Security Administrator and Authorized Users. Grantee shall: 1. designate a Security Administrator and a back-up Security Administrator. The Security Administrator is required to implement and maintain a system for management of user accounts/user roles to ensure that all the CMBHS user accounts are current. 2. have a security policy that ensures adequate system security and protection of confidential information. 3. notify the CMBHS Help-desk within ten (10) business days of any change to the designated Security Administrator or the back-up Security Administrator. Grantee will: i. ensure that access to CMBHS is restricted to only currently authorized users. ii. within 24 hours, remove access to users who are no longer authorized to have access to secure data in CMBHS. iii. maintain the CMBHS Authorized Users List which includes former and current Grantee’s employees, contracted labor, subcontractors or any other users authorized to have access to secure data in CMBHS. The CMBHS Authorized Users List shall document whose authority has been added and terminated; and the date the authority was added and terminated. 4. submit the CMBHS Security Attestation Form and the CMBHS Authorized Users List as stated in Attachment A, to the following e-mail address: ▇▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇▇▇▇▇▇▇@▇▇▇▇.▇▇▇▇▇.▇▇.
Appears in 123 contracts
Sources: Grant Contract, Grant Agreement, Grant Contract
Security Administrator and Authorized Users. Grantee shall:
1. designate Designate a Security Administrator and a back-up Security Administrator. The Security Administrator is required to implement and maintain a system for management of user accounts/user roles to ensure that all the CMBHS user accounts are current.
2. have Have a security policy that ensures adequate system security and protection of confidential information.
3. notify Notify the CMBHS Help-desk within ten (10) business days of any change to the designated Security Administrator or the back-up Security Administrator. Grantee will:
i. ensure Ensure that access to CMBHS is restricted to only currently authorized users.
ii. within Within 24 hours, remove access to users who are no longer authorized to have access to secure data in CMBHS.
iii. maintain Maintain the CMBHS Authorized Users List which includes former and current Grantee’s employees, contracted labor, subcontractors or any other users authorized to have access to secure data in CMBHS. The CMBHS Authorized Users List shall document whose authority has been added and terminated; and the date the authority was added and terminated.
4. submit Submit the CMBHS Security Attestation Form and the CMBHS Authorized Users List as stated in Attachment A, to the following e-mail address: ▇▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇▇▇▇▇▇▇@▇▇▇▇.▇▇▇▇▇.▇▇.
Appears in 38 contracts
Sources: Hhs000663700254, Co Occurring Psychiatric and Substance Use Disorders Services Contract, Hhs000663700100
Security Administrator and Authorized Users. Grantee shall:: ATTACHMENT E (REVISED AUGUST 2021)
1. designate Designate a Security Administrator and a back-up Security Administrator. The Security Administrator is required to implement and maintain a system for management of user accounts/user roles to ensure that all the CMBHS user accounts are current.
2. have Have a security policy that ensures adequate system security and protection of confidential information.
3. notify Notify the CMBHS Help-desk within ten (10) business days of any change to the designated Security Administrator or the back-up Security Administrator. Grantee will:
i. ensure Ensure that access to CMBHS is restricted to only currently authorized users.
ii. within Within 24 hours, remove access to users who are no longer authorized to have access to secure data in CMBHS.
iii. maintain Maintain the CMBHS Authorized Users List which includes former and current Grantee’s employees, contracted labor, subcontractors or any other users authorized to have access to secure data in CMBHS. The CMBHS Authorized Users List shall document whose authority has been added and terminated; and the date the authority was added and terminated.
4. submit Submit the CMBHS Security Attestation Form and the CMBHS Authorized Users List as stated in Attachment A, to the following e-mail address: ▇▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇▇▇▇▇▇▇@▇▇▇▇.▇▇▇▇▇.▇▇.
Appears in 18 contracts
Sources: Treatment for Adult (Tra) Services Agreement, Health and Human Services Commission Contract, Treatment for Females (Trf) Services Agreement
Security Administrator and Authorized Users. Grantee shall:
1. designate Designate a Security Administrator and a back-up Security Administrator. The Security Administrator is required to implement and maintain a system for management of user accounts/user roles to ensure that all the CMBHS user accounts are current.
2. have Have a security policy that ensures adequate system security and protection of confidential information.
3. notify Notify the CMBHS Help-desk within ten (10) business days of any change to the designated Security Administrator or the back-up Security Administrator. Grantee will:
i. ensure Ensure that access to CMBHS is restricted to only currently authorized users.
ii. within Within 24 hours, remove access to users who are no longer authorized to have access to secure data in CMBHS.
iii. maintain Maintain the CMBHS Authorized Users List which includes former and current Grantee’s employees, contracted labor, subcontractors or any other users authorized to have access to secure data in CMBHS. The CMBHS Authorized Users List shall document whose authority has been added and terminated; and the date the authority was added and terminated.
4. submit Submit the CMBHS Security Attestation Form and the CMBHS Authorized Users List as stated in Attachment A, to the following e-mail address: ▇▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇▇▇▇▇▇▇@▇▇▇▇.▇▇▇▇▇.▇▇.
Appears in 2 contracts
Sources: Co Occurring Psychiatric and Substance Use Disorders Services Contract, Outreach, Screening, Assessment, Referral (Sa/Osr) Services Contract
Security Administrator and Authorized Users. Grantee shall:
1. Contractor shall designate a Security Administrator and a back-up Security Administrator. The Security Administrator is required to implement and maintain a system for management of user accounts/user roles to ensure that all the CMBHS user accounts are current.
2. Contractor shall have a security policy that ensures adequate system security and protection of confidential information.
3. Contractor shall notify the CMBHS Help-desk within ten (10) business days of any change to the designated Security Administrator or the back-up Security Administrator. Grantee will:.
i. a) Contractor shall ensure that access to CMBHS is restricted to only currently authorized users.
ii. Contractor shall, within 24 hours, remove access to users who are no longer authorized to have access to secure data in CMBHS.
iii. b) Contractor shall maintain the CMBHS Authorized Users List which includes former and current GranteeContractor’s employees, contracted labor, subcontractors or any other users authorized to have access to secure data in CMBHS. The CMBHS Authorized Users List shall document whose authority has been added and terminated; and the date the authority was added and terminated.
4. submit the CMBHS Security Attestation Form and the CMBHS Authorized Users List as stated in Attachment A, to the following e-mail address: ▇▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇▇▇▇▇▇▇@▇▇▇▇.▇▇▇▇▇.▇▇.
Appears in 2 contracts
Sources: Substance Abuse Additional Provisions, Substance Abuse Contract
Security Administrator and Authorized Users. Grantee Performing Agency shall:
1. designate a Security Administrator and a back-up Security Administrator. The Security Administrator is required to implement and maintain a system for management of user accounts/user roles to ensure that all the CMBHS user accounts are current.
2. have a security policy that ensures adequate system security and protection of confidential information.
3. notify the CMBHS Help-desk within ten (10) business days of any change to the designated Security Administrator or the back-up Security Administrator. Grantee Performing Agency will:
i. ensure that access to CMBHS is restricted to only currently authorized users.
ii. within 24 hours, remove access to users who are no longer authorized to have access to secure data in CMBHS.
iii. maintain the CMBHS Authorized Users List which includes former and current GranteePerforming Agency’s employees, contracted labor, subcontractors or any other users authorized to have access to secure data in CMBHS. The CMBHS Authorized Users List shall document whose authority has been added and terminated; and the date the authority was added and terminated.
4. submit the CMBHS Security Attestation Form and the CMBHS Authorized Users List as stated in Attachment A, to the following e-mail address: ▇▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇▇▇▇▇▇▇@▇▇▇▇.▇▇▇▇▇.▇▇.
Appears in 1 contract
Sources: Interagency Cooperation Contract