Security and Data Transfers Clause Samples
POPULAR SAMPLE Copied 8 times
Security and Data Transfers. Party shall comply with all applicable State and Agency of Human Services' policies and standards, especially those related to privacy and security. The State will advise the Party of any new policies, procedures, or protocols developed during the term of this agreement as they are issued and will work with the Party to implement any required. Party will ensure the physical and data security associated with computer equipment, including desktops, notebooks, and other portable devices, used in connection with this Agreement. Party will also assure that any media or mechanism used to store or transfer data to or from the State includes industry standard security mechanisms such as continually up-to-date malware protection and encryption. Party will make every reasonable effort to ensure media or data files transferred to the State are virus and spyware free. At the conclusion of this agreement and after successful delivery of the data to the State, Party shall securely delete data (including archival backups) from Party’s equipment that contains individually identifiable records, in accordance with standards adopted by the Agency of Human Services. Party, in the event of a data breach, shall comply with the terms of Section 7 above.
Security and Data Transfers. The State shall work with the Subrecipient to ensure compliance with all applicable State and Agency of Human Services' policies and standards, especially those related to privacy and security. The State will advise the Subrecipient of any new policies, procedures, or protocols developed during the term of this agreement as they are issued and will work with the Subrecipient to implement any required. The Subrecipient will ensure the physical and data security associated with computer equipment - including desktops, notebooks, and other portable devices - used in connection with this agreement. The Subrecipient will also assure that any media or mechanism used to store or transfer data to or from the State includes industry standard security mechanisms such as continually up-to-date malware protection and encryption. The Subrecipient will make every reasonable effort to ensure media or data files transferred to the State are virus and spyware free. At the conclusion of this agreement and after successful delivery of the data to the State, the Subrecipient shall securely delete data (including archival backups) from the Subrecipient's equipment that contains individually identifiable records, in accordance with standards adopted by the Agency of Human Services.
Security and Data Transfers. The State shall work with the Contractor to ensure compliance with all applicable State and Agency of Human Services' policies and standards, especially those related to privacy and security. The State will advise the Contractor of any new policies, procedures, or protocols developed during the term of this agreement as they are issued and will work with the Contractor to implement any required. The Contractor will ensure the physical and data security associated with computer equipment - including desktops, notebooks, and other portable devices - used in connection with this agreement. The Contractor will also assure that any media or mechanism used to store or transfer data to or from the State includes industry standard security mechanisms such as continually up-to-date malware protection and encryption. The Contractor will make every reasonable effort to ensure media or data files transferred to the State are virus and spyware free. At the conclusion of this agreement and after successful delivery of the data to the State, the Contractor shall securely delete data (including archival backups) from the Contractor's equipment that contains individually identifiable records, in accordance with standards adopted by the Agency of Human Services.
Security and Data Transfers. The State shall work with the Grantee to ensure compliance with all applicable State and Agency of Human Services' policies and standards, especially those related to privacy and security. The State will advise the Grantee of any new policies, procedures, or protocols developed during the term of this agreement as they are issued and will work with the Grantee to implement any required. The Grantee will ensure the physical and data security associated with computer equipment - including desktops, notebooks, and other portable devices - used in connection with this agreement. The Grantee will also assure that any media or mechanism used to store or transfer data to or from the State includes industry standard security mechanisms such as continually up-to-date malware protection and encryption. The Grantee will make every reasonable effort to ensure media or data files transferred to the State are virus and spyware free. At the conclusion of this agreement and after successful delivery of the data to the State, the Grantee shall securely delete data (including archival backups) from the Grantee's equipment that contains individually identifiable records, in accordance with standards adopted by the Agency of Human Services.
Security and Data Transfers. Party shall comply with all applicable State and Agency of Human Services' policies and standards, especially those related to privacy and security. The State will advise the Party of any new policies, procedures, or protocols developed during the term of this agreement as they are issued and will work with the Party to implement any required.
Security and Data Transfers. Party shall maintain and comply with internal Security and Privacy policies in compliance with the HITRUST
Security and Data Transfers. Contractor shall comply with all applicable State and Agency of Human Services' policies and standards, especially those related to privacy and security. The State will advise the Contractor of any new policies, procedures, or protocols developed during the term of this agreement as they are issued and will work with the Contractor to implement any required. Contractor will ensure the physical and data security associated with computer equipment, including desktops, notebooks, and other portable devices, used in connection with this agreement. The Contractor will also assure that any media or mechanism used to store or transfer data to or from the State includes industry standard security mechanisms such as continually up-to-date malware protection and encryption. The Contractor will make every reasonable effort to ensure media or data files transferred to the State are virus and spyware free. At the conclusion of this agreement and after successful delivery of the data to the State, the Contractor shall securely delete data (including archival backups) from the Contractor's equipment that contains individually identifiable records, in accordance with standards adopted by the Agency of Human Services. Contractor, in the event of a data breach, shall comply with the terms of Section 6 above.
Security and Data Transfers. 19.1.8.1 Contractor will ensure the physical and Data security associated with computer equipment — including but not limited to desktops, notebooks, and other portable devices — used in connection with this Contract. Contractor will also assure that any media or mechanism used to store or transfer Data to or from State includes industry standard security mechanisms such as continually up-to-date malware protection and encryption.
19.1.8.2 Contractor will ensure media or Data files transferred to State are virus and spyware free. At the conclusion of this Contract and after successful delivery of the Data to State, Contractor shall securely delete Data (including archival backups) from Contractor's equipment that contains individually identifiable records, in accordance with standards adopted by State.
19.1.8.3 Contractor represents and warrants that it has implemented, and it shall maintain during the term of this Contract industry-standard administrative, technical, and physical safeguards to: (i) ensure the security and confidentiality of State Data; (ii) protect against any anticipated security threats or hazards to the security or integrity of the State Data; and (iii) protect against unauthorized access to or use of State Data. Such measures include, as applicable: (1) access controls on information systems, including controls to authenticate and permit access to State Data only to authorized individuals and controls to prevent Contractor employees from providing State Data to unauthorized individuals who may seek to obtain this information (whether through fraudulent means or otherwise); (2) industry-standard firewall protection; (3) encryption of electronic State Data while in transit from Contractor networks to external networks; (4) industry-standard measures to store in a secure fashion all State Data which shall include multiple levels of authentication; (5) dual control procedures, segregation of duties, and pre-employment criminal background checks for employees with responsibilities for or access to State Data; (6) industry-standard measures to ensure that State Data shall not be altered or corrupted without the prior written consent of State;
Security and Data Transfers. The State shall work with the Educational State to ensure compliance with all applicable State and Agency of Human Services' policies and standards, especially those related to privacy and security. The State will advise the Educational State of any new policies, procedures, or protocols developed during the term of this agreement as they are issued and will work with the Educational State to implement any required. The Educational State will ensure the physical and data security associated with computer equipment - including desktops, notebooks, and other portable devices - used in connection with this agreement. The Educational State will also assure that any media or mechanism used to store or transfer data to or from the State includes industry standard security mechanisms such as continually up-to-date malware protection and encryption. The Educational State will make every reasonable effort to ensure media or data files transferred to the State are virus and spyware free. At the conclusion of this agreement and after successful delivery of the data to the State, the Educational State shall securely delete data (including archival backups) from the Educational State's equipment that contains individually identifiable records, in accordance with standards adopted by the Agency of Human Services.
Security and Data Transfers. Party shall comply with all applicable State and Agency of Human Services' policies and standards, especially those related to privacy and security. Current State security policies can be found here: ▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇.▇▇▇/policy/policy and Agency of Human Services State policies can be found here: ▇▇▇▇://▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇▇▇▇▇.▇▇▇/policy-legislation.The State will advise the Party of any new policies, procedures, or protocols developed during the term of this agreement as they are issued and will work with the Party to implement any required. Party will ensure the physical and data security associated with computer equipment, including desktops, notebooks, and other portable devices, used in connection with this Agreement. Party will also assure that any media or mechanism used to store or transfer data to or from the State includes industry standard security mechanisms such as continually up-to-date malware protection and encryption. Party will make every reasonable effort to ensure media or data files transferred to the State are virus and spyware free. At the conclusion of this agreement and after successful delivery of the data to the State, Party shall securely delete data (including archival backups, except tape backups which will be deleted within 6 months of termination) from Party’s equipment that contains individually identifiable records, in accordance with standards adopted by the Agency of Human Services. Party, in the event of a data breach, shall comply with the terms of Section 6 above.