Data Integrity Policies and procedures to ensure the confidentiality, integrity, and availability of Customer Data or Professional Services Data and protect it from disclosure, improper alteration, or destruction.
Program Integrity The state must have processes in place to ensure that there is no duplication of federal funding for any aspect of the demonstration.
Integrity In addition to any applicable statutory restrictions, the Contractor shall not, in connection with this or any other agreement with the State, directly or indirectly (i) offer, confer, or agree to confer any pecuniary benefit on anyone as consideration for any State officer or employee’s decision, opinion, recommendation, vote, other exercise of discretion, or violation of a known legal duty; or (ii) offer, give, or agree to give to anyone any gratuity for the benefit of, or at the direction or request of, any State officer or employee. For purposes of clause (ii), “gratuity” means any payment in the form of cash, travel, entertainment, gifts, meals, lodging, loans, subscriptions, advances, deposits of money, services, employment, or contracts of any kind.
Workstation/Laptop encryption All workstations and laptops that process and/or store County PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Security Office.
Encryption The Fund acknowledges and agrees that encryption may not be available for every communication through the System, or for all data. The Fund agrees that Custodian may deactivate any encryption features at any time, without notice or liability to the Fund, for the purpose of maintaining, repairing or troubleshooting the System or the Software.