State Data Access Sample Clauses

State Data Access. The Contractor should ensure that all State Data will at all times reside in, and be maintained in, the continental U.S. The Contractor shall require that neither the Contractor nor any subcontractor will access State Data from outside of the continental U.S., nor will they send any copies of State Data outside the continental U.S. without the prior written consent of the Department. The requirements of this section do not pertain to State Data that is “Open data,” as defined in section 282.0041, F.S.
AutoNDA by SimpleDocs
State Data Access. The Contractor shall retain a list of all persons with access to State Data, including a statement confirming that each person has passed the background screening required herein. This statement shall not include the substance of the screening results, only that the person has passed the screening. The Contractor shall document and record, with respect to each instance of access to State Data: A. The identity of all individual(s) who accessed State Data in any way, whether those individuals are authorized persons or not; B. The duration of the individual(s)’ access to State Data, including the time and date at which the access began and ended; C. The identity, form, and extent of State Data accessed, including, but not limited to, whether the individual accessed partial or redacted versions of State Data, read- only versions of State Data, or editable versions of State Data; and D. The nature of the access to State Data, including whether State Data was edited or shared with any other individual or entity during the duration of the access, and, if so, the identity of the individual or entity. Unless otherwise agreed in writing, the Contractor and subcontractors will not perform any of the services from outside of the continental United States. The Contractor should ensure that all State Data will at all times reside in, and be maintained in, the continental United States unless otherwise agreed to in writing. The Contractor will not allow, through its action or inaction, any State Data to be sent by any medium, transmitted, or accessed from outside of the continental United States without prior written consent of the Department or the Customer, where applicable. The Contractor shall require that neither the Contractor nor any subcontractor will access State Data from outside of the continental U.S., nor will they send any copies of State Data outside the continental U.S. without the prior written consent of the Department. The Contractor shall create a written policy for the protection of State Data, including a policy and procedure for access to State Data. The Contractor is responsible for ensuring its services comply with its written policy and that the written policy continuously adheres to the requirements set forth in this section throughout the Contract term. The Contractor shall retain the written policy and information required in this section for the duration of this Contract and a period of no less than (5) five years from the date of terminatio...
State Data Access. The Contractor shall retain a list of all Persons, as defined in Attachment EDefinitions and Acronyms, with Access to State Data, including a statement confirming that each Person has passed the background screening required herein. This statement shall not include the substance of the screening results, only that the Person has passed the screening. The Contractor shall create a written policy for the protection of State Data, including a policy and procedure for Access to State Data. The Contractor shall retain the policy and information required in this subsection in accordance with Section 8.3, Document Management and Record Retention. The documents are subject to disclosure within thirty-six hours upon written or oral demand by the Department or its designated agents or auditors and are subject to audit and screening. The Contractor shall document and record, with respect to each instance of Access to State Data: 1. The identity of all individual(s) who Accessed State Data in any way, whether those individuals are authorized Persons or not; 2. The duration of the individual(s)’ Access, including the time and date at which the Access began and ended; 3. The identity, form, and extent of State Data Accessed, including, but not limited to, whether the individual Accessed partial or redacted versions of State Data, read-only versions of State Data, or editable versions of State Data; and 4. The nature of the Access, including whether the State Data was edited or shared with any other individual or entity during the duration of the Access, and, if so, the identity of the individual or entity. The damages that would result from the Contractor’s failure to compile, retain, and disclose the written policy and information required in this subsection are by their nature impossible to ascertain presently and will be difficult to ascertain in the future. The issues involved in determining such damages will be numerous, complex, and unreasonably burdensome to prove. The Contractor therefore agrees to credit the Department the sum of $10,000 for each breach of this subsection. The parties acknowledge that these credits are liquidated damages, exclusive of any other right to damages, not intended to be a penalty, and solely intended to compensate for unknown and unascertainable damages.

Related to State Data Access

  • Data Access Access to Contract and State Data The Contractor shall provide to the Client Agency access to any data, as defined in Conn. Gen Stat. Sec. 4e-1, concerning the Contract and the Client Agency that are in the possession or control of the Contractor upon demand and shall provide the data to the Client Agency in a format prescribed by the Client Agency and the State Auditors of Public Accounts at no additional cost.

  • Data Access Services State Street agrees to make available to the Fund the Data Access Services subject to the terms and conditions of this Addendum and such data access operating standards and procedures as may be issued by State Street from time to time. The Fund shall be able to access the System to (i) originate electronic instructions to State Street in order to (a) effect the transfer or movement of cash or securities held under custody by State Street or (b) transmit accounting or other information (the transactions described in (i)(a) and (i)(b) above are referred to herein as “Client Originated Electronic Financial Instructions”), and (ii) access data for the purpose of reporting and analysis, which shall all be deemed to be Data Access Services for purposes of this Addendum.

  • System and Data Access Services a. System. Subject to the terms and conditions of this Addendum and solely for the purpose of providing access to Fund Data as set forth herein, State Street hereby agrees to provide the Fund, or certain third parties approved by State Street that serve as the Fund`s investment advisors, investment managers or fund accountants (the "Fund Accountants") or as the Fund`s independent auditors (the "Auditor"), with access to State Street`s Multicurrency HORIZONR Accounting System and the other information systems described in Attachment A (collectively, the "System") on a remote basis solely on the computer hardware, system software and telecommunication links described in Attachment B (the "Designated Configuration") or on any designated substitute or back-up equipment configuration consented to in writing by State Street, such consent not to be unreasonably withheld.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage.

  • Network Access TENANT may find it necessary to purchase a network interface card, wireless PC card or other hardware in order to connect to the internet service. LANDLORD is not responsible for the purchase of these items and LANDLORD cannot guarantee compatibility with any device TENANT may have. The computer and network card must have software installed that supports the Internet Protocol commonly referred to as TCP/IP. Any conflicts between the software compatibility of the network and the TENANT’S computer operating system or any other feature will be the responsibility of the TENANT to resolve. LANDLORD will not be responsible for software issues related to the user’s personal computer.

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Internet Access Hotels and Airports Employees who travel may need to access their e-mail at night. Many hotels provide free high speed internet access and Tyler employees are encouraged to use such hotels whenever possible. If an employee’s hotel charges for internet access it is reimbursable up to $10.00 per day. Charges for internet access at airports are not reimbursable.

  • System Access CUSTOMER agrees to provide to PROVIDER, at CUSTOMER’S expense, necessary access to the mainframe computer and related information technology systems (the “System”) on which CUSTOMER data is processed during the times (the “Service Hours”) specified in the PSAs, subject to reasonable downtime for utility outages, maintenance, performance difficulties and the like. In the event of a change in the Service Hours, CUSTOMER will provide PROVIDER with at least fifteen (15) calendar days written notice of such change.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!