1BB-B16E-416A-A4D1-19CEF63155C6 CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.
Appears in 1 contract
Samples: Contract No. 20 27 0045
Security Incident Reporting. A security incident occurs when CDA information assets are or are reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, lost or stolen. Subrecipient The Contractor, and its subcontractors/vendors, must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resourcesprocedure.
Appears in 1 contract
Samples: Standard Agreement
Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient CONTRACTOR must comply with CDA’s report all security incidents COUNTY immediately upon detection. A Security Incident Report (CDA 1025) form must be submitted to the CDA Information Security Officer within five (5) business days of the date the incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resourceswas detected.
Appears in 1 contract
Samples: Services Agreement
Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.xxxxx://xxx.xxxxx.xx.xxx/Information_Security/Security_Incident_Reporting_Procedure s/
Appears in 1 contract
Samples: Contract Ma 012 23010011