Security of Electronic Information Sample Clauses

Security of Electronic Information. Service Provider shall develop, implement, maintain and use appropriate administrative, technical and physical security measures and technical safeguards to preserve the confidentiality, integrity and availability of all electronically maintained or transmitted CDI received from or on behalf of the District or its students or employees. Service Provider shall store and process CDI in accordance with industry best practices to secure CDI from unauthorized access, disclosure and use. These security measures and technical safeguards shall be extended by express written agreement to all subcontractors and third parties used by Service Provider. Service Provider shall at a minimum:
AutoNDA by SimpleDocs
Security of Electronic Information. Business Associate shall develop, implement, maintain and use appropriate administrative, technical and physical security measures to preserve the confidentiality, integrity and availability of all electronically maintained or transmitted health information received from, or created or received by Business Associate on behalf of, the Covered Entity, which pertains to an Individual. As of the Compliance Date of 42 USC §17931, Business Associate shall comply with the requirements set forth in 45 CFR §§164.308, 164.310, 164.312 and 164.316.
Security of Electronic Information. Business Associate shall develop, implement, maintain and use appropriate administrative, technical and physical security measures to preserve the confidentiality, integrity and availability of all electronically maintained or transmitted health information received from, or created or received by Business Associate on behalf of, the University, which pertains to an Individual. Business Associate shall document and keep such security measures current and available for inspection upon request. Business Associate’s security measures must be consistent with the Security Rule. As of the Compliance Date of 42 USC §17931, Business Associate shall comply with the requirements set forth in 45 CFR §§164.308, 164.310, 164.312 and 164.316.
Security of Electronic Information. Recipient shall develop, implement, maintain and use appropriate administrative, technical and physical security measures to preserve the confidentiality, integrity and availability of all transmitted and stored CDI received from, or on behalf of USC or its Constituents. Recipient shall impose these measures on all subcontractors or other third parties used by Recipient.
Security of Electronic Information. Receiving Party shall develop, implement, maintain and use appropriate administrative, technical, and physical security measures to preserve the confidentiality, integrity, and availability of all electronically maintained or transmitted Confidential Information received from, or on behalf of Arcadia.
Security of Electronic Information. The Parties shall implement, maintain, and use appropriate administrative, technical, and physical security measures to preserve the confidentiality, integrity, and availability of all electronically maintained or transmitted CDI. The survey and program participation data will be stored and maintained in the secure server of the NIH Office of Strategic Coordination, which is the office that provides the funding for the BEST program. A password protected directory will be used and only authorized users will have access to the survey data and participation data. The specifications of this DSA will be extended to all personnel who have access to the data. The NIH Center for Information Technology will administer the online surveys and will be responsible for ensuring the security of the data collected. The Contractor will follow the NIH Privacy Act Systems of Record Notice 09-25-0156. Reporting of Unauthorized Disclosures or Misuse of Covered Data and Information Each party shall, within one day of discovery, notify the other party regarding any unauthorized use or disclosure of CDI. The notification shall identify: (i) the nature of the unauthorized use or disclosure, (ii) the CDI used or disclosed, (iii) who made the unauthorized use or received the unauthorized disclosure,
Security of Electronic Information. Recipient shall develop, implement, maintain and use appropriate administrative, technical and physical security measures to preserve the confidentiality, integrity and availability of all transmitted and stored CDI received from, or on behalf of USC or its Constituents. Recipient shall impose these measures on all subcontractors or other third parties used by Recipient. Reporting Unauthorized Disclosures or Misuse of Covered Data and Information: Recipient shall, within one (1) day of discovery, report to Sender, the University Information Security Office (UISO), and Agency Privacy Liaison any use or disclosure of CDI not authorized by the Agreement or in writing. Recipient's report shall identify: (1) the nature of the unauthorized use or disclosure, (2) the CDI used or disclosed, (3) the identity of the individual(s) or entity that received the unauthorized disclosure, (4) the action(s) that Recipient has taken or shall take to mitigate any potentially negative effects of the unauthorized use or disclosure, and (5) the corrective action(s) Recipient has taken or shall take to prevent future similar unauthorized uses or disclosures. Recipient shall provide any additional information in connection with the unauthorized disclosure reasonably requested by Sender or UISO. Requirements for Documentation, Review and Data Definitions Once finalized, this Data Sharing Agreement must be registered with DoIT Analytics and Data Governance and scheduled for annual review, leading to renewal, alteration, or elimination. To initiate a request, the Requestor must submit a Service Desk ticket under the catalog item ‘Data Governance’ or by clicking this link. Data elements flowing from the Sender to the Requestor must be defined and classified with Data Analytics and Governance to fully support and document this agreement. The Requestor is likewise responsible for defining the universe of data elements contained in the receiving information system or data store with Data Analytics and Governance.
AutoNDA by SimpleDocs
Security of Electronic Information. Service Provider shall develop, implement, maintain and use appropriate administrative, technical and physical security measures to preserve the confidentiality, integrity and availability of all electronically maintained or transmitted CDI received from, or on behalf of Institution or its students. These measures will be extended by contract to all subcontractors used by Service Provider. Reporting of Unauthorized Disclosures or Misuse of Covered Data and Information: Service Provider, within one day of discovery, shall report to Institution any use or disclosure of CDI not authorized by this Addendum or in writing by Institution. Service Provider’s report shall identify: (i) the nature of the unauthorized use or disclosure, (ii) the CDI used or disclosed, (iii) who made the unauthorized use or received the unauthorized disclosure, (iv) what Service Provider has done or shall do to mitigate any deleterious effect of the unauthorized use or disclosure, and (v) what corrective action Service Provider has taken or shall take to prevent future similar unauthorized use or disclosure. Service Provider shall provide such other information, including a written report, as reasonably requested by Institution.
Security of Electronic Information. Service provider shall develop, implement, maintain and use appropriate administrative, technical and physical security measures to preserve the confidentiality, integrity and availability of all electronically maintained or transmitted CDI received from, or on behalf of UC or its students. These measures will be extended by contract to all subcontractors used by service provider.

Related to Security of Electronic Information

  • - CLEC INFORMATION CLEC agrees to work with Qwest in good faith to promptly complete or update, as applicable, Qwest’s “New Customer Questionnaire” to the extent that CLEC has not already done so, and CLEC shall hold Qwest harmless for any damages to or claims from CLEC caused by CLEC’s failure to promptly complete or update the questionnaire.

  • ELECTRONIC SUBMISSIONS Concessionaire must have the capacity to send and receive electronic submissions and communications as a pre-condition and continuing requirement of this Agreement. For purposes of this Agreement, “Electronic Submissions” shall only include the transmission of documents by email. Concessionaire shall comply with the following terms and conditions:

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • SECURITY OF PERSONAL INFORMATION 19.1 For this clause “personal information” has the meaning given to it in the Privacy Act 1988 (Cth).

  • Security of Confidential Information 36.1 In order to ensure that no unauthorised person gains access to any Confidential Information or any data obtained in the performance of the Contract, the Contractor undertakes to maintain security systems approved by the Authority. Any such approval shall not however thereby relieve the Contractor of any liability.

  • Electronic Protected Health Information “Electronic Protected Health Information” means individually identifiable health information that is transmitted by or maintained in electronic media.

  • Information Safeguards Business Associate will develop, document, implement, maintain and use appropriate administrative, technical and physical safeguards to preserve the integrity and confidentiality of and to prevent non-permitted use or disclosure of PHI created for or received from Recipient or its Subsidiaries. These safeguards must be appropriate to the size and complexity of Business Associate’s operations and the nature and scope of its activities. Business Associate agrees that these safeguards will meet any applicable requirements set forth by the U.S. Department of Health and Human Services, including (as of the effective date or as of the compliance date, whichever is applicable) any requirements set forth in the final HIPAA security regulations. Business Associate agrees to mitigate, to the extent practicable, any harmful effect that is known to Business Associate resulting from a use or disclosure of PHI by Business Associate in violation of the requirements of this Addendum.

  • Alert Information As Alerts delivered via SMS, email and push notifications are not encrypted, we will never include your passcode or full account number. You acknowledge and agree that Alerts may not be encrypted and may include your name and some information about your accounts, and anyone with access to your Alerts will be able to view the contents of these messages.

  • Confidentiality and Safeguarding of University Records; Press Releases; Public Information Under this Agreement, Contractor may (1) create, (2) receive from or on behalf of University, or (3) have access to, records or record systems (collectively, University Records). However, it is expressly agreed that University will not provide to Contractor, and Contractor will never seek to access, any University Records that contain personally identifiable information regarding any individual that is not available to any requestor under the Texas Public Information Act, Chapter 552, Texas Government Code, including “directory information” of any student who has opted to prohibit the release of their “directory information” as that term is defined under the Family Educational Rights and Privacy Act, 20 USC §1232g (FERPA) and its implementing regulations. [Option (Include if University is a HIPAA Covered Entity and University Records are subject to HIPAA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Health Insurance Portability and Accountability Act and 45 CFR Part 160 and subparts A and E of Part 164 (collectively HIPAA) are addressed in Section 12.26.] Contractor represents, warrants, and agrees that it will: (1) hold University Records in strict confidence and will not use or disclose University Records except as (a) permitted or required by this Agreement, (b) required by Applicable Laws, or (c) otherwise authorized by University in writing; (2) safeguard University Records according to reasonable administrative, physical and technical standards (such as standards established by the National Institute of Standards and Technology and the Center for Internet Security [Option (Include if Section 12.39 related to Payment Card Industry Data Security Standards is not include in this Agreement.):, as well as the Payment Card Industry Data Security Standards]) that are no less rigorous than the standards by which Contractor protects its own confidential information; (3) continually monitor its operations and take any action necessary to assure that University Records are safeguarded and the confidentiality of University Records is maintained in accordance with all Applicable Laws and the terms of this Agreement; and (4) comply with University Rules regarding access to and use of University’s computer systems, including UTS 165 at xxxx://xxx.xxxxxxxx.xxx/board-of-regents/policy-library/policies/uts165-information-resources-use-and-security-policy. At the request of University, Contractor agrees to provide University with a written summary of the procedures Contractor uses to safeguard and maintain the confidentiality of University Records.]

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!