Data Security and Privacy Plan. Vendor agrees that it will protect the confidentiality, privacy and security of the Protected Data received from Participating Educational Agencies in accordance with Erie 1 BOCES’ Parents Bill of Rights for Data Privacy and Security. To this end, Vendor attaches its privacy policy. Additional elements of Vendor’s Data Security and Privacy Plan are as follows: (a) In order to implement all state, federal, and local data security and privacy requirements, including those contained within this Data Sharing and Confidentiality Agreement, consistent with Erie 1 BOCES’ data security and privacy policy, Vendor will: Review its data security and privacy policy and practices to ensure that they are in conformance withall applicable federal, state, and local laws and the terms of this Data Sharing and Confidentiality Agreement. In the event Vendor’s policy and practices are not in conformance, the Vendor will implement commercially reasonable efforts to ensure such compliance. (b) As required by the NIST Cybersecurity Framework, in order to protect the security, confidentiality and integrity of the Protected Data that it receives under the MLSA, a. Vendor will make its best efforts in deploying reasonable administrative, technical, operational,and physical safeguards and practices in place throughout the term of the MLSA: i. Data Security: 1. Data-at-rest & data-in-transit is encrypted 2. Data leak protections are implemented ii. Information Protection Processes and Procedures: 1. Data destruction is performed according to contract and agreements 2. A plan for vulnerability management is developed and implemented iii. Protective Technology: 1. Log/audit records are ascertained, implemented, documented, and reviewed according to policy 2. Network communications are protected iv. Identity Management, Authentication and Access Control: 1. Credentials and identities are issued, verified, managed, audited, and revoked, as applicable, for authorized dev (c) Vendor will comply with all obligations set forth in Erie 1 BOCES’ “Supplemental Information about the MLSA” below. (d) For any of its officers or employees (or officers or employees of any of its subcontractors or assignees) who have access to Protected Data, Vendor has provided or will provide training on the federal and state laws governing confidentiality of such data prior to their receiving access, as follows: Annually, Vendor will require that all of its employees (or officers or employees of any of its subcontractors or assignees) undergo data security and privacy training to ensure that these individuals are aware of and familiar with all applicable data security and privacy laws. (e) Vendor [check one] will Xwill not utilize sub-contractors for the purpose of fulfilling one or more of its obligations under the MLSA. In the event that Vendor engages any subcontractors, assignees, or other authorized agents to perform its obligations under the MLSA, it will require such subcontractors, assignees, or other authorized agents to execute written agreements as more fully described in Erie 1 BOCES’ “Supplemental Information about the MLSA,” below. (f) Vendor will manage data security and privacy incidents that implicate Protected Data, including identifying breaches and unauthorized disclosures, and Vendor will provide prompt notification of any breaches or unauthorized disclosures of Protected Data in accordance with Section 6 of this Data Sharing and Confidentiality Agreement. (g) Vendor will implement procedures for the return, transition, deletion and/or destruction of Protected Data at such time that the MLSA is terminated or expires, as more fully described in Erie 1 BOCES’ “Supplemental Information about the MLSA,” below.
Appears in 2 contracts
Sources: Data Sharing and Confidentiality Agreement, Data Sharing and Confidentiality Agreement
Data Security and Privacy Plan. Vendor agrees that it will protect the confidentiality, privacy and security of the Protected Data received from Participating Educational Agencies in accordance with Erie 1 BOCES’ Parents Bill of Rights for Data Privacy and Security, a copy of which has been signed by the Vendor and is set forth below. To this end, Vendor attaches its [▇▇▇▇▇://▇▇▇▇▇▇▇.▇▇▇/privacy Please also see attached ‘Product Profile’ for data and security plan] Bulb’s privacy policy. policy is located at ▇▇▇▇▇://▇▇.▇▇▇▇▇▇▇.▇▇▇/privacy-policy/ Additional elements of Vendor’s Data Security and Privacy Plan are as follows:
(a) In order to implement all state, federal, and local data security and privacy requirements, including those contained within this Data Sharing and Confidentiality Agreement, consistent with Erie 1 BOCES’ data security and privacy policy, Vendor will: Review its data security and privacy policy and practices to ensure that they are in conformance withall with all applicable federal, state, and local laws and the terms of this Data Sharing and Confidentiality Agreement. In the event Vendor’s policy and practices are not in conformance, the Vendor will implement commercially reasonable efforts to ensure such compliance.
(b) As required by the NIST Cybersecurity Framework, in order to protect the security, confidentiality and integrity of the Protected Data that it receives under the MLSA,
a. Vendor will make its best efforts in deploying have the following reasonable administrative, technical, operational,, and physical safeguards and practices in place throughout the term of the MLSA:
i. Data Security:
1. Data-at-rest & data-in-transit is encrypted 2. Data leak protections are implemented
ii. Information Protection Processes and Procedures:
1. Data destruction is performed according to contract and agreements
2. A plan for vulnerability management is developed and implemented
iii. Protective Technology:
1. Log/audit records are ascertained, implemented, documented, and reviewed according to policy 2. Network communications are protected
iv. Identity Management, Authentication and Access Control:
1. Credentials and identities are issued, verified, managed, audited, and revoked, as applicable, for authorized dev
(c) Vendor will comply with all obligations set forth in Erie 1 BOCES’ “Supplemental Information about the MLSA” below.
(d) For any of its officers or employees (or officers or employees of any of its subcontractors or assignees) who have access to Protected Data, Vendor has provided or will provide training on the federal and state laws governing confidentiality of such data prior to their receiving access, as follows: Annually, Vendor will require that all of its employees (or officers or employees of any of its subcontractors or assignees) undergo data security and privacy training to ensure that these individuals are aware of and familiar with all applicable data security and privacy laws.
(e) Vendor [check one] Y will Xwill will not utilize sub-contractors for the purpose of fulfilling one or more of its obligations under the MLSA. In the event that Vendor engages any subcontractors, assignees, or other authorized agents to perform its obligations under the MLSA, it will require such subcontractors, assignees, or other authorized agents to execute written agreements as more fully described in Erie 1 BOCES’ “Supplemental Information about the MLSA,” below.
(f) Vendor will manage data security and privacy incidents that implicate Protected Data, including identifying breaches and unauthorized disclosures, and Vendor will provide prompt notification of any breaches or unauthorized disclosures of Protected Data in accordance with Section 6 of this Data Sharing and Confidentiality Agreement.
(g) Vendor will implement procedures for the return, transition, deletion and/or destruction of Protected Data at such time that the MLSA is terminated or expires, as more fully described in Erie 1 BOCES’ “Supplemental Information about the MLSA,” below.
Appears in 1 contract
Data Security and Privacy Plan. Vendor agrees that it will protect the confidentiality, privacy and security of the Protected Data received from Participating Educational Agencies in accordance with Erie 1 BOCES’ Parents Bill of Rights for Data Privacy and Security. To this end, a copy of which has been signed by the Vendor attaches its privacy policyand is set forth below. Additional elements of Vendor’s Data Security and Privacy Plan are as follows:
(a) In order to implement all state, federal, and local data security and privacy requirements, including those contained within this Data Sharing and Confidentiality Agreement, consistent with Erie 1 BOCES’ data security and privacy policy, Vendor will: Review its data security and privacy policy and practices to ensure that they are in conformance withall with all applicable federal, state, and local laws and the terms of this Data Sharing and Confidentiality Agreement. In the event Vendor’s policy and practices are not in conformance, the Vendor will implement commercially reasonable efforts to ensure such compliance.
(b) As required by the NIST Cybersecurity Framework, in order to protect the security, confidentiality and integrity of the Protected Data that it receives under the MLSA,
a. Vendor will make its best efforts in deploying have the following reasonable administrative, technical, operational,, and physical safeguards and practices in place throughout the term of the MLSA:
i. Data Security:
1. Data-at-rest & data-in-transit is encrypted 2. Data leak protections are implemented
ii. Information Protection Processes and Procedures:
1. Data destruction is performed according to contract and agreements
2. A plan for vulnerability management is developed and implemented
iii. Protective Technology:
1. Log/audit records are ascertained, implemented, documented, and reviewed according to policy 2. Network communications are protected
iv. Identity Management, Authentication and Access Control:
1. Credentials and identities are issued, verified, managed, audited, and revoked, as applicable, for authorized dev
(c) Vendor will comply with all obligations set forth in Erie 1 BOCES’ “Supplemental Information about the MLSA” below.
(d) For any of its officers or employees (or officers or employees of any of its subcontractors or assignees) who have access to Protected Data, Vendor has provided or will provide training on the federal and state laws governing confidentiality of such data prior to their receiving access, as follows: Annually, Vendor will require that all of its employees (or officers or employees of any of its subcontractors or assignees) undergo data security and privacy training to ensure that these individuals are aware of and familiar with all applicable data security and privacy laws.
(e) Vendor [check one] X will Xwill will not utilize sub-contractors for the purpose of fulfilling one or more of its obligations under the MLSA. In the event that Vendor engages any subcontractors, assignees, or other authorized agents to perform its obligations under the MLSA, it will require such subcontractors, assignees, or other authorized agents to execute written agreements as more fully described in Erie 1 BOCES’ “Supplemental Information about the MLSA,” below.
(f) Vendor will manage data security and privacy incidents that implicate Protected Data, including identifying breaches and unauthorized disclosures, and Vendor will provide prompt notification of any breaches or unauthorized disclosures of Protected Data in accordance with Section 6 of this Data Sharing and Confidentiality Agreement.
(g) Vendor will implement procedures for the return, transition, deletion and/or destruction of Protected Data at such time that the MLSA is terminated or expires, as more fully described in Erie 1 BOCES’ “Supplemental Information about the MLSA,” below.
Appears in 1 contract
Data Security and Privacy Plan. Vendor agrees that it will protect the confidentiality, privacy and security of the Protected Data received from Participating Educational Agencies in accordance with Erie 1 BOCES’ Parents Bill of Rights for Data Privacy and Security. To this end, a copy of which has been signed by the Vendor attaches its privacy policyand is set forth below. Additional elements of Vendor’s Data Security and Privacy Plan are as follows:
(a) In order to implement all state, federal, and local data security and privacy requirements, including those contained within this Data Sharing and Confidentiality Agreement, consistent with Erie 1 BOCES’ data security and privacy policy, Vendor will: Review its data security and privacy policy and practices to ensure that they are in conformance withall with all applicable federal, state, and local laws and the terms of this Data Sharing and Confidentiality Agreement. In the event Vendor’s policy and practices are not in conformance, the Vendor will implement commercially reasonable efforts to ensure such compliance.
(b) As required by the NIST Cybersecurity Framework, in order to protect the security, confidentiality and integrity of the Protected Data that it receives under the MLSA,
a. Vendor will make its best efforts in deploying have the following reasonable administrative, technical, operational,, and physical safeguards and practices in place throughout the term of the MLSA:
i. Data Security:
1. Data-at-rest & data-in-transit is encrypted 2. Data leak protections are implemented
ii. Information Protection Processes and Procedures:
1. Data destruction is performed according to contract and agreements
2. A plan for vulnerability management is developed and implemented
iii. Protective Technology:
1. Log/audit records are ascertained, implemented, documented, and reviewed according to policy 2. Network communications are protected
iv. Identity Management, Authentication and Access Control:
1. Credentials and identities are issued, verified, managed, audited, and revoked, as applicable, for authorized dev
(c) Vendor will comply with all obligations set forth in Erie 1 BOCES’ “Supplemental Information about the MLSA” below.
(d) For any of its officers or employees (or officers or employees of any of its subcontractors or assignees) who have access to Protected Data, Vendor has provided or will provide training on the federal and state laws governing confidentiality of such data prior to their receiving access, as follows: Annually, Vendor will require that all of its employees (or officers or employees of any of its subcontractors or assignees) undergo data security and privacy training to ensure that these individuals are aware of and familiar with all applicable data security and privacy laws.
(e) Vendor [check one] will Xwill not utilize sub-contractors for the purpose of fulfilling one or more of its obligations under the MLSA. In the event that Vendor engages any subcontractors, assignees, or other authorized agents to perform its obligations under the MLSA, it will require such subcontractors, assignees, or other authorized agents to execute written agreements as more fully described in Erie 1 BOCES’ “Supplemental Information about the MLSA,” below.
(f) Vendor will manage data security and privacy incidents that implicate Protected Data, including identifying breaches and unauthorized disclosures, and Vendor will provide prompt notification of any breaches or unauthorized disclosures of Protected Data in accordance with Section 6 of this Data Sharing and Confidentiality Agreement.
(g) Vendor will implement procedures for the return, transition, deletion and/or destruction of Protected Data at such time that the MLSA is terminated or expires, as more fully described in Erie 1 BOCES’ “Supplemental Information about the MLSA,” below.
Appears in 1 contract
Data Security and Privacy Plan. Vendor agrees that it will protect the confidentiality, privacy and security of the Protected Data received from Participating Educational Agencies in accordance with Erie 1 BOCES’ BOCES ’Parents Bill of Rights for Data Privacy and Security. To this end, a copy of which has been signed by the Vendor attaches its privacy policyand is set forth below. Additional elements of Vendor’s Data Security and Privacy Plan are as follows:
(a) In order to implement all state, federal, and local data security and privacy requirements, including those contained within this Data Sharing and Confidentiality Agreement, consistent with Erie 1 BOCES’ data security and privacy policy, Vendor will: Review its data security and privacy policy and practices to ensure that they are in conformance withall with all applicable federal, state, and local laws and the terms of this Data Sharing and Confidentiality Agreement. In the event Vendor’s policy and practices are not in conformance, the Vendor will implement commercially reasonable efforts to ensure such compliance.
(b) As required by the NIST Cybersecurity Framework, in order to protect the security, confidentiality and integrity of the Protected Data that it receives under the MLSA,
a. Vendor will make its best efforts in deploying have the following reasonable administrative, technical, operational,, and physical safeguards and practices in place throughout the term of the MLSA:
i. Data Security:
1. Data-at-rest & data-in-transit is encrypted 2. Data leak protections are implemented
ii. Information Protection Processes and Procedures:
1. Data destruction is performed according to contract and agreements
2. A plan for vulnerability management is developed and implemented
iii. Protective Technology:
1. Log/audit records are ascertained, implemented, documented, and reviewed according to policy 2. Network communications are protected
iv. Identity Management, Authentication and Access Control:
1. Credentials and identities are issued, verified, managed, audited, and revoked, as applicable, for authorized dev
(c) Vendor will comply with all obligations set forth in Erie 1 BOCES’ “Supplemental Information about the MLSA” below.
(d) For any of its officers or employees (or officers or employees of any of its subcontractors or assignees) who have access to Protected Data, Vendor has provided or will provide training on the federal and state laws governing confidentiality of such data prior to their receiving access, as follows: Annually, Vendor will require that all of its employees (or officers or employees of any of its subcontractors or assignees) undergo data security and privacy training to ensure that these individuals are aware of and familiar with all applicable data security and privacy laws.
(e) Vendor [check one] will Xwill X will not utilize sub-contractors for the purpose of fulfilling one or more of its obligations under the MLSA. In the event that Vendor engages any subcontractors, assignees, or other authorized agents to perform its obligations under the MLSA, it will require such subcontractors, assignees, or other authorized agents to execute written agreements as more fully described in Erie 1 BOCES’ “Supplemental Information about the MLSA,” below.
(f) Vendor will manage data security and privacy incidents that implicate Protected Data, including identifying breaches and unauthorized disclosures, and Vendor will provide prompt notification of any breaches or unauthorized disclosures of Protected Data in accordance with Section 6 of this Data Sharing and Confidentiality Agreement.
(g) Vendor will implement procedures for the return, transition, deletion and/or destruction of Protected Data at such time that the MLSA is terminated or expires, as more fully described in Erie 1 BOCES’ “Supplemental Information about the MLSA,” below.
Appears in 1 contract
Data Security and Privacy Plan. Vendor agrees that it will protect the confidentiality, privacy and security of the Protected Data received from Participating Educational Agencies in accordance with Erie 1 BOCES’ Parents Bill of Rights for Data Privacy and Security, a copy of which has been signed by the Vendor and is set forth below. To this end, Vendor attaches its privacy policy. [Privacy Policy: ▇▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇▇.▇▇▇/privacy-policy A copy of our Data Security and Privacy Plan is provided on Page 32.] Additional elements of Vendor’s Data Security and Privacy Plan are as follows:
(a) In order to implement all state, federal, and local data security and privacy requirements, including those contained within this Data Sharing and Confidentiality Agreement, consistent with Erie 1 BOCES’ data security and privacy policy, Vendor will: Review its data security and privacy policy and practices to ensure that they are in conformance withall with all applicable federal, state, and local laws and the terms of this Data Sharing and Confidentiality Agreement. In the event Vendor’s policy and practices are not in conformance, the Vendor will implement commercially reasonable efforts to ensure such compliance.
(b) As required by the NIST Cybersecurity Framework, in order to protect the security, confidentiality and integrity of the Protected Data that it receives under the MLSA,
a. Vendor will make its best efforts in deploying have the following reasonable administrative, technical, operational,, and physical safeguards and practices in place throughout the term of the MLSA:
i. Data Security:
1. Data-at-rest & data-in-transit is encrypted 2. Data leak protections are implemented
ii. Information Protection Processes and Procedures:
1. Data destruction is performed according to contract and agreements
2. A plan for vulnerability management is developed and implemented
iii. Protective Technology:
1. Log/audit records are ascertained, implemented, documented, and reviewed according to policy 2. Network communications are protected
iv. Identity Management, Authentication and Access Control:
1. Credentials and identities are issued, verified, managed, audited, and revoked, as applicable, for authorized dev
(c) Vendor will comply with all obligations set forth in Erie 1 BOCES’ “Supplemental Information about the MLSA” below.
(d) For any of its officers or employees (or officers or employees of any of its subcontractors or assignees) who have access to Protected Data, Vendor has provided or will provide training on the federal and state laws governing confidentiality of such data prior to their receiving access, as follows: Annually, Vendor will require that all of its employees (or officers or employees of any of its subcontractors or assignees) undergo data security and privacy training to ensure that these individuals are aware of and familiar with all applicable data security and privacy laws.
(e) Vendor [check one] will Xwill _X will not utilize sub-contractors for the purpose of fulfilling one or more of its obligations under the MLSA. In the event that Vendor engages any subcontractors, assignees, or other authorized agents to perform its obligations under the MLSA, it will require such subcontractors, assignees, or other authorized agents to execute written agreements as more fully described in Erie 1 BOCES’ “Supplemental Information about the MLSA,” below.
(f) Vendor will manage data security and privacy incidents that implicate Protected Data, including identifying breaches and unauthorized disclosures, and Vendor will provide prompt notification of any breaches or unauthorized disclosures of Protected Data in accordance with Section 6 of this Data Sharing and Confidentiality Agreement.
(g) Vendor will implement procedures for the return, transition, deletion and/or destruction of Protected Data at such time that the MLSA is terminated or expires, as more fully described in Erie 1 BOCES’ “Supplemental Information about the MLSA,” below.
Appears in 1 contract
Data Security and Privacy Plan. Vendor agrees that it will protect the confidentiality, privacy and security of the Protected Data received from Participating Educational Agencies in accordance with Erie 1 BOCES’ Parents Bill of Rights for Data Privacy and Security, a copy of which has been signed by the Vendor and is set forth below. To this end, Vendor attaches its privacy policy. ▇▇▇▇.▇▇▇ Information Security Policy: ▇▇▇▇▇://▇▇▇▇▇.▇▇▇▇▇▇.▇▇▇/file/d/155fkfm6MYEjeFluHUisxWIdygkfIMSCS/view?usp=sharing Additional elements of Vendor’s Data Security and Privacy Plan are as follows:
(a) In order to implement all state, federal, and local data security and privacy requirements, including those contained within this Data Sharing and Confidentiality Agreement, consistent with Erie 1 BOCES’ data security and privacy policy, Vendor will: Review its data security and privacy policy and practices to ensure that they are in conformance withall with all applicable federal, state, and local laws and the terms of this Data Sharing and Confidentiality Agreement. In the event Vendor’s policy and practices are not in conformance, the Vendor will implement commercially reasonable efforts to ensure such compliance.
(b) As required by the NIST Cybersecurity Framework, in order to protect the security, confidentiality and integrity of the Protected Data that it receives under the MLSA,
a. Vendor will make its best efforts in deploying have the following reasonable administrative, technical, operational,, and physical safeguards and practices in place throughout the term of the MLSA:
i. Data Security:
1. Data-at-rest & data-in-transit is encrypted 2. Data leak protections are implemented
ii. Information Protection Processes and Procedures:
1. Data destruction is performed according to contract and agreements
2. A plan for vulnerability management is developed and implemented
iii. Protective Technology:
1. Log/audit records are ascertained, implemented, documented, and reviewed according to policy 2. Network communications are protected
iv. Identity Management, Authentication and Access Control:
1. Credentials and identities are issued, verified, managed, audited, and revoked, as applicable, for authorized dev
(c) Vendor will comply with all obligations set forth in Erie 1 BOCES’ “Supplemental Information about the MLSA” below.
(d) For any of its officers or employees (or officers or employees of any of its subcontractors or assignees) who have access to Protected Data, Vendor has provided or will provide training on the federal and state laws governing confidentiality of such data prior to their receiving access, as follows: Annually, Vendor will require that all of its employees (or officers or employees of any of its subcontractors or assignees) undergo data security and privacy training to ensure that these individuals are aware of and familiar with all applicable data security and privacy laws.
(e) Vendor [check one] X will Xwill will not utilize sub-contractors for the purpose of fulfilling one or more of its obligations under the MLSA. In the event that Vendor engages any subcontractors, assignees, or other authorized agents to perform its obligations under the MLSA, it will require such subcontractors, assignees, or other authorized agents to execute written agreements that include confidentiality and data security obligations equivalent to, consistent with, and no less protective than, those found in this Data Sharing and Confidentiality Agreement. Vendor shall maintain and publish a list of such subcontractors (i.e., service providers) as more fully described in Erie 1 BOCES’ “Supplemental Information about the MLSA,” belowpart of its privacy policy.
(f) Vendor will manage data security and privacy incidents that implicate Protected Data, including identifying breaches and unauthorized disclosures, and Vendor will provide prompt notification of any breaches or unauthorized disclosures of Protected Data in accordance with Section 6 of this Data Sharing and Confidentiality Agreement.
(g) Vendor will implement procedures for the return, transition, deletion and/or destruction of Protected Data at such time that the MLSA is terminated or expires, as more fully described in Erie 1 BOCES’ “Supplemental Information about the MLSA,” below.
Appears in 1 contract
Data Security and Privacy Plan. Vendor agrees that it will protect the confidentiality, privacy and security of the Protected Data received from Participating Educational Agencies in accordance with Erie 1 BOCES’ Parents Bill of Rights for Data Privacy and Security. To this end, a copy of which has been signed by the Vendor attaches its privacy policyand is set forth below. Additional elements of Vendor’s Data Security and Privacy Plan are as follows:
(a) In order to implement all state, federal, and local data security and privacy requirements, including those contained within this Data Sharing and Confidentiality Agreement, consistent with Erie 1 BOCES’ data security and privacy policy, Vendor will: Review its data security and privacy policy and practices to ensure that they are in conformance withall with all applicable federal, state, and local laws and the terms of this Data Sharing and Confidentiality Agreement. In the event Vendor’s policy and practices are not in conformance, the Vendor will implement commercially reasonable efforts to ensure such compliance.
(b) As required by the NIST Cybersecurity Framework, in order to protect the security, confidentiality and integrity of the Protected Data that it receives under the MLSA,
a. Vendor will make its best efforts in deploying have the following reasonable administrative, technical, operational,, and physical safeguards and practices in place throughout the term of the MLSA:
i. Data Security:
1. Data-at-rest & data-in-transit is encrypted 2. Data leak protections are implemented
ii. Information Protection Processes and Procedures:
1. Data destruction is performed according to contract and agreements
2. A plan for vulnerability management is developed and implemented
iii. Protective Technology:
1. Log/audit records are ascertained, implemented, documented, and reviewed according to policy 2. Network communications are protected
iv. Identity Management, Authentication and Access Control:
1. Credentials and identities are issued, verified, managed, audited, and revoked, as applicable, for authorized dev
(c) Vendor will comply with all obligations set forth in Erie 1 BOCES’ “Supplemental Information about the MLSA” below.
(d) For any of its officers or employees (or officers or employees of any of its subcontractors or assignees) who have access to Protected Data, Vendor has provided or will provide training on the federal and state laws governing confidentiality of such data prior to their receiving access, as follows: Annually, Vendor will require that all of its employees (or officers or employees of any of its subcontractors or assignees) undergo data security and privacy training to ensure that these individuals are aware of and familiar with all applicable data security and privacy laws.
(e) Vendor [check one] X will Xwill will not utilize sub-contractors for the purpose of fulfilling one or more of its obligations under the MLSA. In the event that Vendor engages any subcontractors, assignees, or other authorized agents to perform its obligations under the MLSA, it will require such subcontractors, assignees, or other authorized agents to execute written agreements as more fully described in Erie 1 BOCES’ “Supplemental Information about the MLSA,” below.
(f) Vendor will manage data security and privacy incidents that implicate Protected Data, including identifying breaches and unauthorized disclosures, and Vendor will provide prompt notification of any breaches or unauthorized disclosures of Protected Data in accordance with Section 6 of this Data Sharing and Confidentiality Agreement.
(g) Vendor will implement procedures for the return, transition, deletion and/or destruction of Protected Data at such time that the MLSA is terminated or expires, as more fully described in Erie 1 BOCES’ “Supplemental Information about the MLSA,” below.
Appears in 1 contract
Data Security and Privacy Plan. Vendor agrees that it will protect the confidentiality, privacy and security of the Protected Data received from Participating Educational Agencies in accordance with Erie 1 BOCES’ Parents Bill of Rights for Data Privacy and Security, a copy of which has been signed by the Vendor and is set forth below. To this end, Vendor attaches its privacy policy. ▇▇▇▇▇://▇▇▇▇▇▇▇.▇▇▇▇▇-▇▇▇.▇▇▇/en/hc/kialo-edu-data-security-and-privacy-plan/ Additional elements of Vendor’s Data Security and Privacy Plan are as follows:
(a) In order to implement all state, federal, and local data security and privacy requirements, including those contained within this Data Sharing and Confidentiality Agreement, consistent with Erie 1 BOCES’ data security and privacy policy, Vendor will: Review its data security and privacy policy and practices to ensure that they are in conformance withall with all applicable federal, state, and local laws and the terms of this Data Sharing and Confidentiality Agreement. In the event Vendor’s policy and practices are not in conformance, the Vendor will implement commercially reasonable efforts to ensure such compliance.
(b) As required by the NIST Cybersecurity Framework, in order to protect the security, confidentiality and integrity of the Protected Data that it receives under the MLSA,
a. Vendor will make its best efforts in deploying have the following reasonable administrative, technical, operational,, and physical safeguards and practices in place throughout the term of the MLSA:
i. Data Security:
1. Data-at-rest & data-in-transit is encrypted 2. Data leak protections are implemented
ii. Information Protection Processes and Procedures:
1. Data destruction is performed according to contract and agreements
2. A plan for vulnerability management is developed and implemented
iii. Protective Technology:
1. Log/audit records are ascertained, implemented, documented, and reviewed according to policy 2. Network communications are protected
iv. Identity Management, Authentication and Access Control:
1. Credentials and identities are issued, verified, managed, audited, and revoked, as applicable, for authorized dev
(c) Vendor will comply with all obligations set forth in Erie 1 BOCES’ “Supplemental Information about the MLSA” below.
(d) For any of its officers or employees (or officers or employees of any of its subcontractors or assignees) who have access to Protected Data, Vendor has provided or will provide training on the federal and state laws governing confidentiality of such data prior to their receiving access, as follows: Annually, Vendor will require that all of its employees (or officers or employees of any of its subcontractors or assignees) undergo data security and privacy training to ensure that these individuals are aware of and familiar with all applicable data security and privacy laws.
(e) Vendor [check oneX] will Xwill [ ] will not utilize sub-contractors for the purpose of fulfilling one or more of its obligations under the MLSA. In the event that Vendor engages any subcontractors, assignees, or other authorized agents to perform its obligations under the MLSA, it will require such subcontractors, assignees, or other authorized agents to execute written agreements as more fully described in Erie 1 BOCES’ “Supplemental Information about the MLSA,” below.
(f) Vendor will manage data security and privacy incidents that implicate Protected Data, including identifying breaches and unauthorized disclosures, and Vendor will provide prompt notification of any breaches or unauthorized disclosures of Protected Data in accordance with Section 6 of this Data Sharing and Confidentiality Agreement.
(g) Vendor will implement procedures for the return, transition, deletion and/or destruction of Protected Data at such time that the MLSA is terminated or expires, as more fully described in Erie 1 BOCES’ “Supplemental Information about the MLSA,” below.
Appears in 1 contract
Data Security and Privacy Plan. Vendor agrees that it will protect the confidentiality, privacy and security of the Protected Data received from Participating Educational Agencies in accordance with Erie 1 BOCES’ Parents Bill of Rights for Data Privacy and Security, a copy of which has been signed by the Vendor and is set forth below. To this end, Vendor attaches its privacy policy. ▇▇▇▇▇://▇▇▇.▇▇▇▇▇.▇▇▇/trust/d0f75b69-08de-4b2d-8d92-97affaf7cabf Additional elements of Vendor’s Data Security and Privacy Plan are as follows:
(a) In order to implement all state, federal, and local data security and privacy requirements, including those contained within this Data Sharing and Confidentiality Agreement, consistent with Erie 1 BOCES’ data security and privacy policy, Vendor will: Review its data security and privacy policy and practices to ensure that they are in conformance withall with all applicable federal, state, and local laws and the terms of this Data Sharing and Confidentiality Agreement. In the event Vendor’s policy and practices are not in conformance, the Vendor will implement commercially reasonable efforts to ensure such compliance.
(b) As required by the NIST Cybersecurity Framework, in order to protect the security, confidentiality and integrity of the Protected Data that it receives under the MLSA,
a. Vendor will make its best efforts in deploying have the following reasonable administrative, technical, operational,, and physical safeguards and practices in place throughout the term of the MLSA:
i. Data Security:
1. Data-at-rest & data-in-transit is encrypted 2. Data leak protections are implemented
ii. Information Protection Processes and Procedures:
1. Data destruction is performed according to contract and agreements
2. A plan for vulnerability management is developed and implemented
iii. Protective Technology:
1. Log/audit records are ascertained, implemented, documented, and reviewed according to policy 2. Network communications are protected
iv. Identity Management, Authentication and Access Control:
1. Credentials and identities are issued, verified, managed, audited, and revoked, as applicable, for authorized dev
(c) Vendor will comply with all obligations set forth in Erie 1 BOCES’ “Supplemental Information about the MLSA” below.
(d) For any of its officers or employees (or officers or employees of any of its subcontractors or assignees) who have access to Protected Data, Vendor has provided or will provide training on the federal and state laws governing confidentiality of such data prior to their receiving access, as follows: Annually, Vendor will require that all of its employees (or officers or employees of any of its subcontractors or assignees) undergo data security and privacy training to ensure that these individuals are aware of and familiar with all applicable data security and privacy laws.
(e) Vendor [check one] will Xwill ✔ will not utilize sub-contractors for the purpose of fulfilling one or more of its obligations under the MLSA. In the event that Vendor engages any subcontractors, assignees, or other authorized agents to perform its obligations under the MLSA, it will require such subcontractors, assignees, or other authorized agents to execute written agreements as more fully described in Erie 1 BOCES’ “Supplemental Information about the MLSA,” below.
(f) Vendor will manage data security and privacy incidents that implicate Protected Data, including identifying breaches and unauthorized disclosures, and Vendor will provide prompt notification of any breaches or unauthorized disclosures of Protected Data in accordance with Section 6 of this Data Sharing and Confidentiality Agreement.
(g) Vendor will implement procedures for the return, transition, deletion and/or destruction of Protected Data at such time that the MLSA is terminated or expires, as more fully described in Erie 1 BOCES’ “Supplemental Information about the MLSA,” below.
Appears in 1 contract
Data Security and Privacy Plan. Vendor agrees that it will protect the confidentiality, privacy and security of the Protected Data received from Participating Educational Agencies in accordance with Erie 1 BOCES’ Parents Bill of Rights for Data Privacy and Security. To this end, a copy of which has been signed by the Vendor attaches its privacy policyand is set forth below. Additional elements of Vendor’s Data Security and Privacy Plan are as follows:
(a) In order to implement all state, federal, and local data security and privacy requirements, including those contained within this Data Sharing and Confidentiality Agreement, consistent with Erie 1 BOCES’ data security and privacy policy, Vendor will: Review its data security and privacy policy and practices to ensure that they are in conformance withall with all applicable federal, state, and local laws and the terms of this Data Sharing and Confidentiality Agreement. In the event Vendor’s policy and practices are not in conformance, the Vendor will implement commercially reasonable efforts to ensure such compliance.
(b) As required by the NIST Cybersecurity Framework, in order to protect the security, confidentiality and integrity of the Protected Data that it receives under the MLSA,
a. Vendor will make its best efforts in deploying have the following reasonable administrative, technical, operational,, and physical safeguards and practices in place throughout the term of the MLSA:
i. Data Security:
1. Data-at-rest & data-in-transit is encrypted 2. Data leak protections are implemented
ii. Information Protection Processes and Procedures:
1. Data destruction is performed according to contract and agreements
2. A plan for vulnerability management is developed and implemented
iii. Protective Technology:
1. Log/audit records are ascertained, implemented, documented, and reviewed according to policy 2. Network communications are protected
iv. Identity Management, Authentication and Access Control:
1. Credentials and identities are issued, verified, managed, audited, and revoked, as applicable, for authorized dev
b. See Exhibit E for Vendor’s Data Security and Privacy Plan and the following link for Vendor’s Privacy Policy: ▇▇▇▇▇://▇▇▇▇▇▇▇▇▇▇.▇▇▇/privacy-policy/.
(c) Vendor will comply with all obligations set forth in Erie 1 BOCES’ “Supplemental Information about the MLSA” below.
(d) For any of its officers or employees (or officers or employees of any of its subcontractors or assignees) who have access to Protected Data, Vendor has provided or will provide training on the federal and state laws governing confidentiality of such data prior to their receiving access, as follows: Annually, Vendor will require that all of its employees (or officers or employees of any of its subcontractors or assignees) undergo data security and privacy training to ensure that these individuals are aware of and familiar with all applicable data security and privacy laws.
(e) Vendor [check one] x will Xwill will not utilize sub-contractors for the purpose of fulfilling one or more of its obligations under the MLSA. In the event that Vendor engages any subcontractors, assignees, or other authorized agents to perform its obligations under the MLSA, it will require such subcontractors, assignees, or other authorized agents to execute written agreements as more fully described in Erie 1 BOCES’ “Supplemental Information about the MLSA,” below.
(f) Vendor will manage data security and privacy incidents that implicate Protected Data, including identifying breaches and unauthorized disclosures, and Vendor will provide prompt notification of any breaches or unauthorized disclosures of Protected Data in accordance with Section 6 of this Data Sharing and Confidentiality Agreement.
(g) Vendor will implement procedures for the return, transition, deletion and/or destruction of Protected Data at such time that the MLSA is terminated or expires, as more fully described in Erie 1 BOCES’ “Supplemental Information about the MLSA,” below.
Appears in 1 contract
Data Security and Privacy Plan. Vendor agrees that it will protect the confidentiality, privacy and security of the Protected Data received from Participating Educational Agencies in accordance with Erie 1 BOCES’ Parents Bill of Rights for Data Privacy and Security. To this end, a copy of which has been signed by the Vendor attaches its privacy policyand is set forth below. Additional elements of Vendor’s Data Security and Privacy Plan are as follows:
(a) In order to implement all state, federal, and local data security and privacy requirements, including those contained within this Data Sharing and Confidentiality Agreement, consistent with Erie 1 BOCES’ data security and privacy policy, Vendor will: Review its data security and privacy policy and practices to ensure that they are in conformance withall with all applicable federal, state, and local laws and the terms of this Data Sharing and Confidentiality Agreement. In the event Vendor’s policy and practices are not in conformance, the Vendor will implement commercially reasonable efforts to ensure such compliance.
(b) As required by the NIST Cybersecurity Framework, in order to protect the security, confidentiality and integrity of the Protected Data that it receives under the MLSA,
a. Vendor will make its best efforts in deploying have the following reasonable administrative, technical, operational,, and physical safeguards and practices in place throughout the term of the MLSAMLSA (each as further detailed in the attached Data Security Policy or Great Minds privacy policy at ▇▇▇▇▇://▇▇▇▇▇▇▇▇▇▇.▇▇▇/privacy-policy):
i. Data Security:
1. Data-at-rest & data-in-transit is encrypted 2. Data leak protections are implemented
ii. Information Protection Processes and Procedures:
1. Data destruction is performed according to contract and agreements
2. A plan for vulnerability management is developed and implemented
iii. Protective Technology:
1. Log/audit records are ascertained, implemented, documented, and reviewed according to policy 2. Network communications are protected
iv. Identity Management, Authentication and Access Control:
1. Credentials and identities are issued, verified, managed, audited, and revoked, as applicable, for authorized dev
(c) Vendor will comply with all obligations set forth in Erie 1 BOCES’ “Supplemental Information about the MLSA” below.
(d) For any of its officers or employees (or officers or employees of any of its subcontractors or assignees) who have access to Protected Data, Vendor has provided or will provide training on the federal and state laws governing confidentiality of such data prior to their receiving access, as follows: Annually, Vendor will require that all of its employees (or officers or employees of any of its subcontractors or assignees) undergo data security and privacy training to ensure that these individuals are aware of and familiar with all applicable data security and privacy laws.
(e) Vendor [check one] X will Xwill will not utilize sub-contractors for the purpose of fulfilling one or more of its obligations under the MLSA. In the event that Vendor engages any subcontractors, assignees, or other authorized agents to perform its obligations under the MLSA, it will require such subcontractors, assignees, or other authorized agents to execute written agreements as more fully described in Erie 1 BOCES’ “Supplemental Information about the MLSA,” below.
(f) Vendor will manage data security and privacy incidents that implicate Protected Data, including identifying breaches and unauthorized disclosures, and Vendor will provide prompt notification of any breaches or unauthorized disclosures of Protected Data in accordance with Section 6 of this Data Sharing and Confidentiality Agreement.
(g) Vendor will implement procedures for the return, transition, deletion and/or destruction of Protected Data at such time that the MLSA is terminated or expires, as more fully described in Erie 1 BOCES’ “Supplemental Information about the MLSA,” below.
Appears in 1 contract