Security Violations and Accounts Updates Sample Clauses

Security Violations and Accounts Updates. Grantee will adhere to the Confidentiality Article requirements and HHS Data Usage Agreement of this contract and immediately contact System Agency if a security violation is detected, or if Grantee has any reason to suspect that the security or integrity of the CMBHS data has been or may be compromised in any way.
AutoNDA by SimpleDocs
Security Violations and Accounts Updates. Contractor shall adhere to the Confidentiality Article requirements and HHS Data Usage Agreement of this contract and immediately contact DSHS if a security violation is detected, or if Contractor has any reason to suspect that the security or integrity of the CMBHS data has been or may be compromised in any way.
Security Violations and Accounts Updates. 9 Section 23.05 Electronic Transfer of Information. 9 Section 23.06 Access. 10 Section 23.07 Components. 10 Section 23.08 Drug Courts. 13
Security Violations and Accounts Updates. Contractor shall notify the contract manager assigned to the Program Attachment immediately if a security violation is detected, or if Contractor has any reason to suspect that the security or integrity of the CMBHS data has been or may be compromised in any way. Contractor shall immediately block access to CMBHS of any person who should no longer have access to CMBHS, due to severance of employment with Contractor or otherwise, or immediately modify access when there is a change in a user’s job responsibilities that affects the user’s need for access to CMBHS, and update records on a daily basis to reflect any changes in account status.
Security Violations and Accounts Updates. Performing Agency will adhere to the Confidentiality Article requirements and HHS Data Usage Agreement of this contract and immediately contact System Agency if a security violation is detected, or if Performing Agency has any reason to suspect that the security or integrity of the CMBHS data has been or may be compromised in any way.

Related to Security Violations and Accounts Updates

  • OBLIGATIONS AND ACTIVITIES OF CONTRACTOR AS BUSINESS ASSOCIATE 1. Contractor agrees not to use or further disclose PHI County discloses to Contractor other than as permitted or required by this Business Associate Contract or as required by law.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!