Information Integrity and Security. Contractor shall immediately notify County of any known or suspected breach of personal, sensitive and confidential information related to Contractor’s work under this Agreement.
Information Integrity and Security. A. Information Assets SUBRECIPIENT shall have in place operational policies, procedures, and practices to protect State information assets including those assets used to store or access Personal Health Information (PHI), Personal Information (PI), and any information protected under the Health Insurance Portability and Accountability Act (HIPPA) (i.e., public, confidential, sensitive and/or personal information) as specified in the State Administrative Manual, Section 5300 to 5365.3; Cal. Gov. Code § 11019.9; DGS Management Memo 06-12; DOF Budget Letter 06-34; and CDA Program Memorandum 07-18 Protection of Information Assets. Information assets include (but are not limited to):
Information Integrity and Security. A. Information Assets The Contractor, and its Subcontractors/Vendors, shall have in place operational policies, procedures, and practices to protect State information assets, including those assets used to store or access Personal Health Information (PHI), Personal Information (PI) and any information protected under the Health Insurance Portability and Accountability Act (HIPAA), (i.e., public, confidential, sensitive and/or personal identifying information) herein referred to as Personal, Sensitive and Confidential Information (PSCI) as specified in the State Administrative Manual, 5300 to 5365.3; Cal. Gov. Code § 11019.9, DGS Management Memo 06-12; DOF Budget Letter 06-34; and CDA Program Memorandum 07-18 Protection of Information Assets and the Statewide Health Information Policy Manual. Information assets may be in hard copy or electronic format and may include but is not limited to:
Information Integrity and Security. A. Information Assets The Contractor, and its Subcontractors/Vendors, shall have in place operational policies, procedures, and practices to protect State information assets, including those assets used to store or access Personal Health Information (PHI), Personal Information (PI) and any information protected under the Health Insurance Portability and Accountability Act (HIPAA), (i.e., public, confidential, sensitive and/or personal identifying information) as specified in the State Administrative Manual, 5300 to 5365.3; Cal. Gov. Code § 11019.9, DGS Management Memo 06-12; DOF Budget Letter 06-34; and CDA Program Memorandum 07-18 Protection of Information Assets and the Statewide Health Information Policy Manual. Information assets may be in hard copy or electronic format and may include but is not limited to:
Information Integrity and Security. 1. Information Assets. Subrecipient shall have in place operational policies, procedures, and practices to protect State information assets including those assets used to store or access Personal Health Information (PHI), Personal Information (PI), and any information protected under the Health Insurance Portability and Accountability Act (HIPAA) (i.e., public, confidential, sensitive and/or personal information) herein referred to as Personal, Sensitive and Confidential Information (PSCI) as specified in the State Administrative Manual, Section 5300 to 5365.3; Cal. Gov. Code § 11019.9; DGS Management Memo 06-12; DOF Budget Letter 06-34; and CDA Program Memorandum 07-18 Protection of Information Assets and the Statewide Health Information Policy Manual.
Information Integrity and Security. A. Contractor ensures that personal, sensitive and confidential information is protected from inappropriate or unauthorized access or disclosure in accordance with Welfare and Institutions Code Section 10850, LCDSS MEDS Data Privacy and Security Agreement, Lake County Information Security Policy, Health Insurance Portability and Accountability Act (HIPAA), and all other applicable laws, regulations and policies.
Information Integrity and Security. (Continued)
Information Integrity and Security. A. Information Assets The Contractor shall have in place operational policies, procedures, and practices to protect State information assets, i.e., public, confidential, sensitive and/or personal information as specified in State Administrative Manual, Section 4841.2., GC Section 11019, Department of Finance (DOF) Management Memo 06-12, and DOF Budget Letter 06-34). Information assets include (but are not limited to):
Information Integrity and Security. 1. Information Assets. Subrecipient shall have in place operational policies, procedures, and practices to protect State information assets including those assets used to store or access Personal Health Information (PHI), Personal Information (PI), and any information protected under the Health Insurance Portability and Accountability Act (HIPAA) (i.e., public, confidential, sensitive and/or personal information) as specified in the State Administrative Manual, Section 5300 to 5365.3; Cal. Gov. Code § 11019.9; DGS Management Memo 06-12; DOF Budget Letter 06-34; and CDA Program Memorandum 07-18 Protection of Information Assets and the Statewide Health Information Policy Manual. Information assets may be in hard copy or electronic format and may include (but are not limited to):
Information Integrity and Security. A. Information Assets CONTRACTOR shall have in place operational policies, procedures, and practices to protect State information assets (i.e., public, confidential, sensitive and/or personal information) as specified in the State Administrative Manual, Section 5300 to 5365.3; Cal. Gov. Code § 11019.9; DGS Management Memo 06-12; DOF Budget Letter 06-34; and CDA Program Memorandum 07-18 Protection of Information Assets. Information assets include (but are not limited to):