Security Violations and Accounts Updates Sample Clauses

Security Violations and Accounts Updates. Grantee will adhere to the Confidentiality Article requirements and HHS Data Usage Agreement of this contract and immediately contact System Agency if a security violation is detected, or if Grantee has any reason to suspect that the security or integrity of the CMBHS data has been or may be compromised in any way.
AutoNDA by SimpleDocs
Security Violations and Accounts Updates. Contractor shall adhere to the Confidentiality Article requirements and HHS Data Usage Agreement of this contract and immediately contact DSHS if a security violation is detected, or if Contractor has any reason to suspect that the security or integrity of the CMBHS data has been or may be compromised in any way.
Security Violations and Accounts Updates. Performing Agency will adhere to the Confidentiality Article requirements and HHS Data Usage Agreement of this contract and immediately contact System Agency if a security violation is detected, or if Performing Agency has any reason to suspect that the security or integrity of the CMBHS data has been or may be compromised in any way.
Security Violations and Accounts Updates. Contractor shall notify the contract manager assigned to the Program Attachment immediately if a security violation is detected, or if Contractor has any reason to suspect that the security or integrity of the CMBHS data has been or may be compromised in any way. Contractor shall immediately block access to CMBHS of any person who should no longer have access to CMBHS, due to severance of employment with Contractor or otherwise, or immediately modify access when there is a change in a user’s job responsibilities that affects the user’s need for access to CMBHS, and update records on a daily basis to reflect any changes in account status.
Security Violations and Accounts Updates. 9 Section 23.05 Electronic Transfer of Information. 9 Section 23.06 Access. 10 Section 23.07 Components. 10 Section 23.08 Drug Courts. 13

Related to Security Violations and Accounts Updates

  • Records and Accounts The Trustee shall maintain accurate and detailed records and accounts of all transactions of the Trust, which shall be available at all reasonable times for inspection by any legally entitled person or entity to the extent required by applicable law, or any other person determined by the Committee.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

Time is Money Join Law Insider Premium to draft better contracts faster.