Security of County Data Sample Clauses

Security of County Data a. Contractor represents and warrants that Contractor’s personnel who have access to County data meet the necessary background checks, as conveyed to Contractor, and will adhere to the County’s security requirements as set forth in this Contract. Contractor’s personnel shall not view any human readable data unless authorized in writing by the County. All security incidents involving Contractor personnel or Contractor’s subcontractors, including unsecure or improper data disposal, theft, loss, unauthorized disclosure, incorrect transmission of data, hacking, IT Incident, and unauthorized Use/Access associated with County data, must be reported to the County Security Office no later than two (2) hours after the security incident.
AutoNDA by SimpleDocs
Security of County Data. Contractor represents and warrants that Contractor’s personnel who have access to County data meet the necessary background checks, as conveyed to Contractor, and will adhere to County’s security requirements as set forth in this Contract. Contractor’s personnel shall not view any human readable data unless authorized in writing by County. All security incidents involving Contractor personnel or Contractor’s subcontractors, including unsecure or improper data disposal, theft, loss, unauthorized disclosure, incorrect transmission of data, hacking, IT Incident, and unauthorized Use/Access associated with County data, must be promptly reported to the County Cyber Security contacts: Xxxxx Le, CHPC, CHC, CHP Interim Chief Information Security Officer 0000 X. Xx. Xxxxxxx Xxxxx, 2nd Floor Santa Ana, CA 92705 Office: (000) 000-0000 Email: xxxxx.xx@xxxxx.xxxxx.xxx xxxxxxxxxxxxxxxxxxx@xxxxx.xxxxx.xxx xxxxxxxxxxxxx@xxxxx.xxxxx.xxx
Security of County Data. Contractor shall at all times during the Term provide and maintain up- to-date security with respect to the System provided to County hereunder, which includes (a) the Services, (b) Contractor’s physical facilities, (c) Contractor’s computers, (d) Contractor’s staff remote work locations and (e) Contractor's networks, to prevent unauthorized access or “hacking” of County’s Data. Contractor shall provide security for its networks and all Internet connections consistent with best practices observed by well-managed Contractors working in the government or criminal justice services industry, and will promptly install all patches, fixes, upgrades, updates and new versions of any security software it employs. Contractor will maintain appropriate safeguards to restrict access to County's Data to those employees, agents or service providers of Contractor who need the information to carry out the purposes for which it was disclosed to Contractor. For information disclosed in electronic form, Contractor agrees that appropriate safeguards include electronic barriers (e.g“, "firewalls", Transport Layer Security (TLS), Secure Socket Layer [SSL] encryption, or most current industry standard encryption, intrusion prevention/detection or similar barriers) and secure authentication (e.g. password protected) access to the County's Confidential Information. Contractor warrants to the County compliance with the relevant security provisions of the Criminal Justice Services (CJIS) Security policy.

Related to Security of County Data

  • Security of Data a. Each of the parties shall:

  • USE OF COUNTY PROPERTY CONTRACTOR shall not use County property (including equipment, instruments and supplies) or personnel for any purpose other than in the performance of his/her obligations under this Agreement.

  • Use of County Facilities County facilities may be made available for use by employees and the Union. Such use shall not occur during regular working hours other than the lunch period. Application for such use shall be made to the management person under whose control the facility is placed. Employees attending meetings under this Section during duty hours may do so only on duly requested and authorized leave time.

  • Security of processing (a) The data importer and, during transmission, also the data exporter shall implement appropriate technical and organisational measures to ensure the security of the data, including protection against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to that data (hereinafter ‘personal data breach’). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purpose(s) of processing and the risks involved in the processing for the data subjects. The Parties shall in particular consider having recourse to encryption or pseudonymisation, including during transmission, where the purpose of processing can be fulfilled in that manner. In case of pseudonymisation, the additional information for attributing the personal data to a specific data subject shall, where possible, remain under the exclusive control of the data exporter. In complying with its obligations under this paragraph, the data importer shall at least implement the technical and organisational measures specified in Annex II. The data importer shall carry out regular checks to ensure that these measures continue to provide an appropriate level of security.

  • STATUS OF COUNTY 13 COUNTY is, and at all times shall be deemed to be, an independent contractor. 14 Nothing herein contained shall be construed as creating the relationship of 15 employer and employee, or principal and agent, between CITY and COUNTY 16 or any of COUNTY’s agents or employees. COUNTY and its SHERIFF shall 17 retain all authority for rendition of services, standards of performance, control of 18 personnel, and other matters incident to the performance of services by 19 COUNTY pursuant to this Agreement. COUNTY, its agents and employees 20 shall not be entitled to any rights or privileges of CITY employees and shall not 21 be considered in any manner to be CITY employees.

  • Security of State Information To the extent Contractor shall have access to, processes, handles, collects, transmits, stores or otherwise deals with State Data, the Contractor represents and warrants that it has implemented and it shall maintain during the term of this Master Agreement the highest industry standard administrative, technical, and physical safeguards and controls consistent with NIST Special Publication 800-53 (version 4 or higher) and Federal Information Processing Standards Publication 200 and designed to (i) ensure the security and confidentiality of State Data; (ii) protect against any anticipated security threats or hazards to the security or integrity of the State Data; and (iii) protect against unauthorized access to or use of State Data. Such measures shall include at a minimum: (1) access controls on information systems, including controls to authenticate and permit access to State Data only to authorized individuals and controls to prevent the Contractor employees from providing State Data to unauthorized individuals who may seek to obtain this information (whether through fraudulent means or otherwise); (2) industry-standard firewall protection; (3) encryption of electronic State Data while in transit from the Contractor networks to external networks; (4) measures to store in a secure fashion all State Data which shall include multiple levels of authentication; (5) dual control procedures, segregation of duties, and pre-employment criminal background checks for employees with responsibilities for or access to State Data; (6) measures to ensure that the State Data shall not be altered or corrupted without the prior written consent of the State; (7) measures to protect against destruction, loss or damage of State Data due to potential environmental hazards, such as fire and water damage; (8) staff training to implement the information security measures; and (9) monitoring of the security of any portions of the Contractor systems that are used in the provision of the services against intrusion on a twenty-four (24) hour a day basis.

  • Security of Premises 6A.5 The Customer shall be responsible for maintaining the security of the Premises in accordance with its standard security requirements. The Supplier shall comply with all reasonable security requirements of the Customer while on the Premises and shall ensure that the Supplier’s Staff comply with such requirements.

  • Use of County Buildings The Union shall be allowed the use of areas normally used for meeting purposes for meetings of County employees during non-work hours when:

  • Security of Vendor Facilities All Vendor and Vendor Staff facilities in which Citizens Confidential Information is located or housed shall be maintained in a reasonably secure manner. Within such facilities, all printed materials containing Citizens Confidential Information should be kept locked in a secure office, file cabinet, or desk (except when materials are being used).

  • SECURITY OF PERSONAL INFORMATION 19.1 For this clause “personal information” has the meaning given to it in the Privacy Act 1988 (Cth).

Time is Money Join Law Insider Premium to draft better contracts faster.