Contractor Hosted Services Confidential Data Sample Clauses

Contractor Hosted Services Confidential Data. Audit, and Other Requirements (1) The Contractor shall ensure that all Confidential State Data is housed in the continental United States, inclusive of backup data. (2) The Contractor shall encrypt Confidential State Data at rest and in transit using -2 validated encryption technologies. (3) The Contractor shall maintain a Security Management Certification from the Federal using a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services, and has certified that the ftware, networks, data centers, facilities and related equipment used to develop, test, operate, monitor, manage and/or support information technology services. The Contractor shall provide proof of current certification annually and upon State request. Contractor shall meet all applicable requirements of the most current version of Internal Revenue Service Publication 1075. No additional funding shall be allocated for these certifications, authorizations, or audits as these are included in the Maximum Liability of this Contract. (4) The Contractor must annually perform Penetration Tests and Vulnerability mean the combination of software and hardware on which the Application runs. security weaknesses which have the potential to gain access to the Processing be designed and executed to define, identify, and classify the security holes (vulnerabilities) in the Processing Environment. The Contractor shall allow the State, at its option, to perform Penetration Tests and Vulnerability Assessments on the Processing Environment. maintained by the PCI Security Standards Council.

Related to Contractor Hosted Services Confidential Data

  • Confidential System Information HHSC prohibits the unauthorized disclosure of Other Confidential Information. Grantee and all Grantee Agents will not disclose or use any Other Confidential Information in any manner except as is necessary for the Project or the proper discharge of obligations and securing of rights under the Contract. Grantee will have a system in effect to protect Other Confidential Information. Any disclosure or transfer of Other Confidential Information by ▇▇▇▇▇▇▇, including information requested to do so by HHSC, will be in accordance with the Contract. If Grantee receives a request for Other Confidential Information, ▇▇▇▇▇▇▇ will immediately notify HHSC of the request, and will make reasonable efforts to protect the Other Confidential Information from disclosure until further instructed by the HHSC. Grantee will notify HHSC promptly of any unauthorized possession, use, knowledge, or attempt thereof, of any Other Confidential Information by any person or entity that may become known to Grantee. Grantee will furnish to HHSC all known details of the unauthorized possession, use, or knowledge, or attempt thereof, and use reasonable efforts to assist HHSC in investigating or preventing the reoccurrence of any unauthorized possession, use, or knowledge, or attempt thereof, of Other Confidential Information. HHSC will have the right to recover from Grantee all damages and liabilities caused by or arising from Grantee or Grantee Agents’ failure to protect HHSC’s Confidential Information as required by this section.

  • Confidential Data A. UTK shall not divulge to others, any trade secret or confidential information, knowledge, or data concerning or pertaining to the business and affairs of MGCN, obtained by UTK as a result of its engagement hereunder, unless authorized, in writing by MGCN. UTK represents and warrants that it has established appropriate internal procedures for protecting the trade secrets and confidential information of, MGCN including, without limitation, restrictions on disclosure of such information to employees and other persons who may be engaged in such information to employees and other persons who may be engaged in rendering services to any person, firm or entity which may be a competitor of. B. MGCN shall not divulge to others, any trade secret or confidential information, knowledge, or data concerning or pertaining to the business and affairs of UTK obtained as a result of its engagement hereunder, unless authorized, in writing, by UTK. C. UTK shall not be required in the performance of its duties to divulge to MGCN, or any officer, director, agent or employee of MGCN, any secret or confidential information, knowledge, or data concerning any other person, firm or entity (including, but not limited to, any such person, firm or entity which may be a competitor or potential competitor of) which UTK may have or be able to obtain other than as a result of the relationship established by this Agreement.

  • Third Party Confidential Information Consultant recognizes that the Company has received and in the future will receive from third parties their confidential or proprietary information subject to a duty on the Company’s part to maintain the confidentiality of such information and to use it only for certain limited purposes. Consultant agrees that at all times during the term of this Agreement and thereafter, Consultant owes the Company and such third parties a duty to hold all such confidential or proprietary information in the strictest confidence and not to use it or to disclose it to any person, firm, corporation, or other third party except as necessary in carrying out the Services for the Company consistent with the Company’s agreement with such third party.

  • Exclusions from Confidential Information Receiving Party's obligations under this Agreement do not extend to information that is: (a) publicly known at the time of disclosure or subsequently becomes publicly known through no fault of the Receiving Party; (b) discovered or created by the Receiving Party before disclosure by Disclosing Party; (c) learned by the Receiving Party through legitimate means other than from the Disclosing Party or Disclosing Party's representatives; or (d) is disclosed by Receiving Party with Disclosing Party's prior written approval.

  • Third Party Proprietary Data The Disclosing Party's Third Party Proprietary Data, if any, will be identified in a separate technical document.