Examples of Information Privacy and Security Requirements in a sentence
This Information Privacy and Security Requirements Exhibit (For Non-HIPAA/HITECH Act 10 Contracts) (hereinafter referred to as "this Exhibit") sets forth the information privacy and security 11 requirements CONTRACTOR is obligated to follow with respect to all personal and confidential 12 information (as defined herein) disclosed to CONTRACTOR, or collected, created, maintained, stored, 13 transmitted or used by CONTRACTOR for or on behalf of COUNTY, pursuant to CONTRACTOR's 14 agreement with COUNTY.
This Information Privacy and Security Requirements Exhibit (For Non-HIPAA/HITECH Act 11 Contracts) (hereinafter referred to as "this Exhibit") sets forth the information privacy and security 12 requirements CONTRACTOR is obligated to follow with respect to all personal and confidential 13 information (as defined herein) disclosed to CONTRACTOR, or collected, created, maintained, stored, 14 transmitted or used by CONTRACTOR for or on behalf of COUNTY, pursuant to CONTRACTOR's 15 agreement with COUNTY.
This Information Privacy and Security Requirements Exhibit (For Non-HIPAA/HITECH Act 13 Contracts) (hereinafter referred to as "this Exhibit") sets forth the information privacy and security 14 requirements CONTRACTOR is obligated to follow with respect to all personal and confidential 15 information (as defined herein) disclosed to CONTRACTOR, or collected, created, maintained, stored, 16 transmitted or used by CONTRACTOR for or on behalf of COUNTY, pursuant to CONTRACTOR's 17 agreement with COUNTY.
Information Privacy and Security Requirements ............................................................
Blue Shield must adhere to the terms and conditions in the Information Privacy and Security Requirements which are incorporated as Exhibit E to this Agreement.
California Department of Public Health Information Privacy and Security Requirements (see Bidders’ Library).
He noted that although he was not opposed to the project, he was concerned that the buildings would be constructed within 10 feet of the property line.
Except as set forth in Section 5.13(a) of the Buyer Disclosure Schedule, Sangoma and its Subsidiaries have, *****, maintained compliance in all material respects with Information Privacy and Security Requirements.
The Acquired Companies maintain a written information security plan that has been made available to Buyer and that describes the Acquired Companies’ program to comply with the Information Privacy and Security Requirements, and includes industry standard security controls, disaster recovery and business continuity plans, procedures and facilities.
Neither the execution, delivery, nor performance of this Agreement, nor any subsequent transfer of any Company Data in connection with this Agreement, will cause, constitute, or result in a breach or violation of, or cause the Company Members or Buyer to violate, any applicable Information Privacy and Security Requirements.