Security Incident Reporting. 9.17.13.1 A security incident occurs when County Information Assets are or reasonably believed to have been accessed, modified, destroyed or disclosed without proper authorization or are lost or stolen. A security incident includes (but is not limited to) instances in which Subrecipient employees access systems in excess of their user rights or use the systems inappropriately, data is breached, etc. Subrecipient and its Lower Tier Subrecipient must comply with California Department of Aging's security incident reporting procedure which is available online at ▇▇▇▇://▇▇▇▇▇.▇▇.▇▇▇/Programsproviders/Information_ Security_and_Privacy.
Appears in 11 contracts
Sources: Subaward Agreement, Subaward Agreement, Subaward Agreement
Security Incident Reporting. 9.17.13.1 9.18.13.1 A security incident occurs when County Information Assets are or reasonably believed to have been accessed, modified, destroyed or disclosed without proper authorization or are lost or stolen. A security incident includes (but is not limited to) instances in which Subrecipient employees access systems in excess of their user rights or use the systems inappropriately, data is breached, etc. Subrecipient and its Lower Tier Subrecipient must comply with California Department of Aging's security incident reporting procedure which is available online at ▇▇▇▇://▇▇▇▇▇.▇▇.▇▇▇/Programsproviders/Information_ Security_and_Privacy.
Appears in 3 contracts
Sources: Subaward Agreement, Subaward Agreement, Subaward Agreement
Security Incident Reporting. 9.17.13.1 A security incident occurs when County Information Assets are or reasonably believed to have been accessed, modified, destroyed or disclosed without proper authorization or are lost or stolen. A security incident includes (but is not limited to) instances in which Subrecipient employees access systems in excess of their user rights or use the systems inappropriately, data is breached, etc. Subrecipient and its any approved Lower Tier Subrecipient must comply with California Department of Aging's security incident reporting procedure which is available online at ▇▇▇▇://▇▇▇▇▇.▇▇.▇▇▇/Programsproviders/Information_ Security_and_Privacy.
Appears in 1 contract
Sources: Subaward Agreement
Security Incident Reporting. 9.17.13.1 A security incident occurs when County Information Assets are or reasonably believed to have been accessed, modified, destroyed or disclosed without proper authorization or are lost or stolen. A security incident includes (but is not limited to) instances in which Subrecipient employees access systems in excess of their user rights or use the systems inappropriately, data is breached, etc. Subrecipient and its Lower Tier Subrecipient must comply with California Department of Aging's security incident reporting procedure which is available online at ▇▇▇▇://▇▇▇▇▇.▇▇.▇▇▇/Programsproviders/Information_ Security_and_Privacy.
Appears in 1 contract
Sources: Subaward Agreement
Security Incident Reporting. 9.17.13.1 9.17.9.1 A security incident occurs when County Information Assets are or reasonably believed to have been accessed, modified, destroyed or disclosed without proper authorization or are lost or stolen. A security incident includes (but is not limited to) instances in which Subrecipient employees access systems in excess of their user rights or use the systems inappropriately, data is breached, etc. Subrecipient and its any approved Lower Tier Subrecipient must comply with California Department of Aging's security incident reporting procedure which is available online at ▇▇▇▇://▇▇▇▇▇.▇▇.▇▇▇/Programsproviders/Information_ Security_and_PrivacySecu rity_and_Privacy.
Appears in 1 contract
Security Incident Reporting. 9.17.13.1 9.21.8.1 A security incident occurs when County Information Assets are or reasonably believed to have been accessed, modified, destroyed or disclosed without proper authorization or are lost or stolen. A security incident includes (but is not limited to) instances in which Subrecipient employees access systems in excess of their user rights or use the systems inappropriately, data is breached, etc. Subrecipient and its Lower Tier Subrecipient must comply with California Department of Aging's security incident reporting procedure which is available online at ▇▇▇▇://▇▇▇▇▇.▇▇.▇▇▇/Programsproviders/Information_ Security_and_Privacy.
Appears in 1 contract
Sources: Subaward Agreement