Examples of Information Security Agreement in a sentence
Information Security Agreement shall describe Institution security requirements for the SPONSOR supplied computers.
This Information Security Agreement (“Agreement”) is designed to protect the Department’s Confidential Information (defined above in Section 22.0) and Department Information Resources (defined below).
The purpose of this Metropolitan Government’s (Metro) Information Security Agreement Questionnaire is to identify contractual requirements between Metro and an entity who desires to do one or more of the following: • Provide software or hardware to Metro; • Connect to the Metro network; • Provide services over a network (i.e., cloud-bases services, etc.); or • Access or store Metropolitan Government department or agency data.
Each provider must complete and sign a Confidentiality and Information Security Agreement.
Residents are required to read and sign the UW Medicine Privacy, Confidentiality, and Information Security Agreement (PCISA) at initial appointment, at reappointment each year, and prior to using their UW Medicine Accounts.
Access the following link for the DJJ Acceptable Use & Information Security Agreement.
This Information Security Agreement (ISA) outlines the Service Provider requirements for the collection, maintenance, and dissemination of any information that identifies or describes an individual in conjunction with the performance of services provided to CCHCS under any contract, purchase document, Memorandum of Understanding, or any other transaction involving information receipt or information exchange between CCHCS and the Service Provider.
I understand that the privileges of myself or any individual granted access to the EMR may be granted, suspended or revoked in the sole discretion of Trinity Health Of New England, which may include any suspension or revocation as a result of failure to comply with Trinity Health Of New England policies and procedures applicable to access and/or the terms of the Confidentiality and Information Security Agreement.
Each staff member requesting access must complete and sign a Confidentiality and Information Security Agreement.
External connections must be documented and approved with both parties’ signatures in an Information Security Agreement (ISA), which outlines controls in place to protect the confidentiality, integrity, and availability of information being shared or processed.