Security of Electronic Information Sample Clauses

Security of Electronic Information. Service Provider shall develop, implement, maintain and use appropriate administrative, technical and physical security measures and technical safeguards to preserve the confidentiality, integrity and availability of all electronically maintained or transmitted CDI received from or on behalf of the District or its students or employees. Service Provider shall store and process CDI in accordance with industry best practices to secure CDI from unauthorized access, disclosure and use. These security measures and technical safeguards shall be extended by express written agreement to all subcontractors and third parties used by Service Provider. Service Provider shall at a minimum:
AutoNDA by SimpleDocs
Security of Electronic Information. Business Associate shall develop, implement, maintain and use appropriate administrative, technical and physical security measures to preserve the confidentiality, integrity and availability of all electronically maintained or transmitted health information received from, or created or received by Business Associate on behalf of, the Covered Entity, which pertains to an Individual. As of the Compliance Date of 42 USC §17931, Business Associate shall comply with the requirements set forth in 45 CFR §§164.308, 164.310, 164.312 and 164.316.
Security of Electronic Information. Business Associate shall develop, implement, maintain and use appropriate administrative, technical and physical security measures to preserve the confidentiality, integrity and availability of all electronically maintained or transmitted health information received from, or created or received by Business Associate on behalf of, the University, which pertains to an Individual. Business Associate shall document and keep such security measures current and available for inspection upon request. Business Associate’s security measures must be consistent with the Security Rule. As of the Compliance Date of 42 USC §17931, Business Associate shall comply with the requirements set forth in 45 CFR §§164.308, 164.310, 164.312 and 164.316.
Security of Electronic Information. The Parties shall implement, maintain, and use appropriate administrative, technical, and physical security measures to preserve the confidentiality, integrity, and availability of all electronically maintained or transmitted CDI. The survey and program participation data will be stored and maintained in the secure server of the NIH Office of Strategic Coordination, which is the office that provides the funding for the BEST program. A password protected directory will be used and only authorized users will have access to the survey data and participation data. The specifications of this DSA will be extended to all personnel who have access to the data. The NIH Center for Information Technology will administer the online surveys and will be responsible for ensuring the security of the data collected. The Contractor will follow the NIH Privacy Act Systems of Record Notice 09-25-0156. Reporting of Unauthorized Disclosures or Misuse of Covered Data and Information Each party shall, within one day of discovery, notify the other party regarding any unauthorized use or disclosure of CDI. The notification shall identify: (i) the nature of the unauthorized use or disclosure, (ii) the CDI used or disclosed, (iii) who made the unauthorized use or received the unauthorized disclosure,
Security of Electronic Information. Receiving Party shall develop, implement, maintain and use appropriate administrative, technical, and physical security measures to preserve the confidentiality, integrity, and availability of all electronically maintained or transmitted Confidential Information received from, or on behalf of Arcadia.
Security of Electronic Information. Recipient shall develop, implement, maintain and use appropriate administrative, technical and physical security measures to preserve the confidentiality, integrity and availability of all transmitted and stored CDI received from, or on behalf of USC or its Constituents. Recipient shall impose these measures on all subcontractors or other third parties used by Recipient.
Security of Electronic Information. Recipient shall develop, implement, maintain and use appropriate administrative, technical and physical security measures to preserve the confidentiality, integrity and availability of all transmitted and stored CDI received from, or on behalf of USC or its Constituents. Recipient shall impose these measures on all subcontractors or other third parties used by Recipient. Reporting Unauthorized Disclosures or Misuse of Covered Data and Information: Recipient shall, within one (1) day of discovery, report to Sender, the University Information Security Office (UISO), and Agency Privacy Liaison any use or disclosure of CDI not authorized by the Agreement or in writing. Recipient's report shall identify: (1) the nature of the unauthorized use or disclosure, (2) the CDI used or disclosed, (3) the identity of the individual(s) or entity that received the unauthorized disclosure, (4) the action(s) that Recipient has taken or shall take to mitigate any potentially negative effects of the unauthorized use or disclosure, and (5) the corrective action(s) Recipient has taken or shall take to prevent future similar unauthorized uses or disclosures. Recipient shall provide any additional information in connection with the unauthorized disclosure reasonably requested by Sender or UISO. Requirements for Documentation, Review and Data Definitions Once finalized, this Data Sharing Agreement must be registered with DoIT Analytics and Data Governance and scheduled for annual review, leading to renewal, alteration, or elimination. To initiate a request, the Requestor must submit a Service Desk ticket under the catalog item ‘Data Governance’ or by clicking this link. Data elements flowing from the Sender to the Requestor must be defined and classified with Data Analytics and Governance to fully support and document this agreement. The Requestor is likewise responsible for defining the universe of data elements contained in the receiving information system or data store with Data Analytics and Governance.
AutoNDA by SimpleDocs
Security of Electronic Information. Service provider shall develop, implement, maintain and use appropriate administrative, technical and physical security measures to preserve the confidentiality, integrity and availability of all electronically maintained or transmitted CDI received from, or on behalf of UC or its students. These measures will be extended by contract to all subcontractors used by service provider.
Security of Electronic Information. Service Provider shall develop, implement, maintain and use appropriate administrative, technical and physical security measures to preserve the confidentiality, integrity and availability of all electronically maintained or transmitted CDI received from, or on behalf of Institution or its students. These measures will be extended by contract to all subcontractors used by Service Provider. Reporting of Unauthorized Disclosures or Misuse of Covered Data and Information: Service Provider, within one day of discovery, shall report to Institution any use or disclosure of CDI not authorized by this Addendum or in writing by Institution. Service Provider’s report shall identify: (i) the nature of the unauthorized use or disclosure, (ii) the CDI used or disclosed, (iii) who made the unauthorized use or received the unauthorized disclosure, (iv) what Service Provider has done or shall do to mitigate any deleterious effect of the unauthorized use or disclosure, and (v) what corrective action Service Provider has taken or shall take to prevent future similar unauthorized use or disclosure. Service Provider shall provide such other information, including a written report, as reasonably requested by Institution.

Related to Security of Electronic Information

  • Personal Information Protection Each party represents and warrants that procedures compatible with relevant personal information and data protection laws and regulations will be employed so that processing and transfer of such information and data identifiers will not be impeded. d.

  • SECURITY OF PERSONAL INFORMATION 19.1 For this clause “personal information” has the meaning given to it in the Privacy Act 1988 (Cth).

  • Security of Confidential Information Each party possessing Confidential Information of the other party will maintain all such Confidential Information under secure conditions, using reasonable security measures and in any event not less than the same security procedures used by such party for the protection of its own Confidential Information of a similar kind.

  • Electronic Protected Health Information “Electronic Protected Health Information” means individually identifiable health information that is transmitted by or maintained in electronic media.

  • Confidentiality and Safeguarding of University Records; Press Releases; Public Information Under this Agreement, Contractor may (1) create, (2) receive from or on behalf of University, or (3) have access to, records or record systems (collectively, University Records). However, it is expressly agreed that University will not provide to Contractor, and Contractor will never seek to access, any University Records that contain personally identifiable information regarding any individual that is not available to any requestor under the Texas Public Information Act, Chapter 552, Texas Government Code, including “directory information” of any student who has opted to prohibit the release of their “directory information” as that term is defined under the Family Educational Rights and Privacy Act, 20 USC §1232g (FERPA) and its implementing regulations. [Option (Include if University is a HIPAA Covered Entity and University Records are subject to HIPAA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Health Insurance Portability and Accountability Act and 45 CFR Part 160 and subparts A and E of Part 164 (collectively HIPAA) are addressed in Section 12.26.] Contractor represents, warrants, and agrees that it will: (1) hold University Records in strict confidence and will not use or disclose University Records except as (a) permitted or required by this Agreement, (b) required by Applicable Laws, or (c) otherwise authorized by University in writing; (2) safeguard University Records according to reasonable administrative, physical and technical standards (such as standards established by the National Institute of Standards and Technology and the Center for Internet Security [Option (Include if Section 12.39 related to Payment Card Industry Data Security Standards is not include in this Agreement.):, as well as the Payment Card Industry Data Security Standards]) that are no less rigorous than the standards by which Contractor protects its own confidential information; (3) continually monitor its operations and take any action necessary to assure that University Records are safeguarded and the confidentiality of University Records is maintained in accordance with all Applicable Laws and the terms of this Agreement; and (4) comply with University Rules regarding access to and use of University’s computer systems, including UTS 165 at xxxx://xxx.xxxxxxxx.xxx/board-of-regents/policy-library/policies/uts165-information-resources-use-and-security-policy. At the request of University, Contractor agrees to provide University with a written summary of the procedures Contractor uses to safeguard and maintain the confidentiality of University Records.]

Time is Money Join Law Insider Premium to draft better contracts faster.