Application Access Clause Samples
Application Access. All systems accessible via the internet must employ security controls to prevent access to the application via an asset not approved or owned by the county. • Risk Assessment. Application Service Providers hosting data for HIPAA covered services must conduct an accurate and thorough Risk Assessment as required by HIPAA Security Rule, Security Management (§ 164.308(a)(1)). Further, they must follow the risk assessment methodology, based on the latest version of NIST SP 800-30 (▇▇▇▇://▇▇▇▇.▇▇▇▇.▇▇▇/publications/nistpubs/800-30-rev1/sp800_30_r1.pdf). Upon request, the Risk Assessment findings and remediation strategy must be shared with ▇▇▇▇▇. • NIST. To ensure compliance with HIPAA, Application Service Providers shall implement appropriate security safeguards by following National Institute of Standards and Technology (NIST) guidelines.
Application Access. All systems accessible via the internet must employ security controls to prevent access to the application via an asset not approved or owned by the county.
Application Access. Customer may access the ClearGov Apps via Customer’s Account to utilize the functionality provided within such ClearGov Apps; and
Application Access. All systems accessible via the internet must employ security controls to prevent access to the application via an asset not approved or owned by the county. • Risk Assessment. Application Service Providers hosting data for HIPAA covered services must conduct an accurate and thorough Risk Assessment as required by HIPAA Security Rule, Security Management (§ 164.308(a)(1)). Further, they must follow the risk assessment methodology, based on the latest version of NIST SP 800-30 (▇▇▇▇://▇▇▇▇.▇▇▇▇.▇▇▇/publications/nistpubs/800-30- rev1/sp800_30_r1.pdf). Upon request, the Risk Assessment findings and remediation strategy must be shared with OCHCA. • NIST. To ensure compliance with HIPAA, Application Service Providers shall implement appropriate security safeguards by following National Institute of Standards and Technology (NIST) guidelines. County of Orange Health Care Agency Page 43 MA-042-17011367
Application Access. Provider shall make the Application(s) available over either the Internet or Customer’s intranet to allow the End User to electronically and remotely access the Application(s). You shall provide at your own expense, all necessary telephone lines, Internet connections, equipment, software (including a compatible Web browser), and services for you to effectively access the Application(s). You are responsible for upgrading and configuring your internal systems (e.g., network or Intranet settings, Internet routing, fire walls, and Web browsers) to be and remain compatible with and optimize the performance of the Application(s). You acknowledge that the availability and performance of the Application(s) may be subject to interruption or delay due to causes beyond the reasonable control of Provider. The Application(s) are not the "system of record" for financial information (e.g., balances, transactions, etc.), but rather merely a means to access information. The “system of record” is maintained at the credit card processor.
Application Access. When applicable to those specific Deliverables, any software or application must be installed onto the intended server, other device, or otherwise completed and delivered without preserving any TSGS access or backdoors, unless an SOW explicitly states otherwise. If TSGS requires access to a server provide Updates, TSGS shall provide adequate notice to Trade Algo, and Trade Algo shall facilitate such access. TSGS represents and warrants that all Deliverables will be free from any program, routine or device designed to delete, disable, deactivate, interfere with, prevent access to, or otherwise harm any software, program, data, device, system or service, including without limitation, any ‘time bomb’, virus, drop dead device, malicious logic, worm, Trojan horse or trap or back door.
Application Access. All systems accessible via the internet must employ security controls to prevent access to the application via an asset not approved or owned by the county. • Risk Assessment. Application Service Providers hosting data for HIPAA covered services must conduct an accurate and thorough Risk Assessment as required by HIPAA County of Orange Page 45 of 53 MA-042-19011809 Health Care Agency File Folder No. C018820 Security Rule, Security Management (§ 164.308(a)(1)). Further, they must follow the risk assessment methodology, based on the latest version of NIST SP 800-30 (▇▇▇▇://▇▇▇▇.▇▇▇▇.▇▇▇/publications/nistpubs/800-30-rev1/sp800_30_r1.pdf). Upon request, the Risk Assessment findings and remediation strategy must be shared with ▇▇▇▇▇. • NIST. To ensure compliance with HIPAA, Application Service Providers shall implement appropriate security safeguards by following National Institute of Standards and Technology (NIST) guidelines.
Application Access. All systems accessible via the internet must employ security controls to prevent access to the application via an asset not approved or owned by the county. • Risk Assessment. Application Service Providers hosting data for HIPAA covered services must conduct an accurate and thorough Risk Assessment as required by HIPAA Security Rule, Security Management (§ 164.308(a)(1)). Further, they must follow the risk assessment methodology, based on the latest version of NIST SP 800-30 (▇▇▇▇://▇▇▇▇.▇▇▇▇.▇▇▇/publications/nistpubs/800-30-rev1/sp800_30_r1.pdf). Upon request, the Risk Assessment findings and remediation strategy must be shared with ▇▇▇▇▇. • NIST. To ensure compliance with HIPAA, Application Service Providers shall implement appropriate security safeguards by following National Institute of Standards and Technology (NIST) guidelines. 12 Policies Vendors must have formal, published IT security policies that address how they manage and maintain the internal security posture of their own or sub-contracted infrastructure. The vendor shall also clearly demonstrate that additional security features are in place to protect systems and data in the unique environment of the service provider model: namely, security issues associated with storing County- owned data on a remote server that is not under direct County control and the necessity of transferring this data over an untrusted network. Vendors must provide, to the extent permissible, all relevant security policies and procedures to the County for review and validation. All documentation must be provided in electronic format for the County’s review. These policies must include, but not be limited to, the following: ▪ IT Staff Usage Agreement. All vendor employees performing services for the County must sign and agree to an IT usage agreement within their own organization as part of an overall security training and awareness program. At a minimum, vendor employees must sign a statement of understanding within their own organization regarding Internet dangers, IT security, and IT ethics and best practices, ▪ IT Security Policies and Procedures.
Application Access. Oranj™ hereby grants you permission to use the Application as set forth in these Terms of Service, provided that: (i) your use of the Application as permitted is solely for your personal, noncommercial use in connection with your Oranj™ Account; (ii) you will not use the Application in any way that is unlawful, misleading, malicious, or discriminatory; (iii) you will not do anything that could disable, overburden, or impair the proper working of the Application (such as a denial of service attack); and (iv) you will otherwise comply with the terms and conditions of these Terms of Service. You cannot:
1. access, tamper with, or use non-public areas of the Application, Oranj’s computer systems, or the technical delivery systems of Oranj’s providers;
2. attempt to probe, scan, or test the vulnerability of any system or network or breach any security or authentication measures;
3. interfere with, or attempt to interfere with, the access of any user, host, or network, including, without limitation, sending a virus, overloading, flooding, spamming, or request-bombing the Application;
4. impersonate or misrepresent your affiliation with any person or entity;
5. violate any local, state, national or international law or regulation;
6. transmit any material that is fraudulent, abusive, harassing, tortious, defamatory, vulgar, pornographic, obscene, libelous, invasive of another's privacy, hateful, or racially, ethnically, or otherwise objectionable. Oranj™ Account Requirements • In order to use the Application (Oranj™ App), you will have to create an account. • Oranj Accounts are only available to users age 18 and older. • By registering with ▇▇▇▇▇, you represent that you are able to form a binding contract and are not a person barred by any laws from using the Application. • You are not allowed to use another user’s Oranj Account. • When creating your Oranj Account, you must provide accurate and complete information. You agree to provide true, accurate, current and complete information about yourself in all required fields of the registration form. If any of your information changes, you agree to update your registration information as soon as possible. If ▇▇▇▇▇ suspects that your registration violates these Terms of Service, your Oranj Account may be subject to suspension or termination, and you may be barred from using the Application. • You are solely responsible for the activity that occurs on and in your Oranj Account, and you must keep your password secure. ...
Application Access. Customer may access the SwiftComply Modules via Customer’s Account to utilize the functionality provided within such SwiftComply Modules; and