ECEAP-Head Start Data Share - Snohomish County
ECEAP-Head Start Data Share - Snohomish County
ECEAP-Head Start Data Share - Snohomish County
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
a) Confidential Information provided by DEL will remain the property of DEL and will be returned<br />
to DEL or destroyed when the work for which the information was required has been<br />
completed.<br />
Confidential Information provided by DEL will be dooessed and used only for the purposes of<br />
carrying out activities pursuant to this Contract.<br />
c) Contractor shall not use the information provided for any purpose not specifically authorized<br />
under this Contract.<br />
d) The information provided by DEL will not be duplicated or re-disclosed without the written<br />
authority of DEL.<br />
e) The Contractor shall protect the confidentiality of the information pursuant to this Contract by<br />
adopting and implementing effective physical, electronic, and managerial safeguards against<br />
unauthorized access to and unauthorized disclosure of such information.<br />
f) If the data and analyses generated by the data recipient contain confidential information about<br />
DEL clients, then any and all reports utilizing this data shall be subject to review and approval<br />
by the providing party prior to publication in any medium or presentation in any forum.<br />
8. SAFEGUARDS AGAINST UNAUTHORIZED ACCESS AND REDISCLOSURE<br />
Contractor shall exercise due care to protect all confidential data from unauthorized physical and<br />
electronic access. Both parties shall establish and implement the following minimum physical,<br />
electronic and managerial safeguards for maintaining the confidentiality of information provided by<br />
either party pursuant to this Contract:<br />
a) Access to the information provided by DEL will be restricted to only those authorized staff,<br />
officials, and agents of the parties who need it to perform their official duties in the<br />
performance of the work requiring access to the information as detailed in the Purpose of this<br />
Contract.<br />
b) The Contractor will store the information in an area that is safe from access by unauthorized<br />
persons during duty hours as well as non-duty hours or when not in use.<br />
c) Unless specifically authorized within the Special Terms and Conditions of the Contract, the<br />
Contractor will not store any confidential or sensitive data on portable electronic devices or<br />
media, including, but not limited to laptops, handhelds/PDAs, Ultramobile PCs, flash memory<br />
devices, floppy discs, optical discs (CDs/DVDs), and portable hard disks.<br />
d) The Contractor will protect the information in a manner that prevents unauthorized persons<br />
from retrieving the information by means of computer, remote terminal or other means.<br />
e) The Contractor shall take precautions to ensure that only authorized personnel and agents are<br />
given access to on-line files containing Confidential Information.<br />
f) The Contractor shall instruct all personnel with access to the Confidential Information<br />
regarding the confidential nature of the information, the requirements of the Limitation on<br />
Access and Use and Safeguards Against Unauthorized Access and Re-Disclosure clauses of<br />
this Contract, and the sanctions specified in federal and state laws against unauthorized<br />
disclosure of information covered by this Contract.<br />
g), The Contractor shall take due care and take reasonable precautions to DEL's confidential data<br />
from unauthorized physical and electronic access. Both parties will strive to meet or exceed<br />
the requirements of the Information Services Board (ISB) policies and standards for data<br />
security and access controls to ensure the confidentiality, availability, and integrity of all data<br />
accessed.<br />
9. NOTIFICATION OF COMPROMISE OR POTENTIAL COMPROMISE<br />
If the Contractor or its agents detect a compromise or potential compromise in the information<br />
technology security for this data such that confidential information may have been accessed or<br />
disclosed without proper authorization, the Contractor will give notice within one (1) working day of<br />
discovery to the DEL of such compromise or potential compromise and the compromised party will<br />
Page 2 of 6 <strong>Data</strong> Access and Management Contract between DEL and CONTRACTOR