Security of State Information Sample Clauses

Security of State Information. The Contractor represents and warrants that it has implemented and it shall maintain during the term of this Contract the highest industry standard administrative, technical, and physical safeguards and controls consistent with NIST Special Publication 800-53 (version 3 or higher) and Federal Information Processing Standards Publication 200 and designed to (i) ensure the security and confidentiality of State Data; (ii) protect against any anticipated security threats or hazards to the security or integrity of the State Data; and (iii) protect against unauthorized access to or use of State Data. Such measures shall include at a minimum: (1) access controls on information systems, including controls to authenticate and permit access to State Data only to authorized individuals and controls to prevent the Contractor employees from providing State Data to unauthorized individuals who may seek to obtain this information (whether through fraudulent means or otherwise); (2) industry-standard firewall protection; (3) encryption of electronic State Data while in transit from the Contractor networks to external networks; (4) measures to store in a secure fashion all State Data which shall include multiple levels of authentication; (5) dual control procedures, segregation of duties, and pre-employment criminal background checks for employees with responsibilities for or access to State Data; (6) measures to ensure that the State Data shall not be altered or corrupted without the prior written consent of the State; (7) measures to protect against destruction, loss or damage of State Data due to potential environmental hazards, such as fire and water damage; (8) staff training to implement the information security measures; and (9) monitoring of the security of any portions of the Contractor systems that are used in the provision of the services against intrusion on a twenty-four (24) hour a day basis.
AutoNDA by SimpleDocs
Security of State Information. To the extent Contractor shall have access to, processes, handles, collects, transmits, stores or otherwise deals with State Data, the Contractor represents and warrants that it has implemented and it shall maintain during the term of this Master Agreement the highest industry standard administrative, technical, and physical safeguards and controls consistent with NIST Special Publication 800-53 (version 4 or higher) and Federal Information Processing
Security of State Information. To the extent Contractor shall have access to, processes, handles, collects, transmits, stores or otherwise deals with State Data, the
Security of State Information. For purposes of the Services performed hereunder, the Contractor shall follow the existing State control framework including industry standard administrative, technical, and physical safeguards and controls consistent with current version of CMS MARS-E (version 2.2), current version of IRS 1075 (Nov. 2021) and Federal Information Processing Standards Publication 200 and designed to (i) ensure the security and confidentiality of State Data; (ii) protect against any anticipated security threats or hazards to the security or integrity of the State Data; and (iii) protect against unauthorized access to or use of State Data. The Contractor will utilize State technical, operational and management measures to include at a minimum: (1) multiple levels of authentication controls to permit access to State Data only to authorized individuals and controls to prevent the Contractor employees from providing State Data to unauthorized individuals who may seek to obtain this information (whether through fraudulent means or otherwise); (2) industry-standard firewall protection; (3) access State information systems through a secure encrypted network connection to State networks where provided by the State ; (4) measures to store in a secure fashion all State Data which shall include multiple levels of authentication; (5) dual control procedures, segregation of duties, and pre-employment criminal background checks for employees with responsibilities for or access to State Data; (6) measures to ensure that the State Data shall not be altered or corrupted without the prior written consent of the State; (7) measures to protect against destruction, loss or damage of State Data due to potential environmental hazards, such as fire and water damage;
Security of State Information. The Contractor represents and warrants that it has implemented and it shall maintain during the term of this Contract commercially reasonable standard (suitable for a company of its size and industry) administrative, technical, and physical safeguards and designed to (i) ensure the security and confidentiality of State Data; (ii) protect against any anticipated security threats or hazards to the security or integrity of the State Data; and (iii) protect against unauthorized access to or use of State Data. Such measures shall include at a minimum: (1) access controls on information systems, including controls to authenticate and permit access to State Data only to authorized individuals and controls to prevent the Contractor employees from providing State Data to unauthorized individuals who may seek to obtain this information (whether through fraudulent means or otherwise); (2) industry-standard firewall protection; (3) encryption of electronic State Data while in transit from the Contractor networks to external networks; (4) measures to store in a secure fashion all State Data which may include multiple levels of authentication; (5) dual control procedures, segregation of duties, and pre-employment criminal background checks for employees with responsibilities for or access to State Data; (6) measures to ensure that the State Data shall not be altered or corrupted without the prior written consent of the State; (7) measures to protect against destruction, loss or damage of State Data due to potential environmental hazards, such as fire and water damage; (8) staff training to implement the information security measures; and (9) monitoring of the security of any portions of the Contractor systems that are used in the provision of the services against intrusion on, if available, a twenty-four (24) hour a day basis. Contractor’s obligations regarding the security and safeguarding of State Data, both in this section and elsewhere in this Agreement, shall apply only to State Data that is stored on, transmitted to or from, or processed by means or assets that are owned or controlled by Contractor. RICOH DOES NOT GUARANTY AND DISCLAIMS ANY WARRANTY THAT THE SERVICES OR PRODUCTS SUPPLIED UNDER THIS AGREEMENT ARE SUITABLE TO MEET THE STATE’S DATA SECURITY OBJECTIVES OR REGULATORY REQUIREMENTS. "The Contractor represents and warrants that it has implemented and it shall maintain during the term of this Contract commercially reasonable standard (suitable for a compan...
Security of State Information. The Contractor represents and warrants that it has implemented and it shall maintain during the term of this Contract the highest industry standard administrative, technical, and physical safeguards and controls and designed to (i) ensure the security and confidentiality of State Data; (ii) protect against any anticipated security threats or hazards to the security or integrity of the State Data; and (iii) protect against unauthorized access to or use of State Data. Such measures shall include at a minimum: (1) access controls on information systems, including controls to authenticate and permit access to State Data only to authorized individuals and controls to prevent the Contractor employees from providing State Data to unauthorized individuals who may seek to obtain this information (whether through fraudulent means or otherwise); (2) industry-standard firewall protection; (3) measures to ensure that the State Data shall not be altered or
Security of State Information. The Contractor represents and warrants that it has implemented and it shall maintain during the term of this Contract the highest industry standard administrative, technical, and physical safeguards and controls consistent with NIST Special Publication 800-53 (version 3 or higher) and Federal Information Processing Standards Publication 200 and designed to (i) ensure the security and confidentiality of State Data; (ii) protect against any anticipated security threats or hazards to the security or integrity of the State Data; and (iii) protect against unauthorized access to or use of State Data. Such measures shall include at a minimum: (1) access controls on information systems, including controls to authenticate and permit access to State Data only to authorized individuals and controls to prevent the Contractor employees from providing State Data to unauthorized individuals who may seek to obtain this information (whether through fraudulent means or otherwise); (2) industry-standard firewall protection;
AutoNDA by SimpleDocs
Security of State Information 

Related to Security of State Information

  • Security of Access Code You may use one (1) or more access codes with your electronic fund transfers. The access codes issued to you are for your security purposes. Any access codes issued to you are confidential and should not be disclosed to third parties or recorded on or with the card. You are responsible for safekeeping your access codes. You agree not to disclose or otherwise make your access codes available to anyone not authorized to sign on your accounts. If you authorize anyone to use your access codes, that authority shall continue until you specifically revoke such authority by notifying the Credit Union. You understand that any joint owner you authorize to use an access code may withdraw or transfer funds from any of your accounts. If you fail to maintain the security of these access codes and the Credit Union suffers a loss, we may terminate your EFT services immediately.

  • Certification Regarding Use of State Funds If Party is an employer and this Agreement is a State-funded grant in excess of $1,001, Party certifies that none of these State funds will be used to interfere with or restrain the exercise of Party’s employee’s rights with respect to unionization.

  • Use of State Property A. Grantee is prohibited from using State Property for any purpose other than performing Services authorized under the Grant Agreement. B. State Property includes, but is not limited to, System Agency’s office space, identification badges, System Agency information technology equipment and networks (e.g., laptops, portable printers, cell phones, iPads or tablets, external hard drives, data storage devices, any System Agency-issued software, and the System Agency Virtual Private Network (VPN client)), and any other resources of System Agency. C. Grantee shall not remove State Property from the continental United States. In addition, Grantee may not use any computing device to access System Agency’s network or e- mail while outside of the continental United States. D. Grantee shall not perform any maintenance services on State Property unless the Grant Agreement expressly authorizes such Services. E. During the time that State Property is in the possession of Grantee, Grantee shall be responsible for: i. all repair and replacement charges incurred by State Agency that are associated with loss of State Property or damage beyond normal wear and tear, and ii. all charges attributable to Xxxxxxx’s use of State Property that exceeds the Grant Agreement scope. Grantee shall fully reimburse such charges to System Agency within ten (10) calendar days of Grantee’s receipt of System Agency’s notice of amount due. Use of State Property for a purpose not authorized by the Grant Agreement shall constitute breach of contract and may result in termination of the Grant Agreement and the pursuit of other remedies available to System Agency under contract, at law, or in equity.

  • ACCESS TO SECURITY LOGS AND REPORTS Upon request, the Contractor shall provide access to security logs and reports to the State or Authorized User in a format as specified in the Authorized User Agreement.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!