Data Integrity and Safeguarding Information Sample Clauses

POPULAR SAMPLE Copied 1 times
Data Integrity and Safeguarding Information. The vendor shall ensure an appropriate level of data security for the information the vendor is collecting or using in the performance of this agreement. An appropriate level of security includes approving and tracking all vendor employees that request system or information access and ensuring that user access has been removed from all terminated employees. The vendor, among other requirements, must anticipate and prepare for the loss of information processing capabilities. All data and software must be routinely backed up to insure recovery from losses or outages of the computer system. The security over the backed-up data is to be as stringent as the protection required of the primary systems. The vendor shall ensure all vendors maintain written procedures for computer system back-up and recovery. The Vendor shall complete and sign the Certification Regarding Data Integrity Compliance for Agreements, Loans and Cooperative Agreements prior to the execution of this agreement.
Data Integrity and Safeguarding Information. The Sub-Recipient shall ensure an appropriate level of data security for the information the Sub-Recipient is collecting or using in the performance of this contract. An appropriate level of security includes approving and tracking all Sub- Recipient employees that request system or information access and ensuring that user access has been removed from all terminated employees. The Sub-Recipient, among other requirements, must anticipate and prepare for the loss of information processing capabilities. All data and software shall be routinely backed up to ensure recovery from losses or outages of the computer system. The security over the backed-up data is to be as stringent as the protection required of the primary systems. The Sub-Recipient shall ensure all Subcontractors maintain written procedures for computer system backup and recovery. The Sub-Recipient shall complete and sign the Certification Regarding Data Integrity Compliance for Agreements, Grants, Loans, and Cooperative Agreements prior to the execution of this contract.
Data Integrity and Safeguarding Information. The Contractor shall ensure an appropriate level of data security for the information the Contractor is collecting or using in the performance of this contract. An appropriate level of security includes approving and tracking all Contractor employees that request system or information access and ensuring that user access has been removed from all terminated employees. The Contractor, among other requirements, must anticipate and prepare for the loss of information processing capabilities. All data and software shall be routinely backed up to ensure recovery from losses or outages of the computer system. The security over the backed-up data is to be as stringent as the protection required of the primary systems. The Contractor shall ensure all Subcontractors maintain written procedures for computer system backup and recovery. The Contractor shall complete and sign the Certification Regarding Data Integrity Compliance for Agreements, Grants, Loans, and Cooperative Agreements prior to the execution of this contract.
Data Integrity and Safeguarding Information. The Sub-recipient shall ensure an appropriate level of data security for the information the Sub-recipient is collecting or using in the performance of any contract or agreement incorporating this Master Contract by reference. An appropriate level of security includes approving and tracking all Sub-recipient employees that request system or information access and ensuring that user access has been removed from all terminated employees. The Sub-recipient, among other requirements, must anticipate and prepare for the loss of information processing capabilities. All data and software shall be routinely backed up to ensure recovery from losses or outages of the computer system. The security over the backed-up data is to be as stringent as the protection required of the primary systems. The Sub-recipient shall ensure all Subcontractors maintain written procedures for computer system backup and recovery. The Sub-recipient shall complete and sign ATTACHMENT III prior to the execution of the Master Contract.
Data Integrity and Safeguarding Information. The Provider shall ensure an appropriate level of data security for the information the Provider is collecting or using in the performance of this Agreement. An appropriate level of security includes approving and tracking all Provider employees that request system or information access and ensuring that user access has been removed from all terminated employees. The Provider, among other requirements, must anticipate and prepare for the loss of information processing capabilities. All data and software shall be routinely backed up to ensure recovery from losses or outages of the computer system. The security over the backed-up data is to be as stringent as the protection required of the primary systems. The Provider shall ensure all subcontractors maintain written procedures for computer system backup and recovery. The Provider shall complete and sign the Certification Regarding Data Integrity Compliance for Agreements, Grants, Loans, and Cooperative Agreements and return it with the Agreement to Agency contact. Electronic client records and files must be stored in an encrypted format at all times. Storage devices include, but not limited to, computer servers, mobile devices such as laptops, notebooks, and phones, removable media such as CD’s, jump drives, DVD’s and tape. Access shall be limited to staff members requiring the information in order to provide a service to the client. The Provider shall not send any client information via email unless the information is sent in a secured manner through a data encryption service for email systems or if the client file(s) are encrypted prior to sending via email. When faxing client information the Provider shall: Limit the client information to the minimum necessary to accomplish the purpose of the communication; When faxing to a client, do not fax sensitive protected health information (PHI) such as PHI related to alcohol abuse, drug abuse, mental health issues, HIV testing, antigens indicating hepatitis infection, sexually transmitted diseases (STD), or presence of malignancy; Take reasonable precautions to ensure that the intended recipient is either available to receive the fax as it arrives or has exclusive access to the fax machine; Pre-program frequently used non-patient fax numbers to minimize potential for misdirected faxes. Confirm pre-programmed numbers at least every six (6) months; If there is any reason to question the accuracy of a fax number, contact the recipient to confirm the number prior to...
Data Integrity and Safeguarding Information. (1) The subrecipient shall ensure an appropriate level of data security for the information the subrecipient is collecting or using in the performance of this contract, or any PSC referencing this contract. An appropriate level of security includes approving and tracking all subrecipient employees that request system or information access and ensuring that user access has been removed from all terminated employees. (2) The subrecipient must anticipate and prepare for the loss of information processing capabilities. All data and software must be routinely backed up to insure recovery from losses or outages of the computer system. The security over the backed-up data is to be as stringent as the protection required of the primary systems. It is recommended that a copy of the backed up data be stored in a secure, offsite location. The subrecipient shall maintain written policies and procedures for computer system backup and recovery, and shall have the same requirement in its contracts and/or agreements with subcontractors. These policies and procedures shall be made available to the agency upon request. (3) The subrecipient shall employ a Local Area Network (LAN) Administrator, or comparable staff position or consultant, who shall ensure the subrecipient’s compliance with the requirements of this section. (4) State and federal grants management requires a subrecipient receiving state and federal funds to have a financial management system which is capable of providing accurate information for prescribed reporting requirements. For the purposes of full disclosure of financial results for state and federally funded programs and for accountability purposes, reporting requirements may necessitate that the subrecipient have access to and knowledge of automated accounting systems and data processing capabilities. (5) The subrecipient will ensure the collection and maintenance of client and service information on a monthly basis for the Client Information Registration and Tracking System (CIRTS) or any such system designated by the agency or the department. Maintenance includes valid exports and backups of all data and systems according to agency or department standards. (6) The subrecipient will ensure all required data from subcontractors is entered accurately and timely into CIRTS according to the department’s CIRTS Policy Guidelines for clients and services in the CIRTS database. The CIRTS data required from subcontractors must be entered into CIRTS before the ...
Data Integrity and Safeguarding Information. The Provider shall ensure an appropriate level of data security for the information the Provider is collecting or using in the performance of any contract or agreement incorporating this Master Contract by reference. An appropriate level of security includes approving and tracking all Provider employees that request system or information access and ensuring that user access has been removed from all terminated employees. The Provider, among other requirements, must anticipate and prepare for the loss of information processing capabilities. All data and software shall be routinely backed up to ensure recovery from losses or outages of the computer system. The security over the backed-up data is to be as stringent as the protection required of the primary systems. The Provider shall ensure all Subproviders maintain written procedures for computer system backup and recovery. The Provider shall complete and sign ATTACHMENT III prior to the execution of the Master Contract.
Data Integrity and Safeguarding Information. The Provider shall insure an appropriate level of data security for the information the Provider is collecting or using in the performance of this Agreement. An appropriate level of security includes approving and tracking all Provider employees that request system or information access and ensuring that user access has been removed from all terminated employees. The Provider, among other requirements, must anticipate and prepare for the loss of information processing capabilities. All data and software must be routinely backed up to insure recovery from losses or outages of the computer system. The security over the backed-up data is to be as stringent as the protection required of the primary systems. The Provider shall insure all subcontractors maintain written procedures for computer system back up and recovery. The Provider shall complete and sign ATTACHMENT III prior to the execution of the Master Agreement. Electronic client records and files must be stored in an encrypted format at all times. Storage devices include, but not limited to, computer servers, mobile devices such as laptops, notebooks, and phones, removable media such as CDs, jump drives, DVDs, and tape. Access shall be limited to staff members requiring the information in order to provide a service to the client. The Provider shall not send any client information via email unless the information is sent in a secured manner through a data encryption service for email systems or if the client file(s) are encrypted prior to sending via email. When faxing client information the Provider shall: 1. Limit the client information to the minimum necessary to accomplish the purpose of the communication 2. When faxing to a client, do not fax sensitive protected health information (PHI) such as PHI related to alcohol abuse, drug abuse, mental health issues, HIV testing, antigens indicating hepatitis infection, sexually transmitted diseases (STD), or presence of malignancy 3. Take reasonable precautions to ensure that the intended recipient is either available to receive the fax as it arrives or has exclusive access to the fax machine 4. Pre-program frequently used non-patient fax numbers to minimize potential for misdirected faxes. Confirm pre- programmed numbers at least every six (6) months 5. If there is any reason to question the accuracy of a fax number, contact the recipient to confirm the number prior to faxing PHI 6. When faxing PHI, use fax cover sheets that include the following informatio...
Data Integrity and Safeguarding Information. The Contractor will insure an appropriate level of data security for the information the Contractor is collecting or using in the performance of this contract. An appropriate level of security includes approving and tracking all Contractor employees that request system or information access and ensuring that user access has been removed from all terminated employees. The Contractor, among other requirements, must anticipate and prepare for the loss of information processing capabilities. All data and software must be routinely backed up to insure recovery from losses or outages of the computer system. The security over the backed-up data is to be as stringent as the protection required of the primary systems. The Contractor will insure all subcontractors maintain written procedures for computer system backup and recovery. The Contractor will complete and sign ATTACHMENT IV (Certification Regarding Data Integrity Compliance for Agreements, Grants, Loans and Cooperative Agreements) prior to the execution of this contract.

Related to Data Integrity and Safeguarding Information

  • Safeguarding Information Not to use or disclose any information concerning a recipient of services under this contract for any purpose not in conformity with state and federal law except upon written consent of the recipient, or the responsible parent or guardian when authorized by law.

  • Data Integrity Policies and procedures to ensure the confidentiality, integrity, and availability of Customer Data or Professional Services Data and protect it from disclosure, improper alteration, or destruction.

  • Safeguarding Customer Information The Servicer has implemented and will maintain security measures designed to meet the objectives of the Interagency Guidelines Establishing Standards for Safeguarding Customer Information published in final form on February 1, 2001, 66 Fed. Reg. 8616 and the rules promulgated thereunder, as amended from time to time (the “Guidelines”). The Servicer shall promptly provide the Master Servicer, the Trustee and the NIMS Insurer information reasonably available to it regarding such security measures upon the reasonable request of the Master Servicer, the Trustee and the NIMS Insurer which information shall include, but not be limited to, any Statement on Auditing Standards (SAS) No. 70 report covering the Servicer’s operations, and any other audit reports, summaries of test results or equivalent measures taken by the Servicer with respect to its security measures to the extent reasonably necessary in order for the Seller to satisfy its obligations under the Guidelines.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.