Technical Safeguards. 1. USAC and the Department will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data, so unauthorized persons cannot retrieve any data by computer, remote terminal, or other means.
Technical Safeguards. BNY Mellon has implemented, and agrees to maintain, commercially reasonable technical safeguards that include, but are not limited to, (i) logical separation of Confidential Information on information systems, (ii) access controls to maintain appropriate segregation of duties and limit access to information resources on a need-to-know and least privileged basis, (iii) complex passwords at least seven characters in length, changed on a regular basis, and stored and transmitted in a secure manner, (iv) device and software management controls to guard against viruses and other malicious or unauthorized software, (v) information system and software patching consistent with manufacturer recommendations, (vi) intrusion detection and prevention systems to guard against unauthorized information system access, (vii) encryption of Confidential Information transmitted across unsecure or public networks including enforcement of Transport Layer Security1 for e-mail exchanged between BNY Mellon and the Funds, (viii) encryption of Confidential Information stored on mobile media and mobile electronic devices and (ix) audit logging that records user and system activities.
Technical Safeguards. SSA and OPM will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel in a manner that will protect the confidentiality of the data, so that unauthorized persons cannot retrieve any data by computer, remote terminal, or other means. Systems personnel must enter personal identification numbers when accessing data on the agencies’ systems. SSA and OPM will strictly limit authorization to those electronic data areas necessary for the authorized analyst to perform his or her official duties.
Technical Safeguards. “Technical Safeguards” shall mean the Standards for the Protection of Electronic Protected Health Information at 45 CFR §164.312.
Technical Safeguards. 1. USAC and DSS will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data, so unauthorized persons cannot retrieve any data by computer, remote terminal, or other means.
Technical Safeguards. SSA and ED will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel in a manner that will protect the confidentiality of the data, so that unauthorized persons cannot retrieve any data by computer, remote terminal, or other means. Systems personnel must enter personal identification numbers when accessing data on the agencies’ systems. SSA and ED will strictly limit authorization to those electronic data areas necessary for the authorized analyst to perform his or her official duties.
Technical Safeguards. 1. USAC and DHHS will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data, so unauthorized persons cannot retrieve any data by computer, remote terminal, or other means.
Technical Safeguards. SSA and OCSE will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel in a manner that will protect the confidentiality of the data, so that unauthorized persons cannot retrieve any data by computer, remote terminal, or other means. Systems personnel must enter personal identification numbers when accessing data on the agencies’ systems. SSA and OCSE will strictly limit authorization to those electronic data areas necessary for the authorized analyst to perform his or her official duties.
Technical Safeguards. On or before the Compliance Date, Business Associate shall have (i) implemented technical policies and procedures for electronic information systems that maintain Covered Entity’s Electronic Protected Health Information to allow access only to those persons or software programs that have been granted access rights as specified at 45 C.F.R. § 164.308(a)(4) in accordance with the implementation specifications set forth at 45 C.F.R. § 164.312(a)(2); (ii) implemented hardware, software, or procedural mechanisms that record and examine activity in any information systems that contains or uses Covered Entity’s Electronic Protected Health Information ;
Technical Safeguards. CMS and VHA will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data in such a way that unauthorized persons cannot retrieve any such data by means of computer, remote terminal, or other means. Systems personnel must enter personal identification numbers when accessing data on a Party's systems. VHA and CMS will strictly limitauthorization to those electronic data areas necessary for the authorized analyst to perform his or her official duties.