Common use of Undertaking by Contractor Clause in Contracts

Undertaking by Contractor. Without limiting Contractor’s obligation of confidentiality as further described, Contractor is responsible for establishing and maintaining a data privacy and information security program, including physical, technical, administrative, and organizational safeguards, that is designed to: (a) ensure the security and confidentiality of the State Data; (b) protect against any anticipated threats or hazards to the security or integrity of the State Data; (c) protect against unauthorized disclosure, access to, or use of the State Data; (d) ensure the proper disposal of State Data; and (e) ensure that all Contractor Representatives comply with all of the foregoing. In no case will the safeguards of Contractor’s data privacy and information security program be less stringent than the safeguards used by the State, and Contractor must at all times comply with all applicable State IT policies and standards, which are available at ▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇.▇▇▇/dtmb/0,4568,7-150- 56355_56579_56755---,00.html.

Appears in 2 contracts

Sources: Custom Software Development Contract, Custom Software Development Contract

Undertaking by Contractor. Without limiting Contractor’s obligation of confidentiality as further described, Contractor is responsible for establishing and maintaining a data privacy and information security program, including physical, technical, administrative, and organizational safeguards, that is designed to: (a) ensure the security and confidentiality of the State Data; (b) protect against any anticipated threats or hazards to the security or integrity of the State Data; (c) protect against unauthorized disclosure, access to, or use of the State Data; (d) ensure the proper disposal of State Data; and (e) ensure that all Contractor Representatives comply with all of the foregoing. In no case will the safeguards of Contractor’s data privacy and information security program be less stringent than the safeguards used by the State, and Contractor must at all times comply with all applicable State IT policies and standards, which are available at ▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇.▇▇▇/dtmb/0,4568,7/dtmb/0,4568,▇-150- 56355_56579_56755▇▇▇-▇▇▇▇▇_56579_56755---,00.html.

Appears in 1 contract

Sources: Contract