Security Incident Reporting. 9.17.13.1 A security incident occurs when County Information Assets are or reasonably believed to have been accessed, modified, destroyed or disclosed without proper authorization or are lost or stolen. A security incident includes (but is not limited to) instances in which Subrecipient employees access systems in excess of their user rights or use the systems inappropriately, data is breached, etc. Subrecipient and its Lower Tier Subrecipient must comply with California Department of Aging's security incident reporting procedure which is available online at xxxx://xxxxx.xx.xxx/Programsproviders/Information_ Security_and_Privacy.
Appears in 11 contracts
Samples: Subaward Agreement, Subaward Agreement, Subaward Agreement
Security Incident Reporting. 9.17.13.1 9.17.9.1 A security incident occurs when County Information Assets are or reasonably believed to have been accessed, modified, destroyed or disclosed without proper authorization or are lost or stolen. A security incident includes (but is not limited to) instances in which Subrecipient employees access systems in excess of their user rights or use the systems inappropriately, data is breached, etc. Subrecipient and its any approved Lower Tier Subrecipient must comply with California Department of Aging's security incident reporting procedure which is available online at xxxx://xxxxx.xx.xxx/Programsproviders/Information_ Security_and_PrivacySecu rity_and_Privacy.
Appears in 1 contract
Security Incident Reporting. 9.17.13.1 A security incident occurs when County Information Assets are or reasonably believed to have been accessed, modified, destroyed or disclosed without proper authorization or are lost or stolen. A security incident includes (but is not limited to) instances in which Subrecipient employees access systems in excess of their user rights or use the systems inappropriately, data is breached, etc. Subrecipient and its any approved Lower Tier Subrecipient must comply with California Department of Aging's security incident reporting procedure which is available online at xxxx://xxxxx.xx.xxx/Programsproviders/Information_ Security_and_Privacy.
Appears in 1 contract
Samples: Subaward Agreement