Commonwealth Security Information definition

Commonwealth Security Information means all data that pertains to the security of the Commonwealth’s information technology, specifically, information pertaining to the manner in which the Commonwealth protects its information technology systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users, or the provision of service to unauthorized users, including those measures necessary to detect, document and counter such threats.
Commonwealth Security Information means all data that pertains to the security of the Commonwealth’s information technology, specifically, information pertaining to the manner in which the Commonwealth protects its information technology systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users, or the provision of service to authorized users, including those measures necessary to detect, document and counter such threats.

Examples of Commonwealth Security Information in a sentence

  • This provision shall apply to all PI and Commonwealth Security Information in the possession of the Provider’s subcontractors and agents, and the Provider shall ensure that all such information in the possession of its subcontractors and agents has been returned or destroyed and that no subcontractor or agent retains any copies of such information in any form, in accord with EOHHS’ instructions.

  • In no event shall the Provider destroy any PI or Commonwealth Security Information without first obtaining EOHHS’ approval.

  • Except as provided in Subsection 4.2.B immediately below, upon termination or expiration of the Contract for any reason whatsoever, the Provider shall, at EOHHS’ direction, either return or destroy all PI and Commonwealth Security Information, and the Provider shall not retain any copies of such PI or Commonwealth Security Information in any form.

  • In the event destruction is permitted, the Provider shall destroy PI and Commonwealth Security Information in accord with standards set forth in NIST Special Publication 800-88, Guidelines for Media Sanitization, all Applicable Laws and applicable retention laws and regulations and all data security policies including policies issued by EOHHS and MassIT.

  • Notwithstanding any other provision in the Contract (including in this Appendix) regarding termination, the Provider may not retain any Commonwealth Security Information upon termination of the Contract unless such information is expressly identified in any retention permission granted in accord with Section 2.4 of Appendix A.

  • If the Provider obtains access to any Commonwealth Security Information, the Provider may only use such information for the purposes for which it obtained access.

  • Notwithstanding any other provision in the Contract (including this Appendix), the Provider shall report any non-permitted use or disclosure of Commonwealth Security Information to EOHHS within twenty-four (24) hours following the date upon which the Provider becomes aware of the use or disclosure.

Related to Commonwealth Security Information

  • Security Information means account numbers and/or Username as applicable, passwords and other information required to identify you for the purposes of you trading with us under this Agreement.

  • Company Information As defined in Section 4(a)(i).

  • Third Party Information means confidential or proprietary information subject to a duty on the Company’s and its affiliates’ part to maintain the confidentiality of such information and to use it only for certain limited purposes.

  • Student Personal Information means information collected through a school service that personally identifies an individual student or other information collected and maintained about an individual student that is linked to information that identifies an individual student, as identified by Washington Compact Provision 28A.604.010. For purposes of this DPA, Student Personal Information is referred to as Student Data.

  • Confidential commercial information means records provided to the govern- ment by a submitter that arguably contain material exempt from release under Exemption 4 of the Freedom of Information Act, 5 U.S.C. 552(b)(4), be- cause disclosure could reasonably be expected to cause substantial competi- tive harm.

  • Commercial Information means information regarding the purchase and sale of goods and services, including, but not limited to, information regarding marketing strategy, production data, assessments of goods and services, mineral exploration records, and compilations of data regarding commercial activity.

  • Employee Liability Information means the information which a transferor is obliged to notify to a transferee pursuant to Regulation 11(2) of TUPE regarding any person employed by him who is assigned to the organised grouping of resources or employees which is the subject of a relevant transfer and also such employees as fall within Regulation 11(4) of TUPE;

  • Personal Information means information identifiable to any person, including, but not limited to, information that relates to a person’s name, health, finances, education, business, use or receipt of governmental services or other activities, addresses, telephone numbers, Social Security Numbers, driver license numbers, other identifying numbers, and any financial identifiers.

  • Confidential personal information means a party’s or a party’s child’s Social Security number; date of birth; driver license number; any other names used, now or in the past; and employer’s name, address, and telephone number.

  • Confidential System Information means any communication or record (whether oral, written, electronically stored or transmitted, or in any other form) provided to or made available to Grantee; or that Grantee may create, receive, maintain, use, disclose or have access to on behalf of HHSC or through performance of the Project, which is not designated as Confidential Information in a Data Use Agreement.

  • Biometric information means any information, regardless of how it is captured, converted, stored, or shared, based on an individual’s biometric identifier used to identify an individual. Biometric information does not include information derived from items or procedures excluded under the definition of biometric identifiers.

  • Information Security Incident means (i) any actual or suspected incident involving Seller Information System that may involve Buyer’s Sensitive Information, or (ii) any actual or suspected unauthorized access to, use, or disclosure of Buyer’s Sensitive Information.

  • State Confidential Information means any and all State Records not subject to disclosure under CORA. State Confidential Information shall include, but is not limited to, PII, PHI, PCI, Tax Information, CJI, and State personnel records not subject to disclosure under CORA. State Confidential Information shall not include information or data concerning individuals that is not deemed confidential but nevertheless belongs to the State, which has been communicated, furnished, or disclosed by the State to Contractor which (i) is subject to disclosure pursuant to CORA; (ii) is already known to Contractor without restrictions at the time of its disclosure to Contractor; (iii) is or subsequently becomes publicly available without breach of any obligation owed by Contractor to the State; (iv) is disclosed to Contractor, without confidentiality obligations, by a third party who has the right to disclose such information; or (v) was independently developed without reliance on any State Confidential Information.

  • Personal Information Breach means an instance where an unauthorized person or entity accesses Personal Information in any manner, including but not limited to the following occurrences: (1) any Personal Information that is not encrypted or protected is misplaced, lost, stolen or in any way compromised; (2) one or more third parties have had access to or taken control or possession of any Personal Information that is not encrypted or protected without prior written authorization from the State; (3) the unauthorized acquisition of encrypted or protected Personal Information together with the confidential process or key that is capable of compromising the integrity of the Personal Information; or (4) if there is a substantial risk of identity theft or fraud to the client, the Contractor, the Department or State.