Security of Confidential Personal Information. The Contractor in its possession and use of Confidential Personal Information for purposes of performance under this Contract must implement and use at all times electronic and other security measures, standards, and procedures that meet or exceed current best business practices among like entities and operations, are compatible with the technology and programs of the Department, and, if requested by the Department, have been reviewed in a manner that protects the confidentiality of Contractor’s security measures, standards and procedures.
Appears in 5 contracts
Security of Confidential Personal Information. The In its use and possession of confidential personal information, the Contractor in its possession and use of Confidential Personal Information for purposes of performance under this Contract must implement and use at all times electronic and other conform with security measures, standards, standards and procedures that meet meeting or exceed exceeding current best business practices among like entities practices. Upon the Department’s request, the Contractor will allow the Department to review and operations, are compatible with the technology approve any specific security standards and programs procedures of the Department, and, if requested by the Department, have been reviewed in a manner that protects the confidentiality of Contractor’s security measures, standards and procedures.
Appears in 3 contracts
Samples: Master Contract, Crisis Intervention and Jail Diversion Contract, Pharmacy Benefits/Claims Management Services Contract
Security of Confidential Personal Information. The In its use and possession of confidential personal information, the Contractor in its possession and use of Confidential Personal Information for purposes of performance under this Contract must implement and use at all times electronic and other conform to security measures, standards, standards and procedures that meet meeting or exceed exceeding current best business practices among like entities practices. Upon the Department’s request, the Contractor will allow the Department to review and operations, are compatible with the technology approve any specific security standards and programs procedures of the Department, and, if requested by the Department, have been reviewed in a manner that protects the confidentiality of Contractor’s security measures, standards and procedures.
Appears in 1 contract
Security of Confidential Personal Information. The Contractor in its possession and use of Confidential Personal Information for purposes of performance under this Contract must implement and use at all times electronic and other security measures, standards, and procedures that meet or exceed current best industry standard business practices among like entities and operations, and if applicable are compatible with the technology and programs of the Department, and, if requested by the Department, have been reviewed in a manner that protects the confidentiality of Contractor’s security measures, standards and procedures.
Appears in 1 contract
Samples: Contract
Security of Confidential Personal Information. The Contractor in its possession and use of Confidential Personal Information confidential personal information for purposes of performance under this Contract must implement and use at all times electronic and other security measures, standards, and procedures that meet or exceed current best business practices among like entities and operations, are compatible with the technology and programs of the Department, and, if requested by the Department, have been reviewed in a manner that protects and approved by the confidentiality of Contractor’s security measures, standards and proceduresDepartment.
Appears in 1 contract
Samples: Pharmacy Benefits/Claims Management Services Contract