Technical Safeguards. 1. USAC and DSS will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data, so unauthorized persons cannot retrieve any data by computer, remote terminal, or other means.
2. USAC and DSS will strictly limit authorization to these electronic data areas necessary for the authorized user to perform their official duties. All data in transit will be encrypted using algorithms that meet the requirements of the Federal Information Processing Standard (FIPS) Publication 140-2 or 140-3 (when applicable).
3. Authorized system users will be identified by User ID and password, and individually tracked to safeguard against the unauthorized access and use of the system. System logs of all user actions will be saved, tracked and monitored periodically.
4. USAC will transmit data to DSS via encrypted secure file delivery system. For each request, a response will be sent back to USAC to indicate success or failure of transmission.
Technical Safeguards. SSA and OPM will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel in a manner that will protect the confidentiality of the data, so that unauthorized persons cannot retrieve any data by computer, remote terminal, or other means. Systems personnel must enter personal identification numbers when accessing data on the agencies’ systems. SSA and OPM will strictly limit authorization to those electronic data areas necessary for the authorized analyst to perform his or her official duties.
Technical Safeguards. “Technical Safeguards” shall mean the Standards for the Protection of Electronic Protected Health Information at 45 CFR §164.312.
Technical Safeguards. Custodian has implemented, and agrees to maintain, commercially reasonable technical safeguards that include, but are not limited to, (i) logical separation of Confidential Information on information systems, (ii) access controls to maintain appropriate segregation of duties and limit access to information resources on a need-to-know and least privileged basis, (iii) complex passwords at least seven characters in length, changed on a regular basis, and stored and transmitted in a secure manner, (iv) device and software management controls to guard against viruses and other malicious or unauthorized software, (v) information system and software patching consistent with manufacturer recommendations, (vi) intrusion detection and prevention systems to guard against unauthorized information system access, (vii) encryption of Confidential Information transmitted across unsecure or public networks including enforcement of Transport Layer Security1 for e-mail exchanged between Custodian and the Funds, (viii) encryption of Confidential Information stored on mobile media, and mobile electronic devices, and (ix) audit logging that records user and system activities.
Technical Safeguards. SSA and OCSE will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel in a manner that will protect the confidentiality of the data, so that unauthorized persons cannot retrieve any data by computer, remote terminal, or other means. Systems personnel must enter personal identification numbers when accessing data on the agencies’ systems. SSA and OCSE will strictly limit authorization to those electronic data areas necessary for the authorized analyst to perform his or her official duties.
Technical Safeguards. 1. USAC and MDHS will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data, so unauthorized persons cannot retrieve any data by computer, remote terminal, or other means.
2. USAC and MDHS will strictly limit authorization to these electronic data areas necessary for the authorized user to perform their official duties. All data in transit will be encrypted using algorithms that meet the requirements of the Federal Information Processing Standard (FIPS) Publication 140-3.
3. Authorized system users will be identified by User ID and password, and individually tracked to safeguard against the unauthorized access and use of the system. System logs of all user actions will be saved, tracked and monitored periodically.
4. USAC will transmit data to MDHS via encrypted secure file delivery system. For each request, a response will be sent back to USAC to indicate success or failure of transmission.
Technical Safeguards. On or before the Compliance Date, Business Associate shall have (i) implemented technical policies and procedures for electronic information systems that maintain Covered Entity’s Electronic Protected Health Information to allow access only to those persons or software programs that have been granted access rights as specified at 45 C.F.R. § 164.308(a)(4) in accordance with the implementation specifications set forth at 45 C.F.R. § 164.312(a)(2); (ii) implemented hardware, software, or procedural mechanisms that record and examine activity in any information systems that contains or uses Covered Entity’s Electronic Protected Health Information ;
Technical Safeguards. 1. USAC and DCF will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data, so unauthorized persons cannot retrieve any data by computer, remote terminal, or other means.
2. Systems personnel will have to enter personal identification numbers when accessing data on the agencies’ systems. USAC and DCF will strictly limit authorization to these electronic data areas necessary for the authorized user to perform their official duties. All data in transit will be encrypted using algorithms that meet the requirements of the Federal Information Processing Standard (FIPS) Publication 140-2.
3. Authorized system users will be identified by User ID and password, and individually tracked to safeguard against the unauthorized access and use of the system. System logs of all user actions will be saved, tracked and monitored periodically.
4. USAC will transmit data to DCF via encrypted secure file delivery system. For each request, a response will be sent back to USAC to indicate success or failure of transmission.
Technical Safeguards. 1. USAC and the VA will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data, so unauthorized persons cannot retrieve any data by computer, remote terminal, or other means.
2. USAC and the VA will strictly limit authorization to these electronic data areas necessary for the authorized user to perform their official duties. All data in transit will be encrypted using algorithms that meet the requirements of the Federal Information Processing Standard (FIPS) Publication 140-2 or 140-3 (when applicable).
3. Authorized system users will be identified by User ID and password, and individually tracked to safeguard against the unauthorized access and use of the system. System logs of all user actions will be saved, tracked and monitored periodically.
4. USAC will transmit data to the VA via secure API call. For each request, a response will be sent back to USAC to indicate success or failure of transmission.
Technical Safeguards. CMS and VHA will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data in such a way that unauthorized persons cannot retrieve any such data by means of computer, remote terminal, or other means. Systems personnel must enter personal identification numbers when accessing data on a Party's systems. VHA and CMS will strictly limitauthorization to those electronic data areas necessary for the authorized analyst to perform his or her official duties.