Security Procedures and Practices. The Company agrees that at it will implement and maintain security procedures and practices that, at a minimum, are designed to protect Covered Information from unauthorized access, destruction, use, modification, or disclosure that based on the sensitivity of the data and the risk from unauthorized access in accordance with industry standards.
Appears in 1 contract
Samples: sdpc.a4l.org
Security Procedures and Practices. The Company agrees that at it will implement and maintain security procedures and practices that, at a minimum, are designed to protect Covered Information covered information from unauthorized access, destruction, use, modification, or disclosure that based on the sensitivity of the data and the risk from unauthorized access access: (i) use technologies and methodologies that are consistent with Cybersecurity Version 1.1. and any updates to it; or (ii) maintain technical safeguards as they relate to the possession of covered information in accordance a manner consistent with industry standardsthe provisions of 45 C.F.R. 164.312.
Appears in 1 contract
Samples: sdpc.a4l.org
Security Procedures and Practices. The Company agrees that at it will implement and maintain security procedures and practices that, at a minimum, are designed to protect Covered Information covered information from unauthorized access, destruction, use, modification, or disclosure that based on the sensitivity of the data and the risk from unauthorized access in accordance access: (i) use technologies and methodologies that are consistent with industry standards.the U.S. Department of Commerce’s National Institute of Standards and Technology’s Framework for Improving Critical Infrastructure Cybersecurity Version
Appears in 1 contract
Samples: sdpc.a4l.org
Security Procedures and Practices. The Company agrees that at it will implement and maintain security procedures and practices that, at a minimum, are designed to protect Covered Information covered information from unauthorized access, destruction, use, modification, or disclosure that based on the sensitivity of the data and the risk from unauthorized access in accordance access: (i) use technologies and methodologies that are consistent with industry standards; or (ii) maintain technical safeguards as they relate to the possession of covered information in a manner consistent with the provisions of 45 C.F.R. 164.312.
Appears in 1 contract
Samples: sdpc.a4l.org
Security Procedures and Practices. The Company agrees that at it will implement and maintain security procedures and practices that, at a minimum, are designed to protect Covered Information covered information from unauthorized access, destruction, use, modification, or disclosure that based on the sensitivity of the data and the risk from unauthorized access in accordance access: (i) use technologies and methodologies that are consistent with industry standardsstandards and any updates to it; or (ii) maintain technical safeguards as they relate to the possession of covered information in a manner consistent with the provisions of 45 C.F.R. 164.312.
Appears in 1 contract
Samples: sdpc.a4l.org
Security Procedures and Practices. The Company agrees that at it will implement and maintain security procedures and practices that, at a minimum, are designed to protect Covered Information covered information from unauthorized access, destruction, use, modification, or disclosure that based on the sensitivity of the data and the risk from unauthorized access access: (i) use technologies and methodologies that are consistent with ISO 27001; or (ii) maintain technical safeguards as they relate to the possession of covered information in accordance a manner consistent with industry standardsthe provisions of 45 C.F.R. 164.312.
Appears in 1 contract
Samples: Community Unit
Security Procedures and Practices. The Company agrees that at it will implement and maintain security procedures and practices that, at a minimum, are designed to protect Covered Information covered information from unauthorized access, destruction, use, modification, or disclosure that based on the sensitivity of the data and the risk from unauthorized access access: (i) use technologies and methodologies that are consistent Infrastructure Cybersecurity Version 1.1. and any updates to it; or (ii) maintain technical safeguards as they relate to the possession of covered information in accordance a manner consistent with industry standardsthe provisions of 45 C.F.R. 164.312.
Appears in 1 contract
Samples: sdpc.a4l.org